Mouhcine Guennoun

According to our database1, Mouhcine Guennoun authored at least 33 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Efficient BGP Intrusion Detection Model Using Machine Learning: A Comparative Study with AdaBoost as the Optimal Classifier.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2023

2021
CPC-H2: Convolution Power-based Cryptosystem and Digital Signature.
Proceedings of the 34th IEEE Canadian Conference on Electrical and Computer Engineering, 2021

2020
Scalable Path Computation Element (SPCE).
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2020

PMTRU: An Efficient and Resistant Variant of the NTRU Public Key Cryptosystem.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2020

2016
Big Data Analytics: Security and privacy challenges.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Blind decryption for cloud computing.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

A Review of Intrusion Detection in 802.15.4-Based Wireless Sensor Networks.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Wormhole Detection in Secured BGP Networks.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Security analysis of C-BGP: A light alternative to S-BGP.
Proceedings of the 2016 IEEE Canadian Conference on Electrical and Computer Engineering, 2016

Blind forwarding for secure and private communications in untrusted networks.
Proceedings of the 2016 IEEE Canadian Conference on Electrical and Computer Engineering, 2016

2015
An Encrypted Trust-Based Routing Protocol.
CoRR, 2015

On the use of homomorphic encryption to secure cloud computing, services, and routing protocols.
CoRR, 2015

A Secure Database System using Homomorphic Encryption Schemes.
CoRR, 2015

Modeling of variable Clear Channel Assessment MAC protocol for Wireless Sensor Networks.
Comput. Commun., 2015

Performance analysis of private information retrieval scheme based on homomorphic encryption.
Proceedings of the 5th International Conference on Information & Communication Technology and Accessibility, 2015

2014
A Survey of Beacon-Enabled IEEE 802.15.4 MAC Protocols in Wireless Sensor Networks.
IEEE Commun. Surv. Tutorials, 2014

Private Video Streaming Service Using Leveled Somewhat Homomorphic Encryption.
Proceedings of the Tenth International Conference on Signal-Image Technology and Internet-Based Systems, 2014

Semi-persistent CSMA/CA for efficient and reliable communication in Wireless Sensor Networks.
Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering, 2014

2013
Infrastructure Logicielle d un Environnement Hospitalier Intelligent.
CoRR, 2013

2012
Privacy Preserving Scheme for Location-Based Services.
J. Information Security, 2012

A fully private video on-Demand service.
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012

2011
Extending Beacon-Enabled IEEE 802.15.4 to Achieve Efficient Energy Savings: Simulation-Based Performance Analysis.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Intrusion detection in WSN-based intelligent transportation systems.
Proceedings of the first ACM international symposium on Design and analysis of intelligent vehicular networks and applications, 2011

Analysis of impact of trust on Secure Border Gateway Protocol.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

Encrypted processes for oblivious data retrieval.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Adaptive Sleeping Periods in IEEE 802.15.4 for Efficient Energy Savings: Markov-Based Theoretical Analysis.
Proceedings of IEEE International Conference on Communications, 2011

An Efficient Adaptive Backoff Algorithm for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

2010
Intrusion Detection System for WSN-Based Intelligent Transportation Systems.
Proceedings of the Global Communications Conference, 2010

Credible-BGP: A Hybrid Cryptosystem to Secure BGP.
Proceedings of the Global Communications Conference, 2010

Clustering Relational Database Entities Using K-means.
Proceedings of the Second International Conference on Advances in Databases, 2010

2009
WSN Architectures for Intelligent Transportation Systems.
Proceedings of the NTMS 2009, 2009

2008
Wireless networks security: Proof of chopchop attack.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Biometric Identification System Based on Electrocardiogram Data.
Proceedings of the NTMS 2008, 2008


  Loading...