Mohamed-Lamine Messai

Orcid: 0000-0003-0376-0657

According to our database1, Mohamed-Lamine Messai authored at least 21 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A robust and efficient vector-based key management scheme for IoT networks.
Ad Hoc Networks, October, 2023

A survey on implementations of homomorphic encryption schemes.
J. Supercomput., September, 2023

POSTER: Activity Graph Learning for Attack Detection in IoT Networks.
Proceedings of the 24th IEEE International Symposium on a World of Wireless, 2023

Study on Poisoning Attacks: Application Through an IoT Temperature Dataset.
Proceedings of the IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2023

BKRSC-IoT: Blockchain-Based Key Revocation Using Smart Contracts for IoT Networks.
Proceedings of the Management of Digital EcoSystems - 15th International Conference, 2023

A Self-Healing Pairwise Key Pre-Distribution Scheme in IoT-based WSNs.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

IoT Network Attack Detection: Leveraging Graph Learning for Enhanced Security.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
IFKMS: Inverse Function-based Key Management Scheme for IoT networks.
J. Inf. Secur. Appl., 2022

Using Machine Learning in WSNs for Performance Prediction MAC Layer.
Int. J. Inf. Secur. Priv., 2022

Détection d'anomalies dans les flux de graphes et attaques d'empoisonnement.
Proceedings of the Extraction et Gestion des Connaissances, 2022

Taxonomie des attaques sur les méthodes d'apprentissage automatique.
Proceedings of the Business Intelligence & Big Data, 2022

2020
Short Paper: Privacy Comparison of Contact Tracing Mobile Applications for COVID-19.
CoRR, 2020

2019
A Full-Healing Key Distribution Scheme for Resource-Constrained Devices.
Proceedings of the 5th International Conference on Information and Communication Technologies for Disaster Management, 2019

2018
EAHKM+: energy-aware secure clustering scheme in wireless sensor networks.
Int. J. High Perform. Comput. Netw., 2018

2017
A Self-healing Key Pre-distribution Scheme for Multi-phase Wireless Sensor Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

2016
A survey of key management schemes in multi-phase wireless sensor networks.
Comput. Networks, 2016

A Dynamic and Distributed Key Management Scheme for Wireless Sensor Networks.
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016

2015
A lightweight key management scheme for wireless sensor networks.
J. Supercomput., 2015

A New Hierarchical Key Management Scheme for Secure Clustering in Wireless Sensor Networks.
Proceedings of the Wired/Wireless Internet Communications - 13th International Conference, 2015

2014
Classification of Attacks in Wireless Sensor Networks.
CoRR, 2014

2010
Tree Based Protocol for Key Management in Wireless Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2010


  Loading...