Mostafa Azizi

According to our database1, Mostafa Azizi authored at least 36 papers between 1999 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Log Data Integrity Solution based on Blockchain Technology and IPFS.
Int. J. Interact. Mob. Technol., August, 2022

Unsupervised Clustering for 5G Network Planning Assisted by Real Data.
IEEE Access, 2022

2020
Scientific Applications in the Cloud: Resource Optimisation based on Metaheuristics.
Scalable Comput. Pract. Exp., 2020

Measurement-based methodology for modelling the energy consumption of mobile devices.
Int. J. Reason. based Intell. Syst., 2020

Teaching Pedigree Analysis and Risk Calculation for Diagnosis Purposes of Genetic Disease.
Proceedings of the Trends and Innovations in Information Systems and Technologies, 2020

2019
Integration of a quantum scheme for key distribution and authentication within EAP-TLS protocol.
Int. J. Inf. Commun. Technol., 2019

2018
A Novel Approach for an Interoperable Biometric Verification.
Int. J. Interact. Mob. Technol., 2018

Taxonomy on IoT Technologies for Designing Smart Systems.
Int. J. Interact. Mob. Technol., 2018

2017
Enhancing the Security of IEEE 802.11i Standard by Integrating a Quantum Scheme for Authentication and Encryption Key Distribution.
Wirel. Pers. Commun., 2017

El-Security: E-learning Systems Security Checker Plug-in.
Proceedings of the 2nd international Conference on Big Data, Cloud and Applications, 2017

2016
Upgrade of a quantum scheme for authentication and key distribution along with a formal verification based on model checking technique.
Secur. Commun. Networks, 2016

EXPEL Protocol Based Architecture for Cooperative E-Learning.
Int. J. Emerg. Technol. Learn., 2016

A green strategic activity scheduling for UAV networks: A sub-modular game perspective.
IEEE Commun. Mag., 2016

Optimal Beaconing Policy for Tactical Unmanned Aerial Vehicles.
Proceedings of the Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16, Casablanca, Morocco, May 30, 2016

Energy optimization through duty cycling scheduling in mobile social networks: A non-cooperative game theory approach.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

2015
Q-OpenVPN: A New Extension of OpenVPN Based on a Quantum Scheme for Authentication and Key Distribution.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015

Integration and formal security analysis of a quantum key distribution scheme within CHAP protocol.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

Integration of a quantum authenticated key distribution scheme in the EAP-TLS protocol.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

Integration of a quantum protocol for mutual authentication and secret key distribution within 802.11i standard.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

Artificial neural network-based methodology for vulnerabilities detection in EMV cards.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

Side channel analysis techniques towards a methodology for reverse engineering of Java Card byte-code.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

2014
Mobile robot unknown indoor environment exploration using self-localization and grid map building.
Proceedings of the 9th International Conference on Intelligent Systems: Theories and Applications, 2014

Ferry-based architecture for Participatory Sensing.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

2013
Instances of Arabic Cryptography in Morocco II.
Cryptologia, 2013

2012
QGRP: A Novel QoS-Geographic Routing Protocol for Multimedia Wireless Sensor Networks
CoRR, 2012

Modeling Embedded Systems with SysML.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

QDGRP : A hybrid QoS Distributed Genetic routing protocol for Wireless Sensor Networks.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

Detection of smart card attacks using neural networks.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

2011
Instances of Arabic Cryptography in Morocco.
Cryptologia, 2011

2010
Analysis of the Security of BB84 by Model Checking
CoRR, 2010

Improving the Security of CHAP Protocol by Quantum Cryptography.
Proceedings of the Intelligent Distributed Computing IV - Proceedings of the 4th International Symposium on Intelligent Distributed Computing, 2010

2009
Modeling and Analysis of a Real-Time System Using the Networks of Extended Petri.
J. Comput., 2009

2008
Security Oriented Analysis of B92 by Model Checking.
Proceedings of the NTMS 2008, 2008

2002
Concurrent Hardware/Software Coverification with Java Threads.
Proceedings of the 2002 International Conference on Parallel Computing in Electrical Engineering (PARELEC 2002), 2002

2000
Sequential and Distributed Simulations Using Java Threads.
Proceedings of the 2000 International Conference on Parallel Computing in Electrical Engineering (PARELEC 2000), 2000

1999
Multithreading-based Coverification Technique of HW/SW Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999


  Loading...