Mustapha Benssalah

Orcid: 0000-0002-3654-4531

According to our database1, Mustapha Benssalah authored at least 19 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Fast and efficient variational method based on G<sup>0</sup> distribution for SAR image despeckling.
Multim. Tools Appl., February, 2023

An efficient FPGA-based implementation of UWB radar system for through-wall imaging.
Int. J. Commun. Syst., 2023

On the Security of the Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

2021
An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things.
Wirel. Pers. Commun., 2021

An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography.
Multim. Tools Appl., 2021

Simultaneous localization and mapping navigation of unmanned ground vehicle based on second-order smooth variable structure filter with improved technique to combat fading for advanced wireless communications.
J. Syst. Control. Eng., 2021

Real-time FPGA implementation of a secure chaos-based digital crypto-watermarking system in the DWT domain using co-design approach.
J. Real Time Image Process., 2021

An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment.
J. Inf. Secur. Appl., 2021

A robust auto-adaptive approach for serial acquisition of generalized multi-carrier spread spectrum in multipath fading mobile channels.
Int. J. Commun. Syst., 2021

2020
An efficient and lightweight multi-scroll chaos-based hardware solution for protecting fingerprint biometric templates.
Int. J. Commun. Syst., 2020

2018
A cooperative Bayesian and lower bound estimation in dynamic framed slotted ALOHA algorithm for RFID systems.
Int. J. Commun. Syst., 2018

A Secure RFID Authentication Scheme for Healthcare Environments Based on Digital Signature Algorithm.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018

2017
Security Analysis and Enhancement of the Most Recent RFID Authentication Protocol for Telecare Medicine Information System.
Wirel. Pers. Commun., 2017

A provably secure RFID authentication protocol based on elliptic curve signature with message recovery suitable for m-Health environments.
Trans. Emerg. Telecommun. Technol., 2017

2016
Towards a complete chaotic map-based mobile RFID authentication protocol with efficient anticollision tag indexing.
Secur. Commun. Networks, 2016

Dual cooperative RFID-telecare medicine information system authentication protocol for healthcare environments.
Secur. Commun. Networks, 2016

2015
Pseudo-random sequence generator based on random selection of an elliptic curve.
Proceedings of the International Conference on Computer, 2015

2014
Security enhancement of the authenticated RFID security mechanism based on chaotic maps.
Secur. Commun. Networks, 2014

2012
RFID authentication protocols based on ECC encryption schemes.
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012


  Loading...