Mustapha Hedabou

Orcid: 0000-0002-7872-4469

According to our database1, Mustapha Hedabou authored at least 29 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A secure and lightweight container migration technique in cloud computing.
J. King Saud Univ. Comput. Inf. Sci., January, 2024

2023
An Efficient Machine Learning-Based Resource Allocation Scheme for SDN-Enabled Fog Computing Environment.
IEEE Trans. Veh. Technol., June, 2023

Machine Learning Analytic-Based Two-Staged Data Management Framework for Internet of Things.
Sensors, March, 2023

Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT.
IEEE J. Biomed. Health Informatics, February, 2023

Blockchain-inspired lightweight trust-based system in vehicular networks.
Int. J. Netw. Manag., 2023

Decentralized SGX-Based Cloud Key Management.
Proceedings of the Network and System Security - 17th International Conference, 2023

Blockchain and Dew Computing-based Model for Secure Energy Trading in Smart Grids.
Proceedings of the IEEE International Conference on Communications, 2023

2022
Security and Privacy in Cloud Computing: Technical Review.
Future Internet, 2022

An Uncertainty Trust Assessment Scheme for Trustworthy Partner Selection in Online Games.
IEEE Access, 2022

A Survey on Soybean Seed Varieties and Defects Identification Using Neural Network.
Proceedings of the Workshop on Advances in Computational Intelligence, 2022

2021
Robust and effective image preprocessing conglomerate method for denoising of both grayscale and color images.
J. Electronic Imaging, 2021

Decentralized Data Integrity Scheme for Preserving Privacy in Cloud Computing.
Proceedings of the 2021 International Conference on Security, 2021

Cloud Key Management using Trusted Execution Environment.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Cloud Key Management Based on Verifiable Secret Sharing.
Proceedings of the Network and System Security - 15th International Conference, 2021

2020
Efficient and Secure Implementation of BLS Multisignature Scheme on TPM.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

2019
An IBE-based design for assured deletion in cloud storage.
Cryptologia, 2019

TPM Based Schema for Reinforcing Security in IBE's Key Manager.
Proceedings of the New Trends in Model and Data Engineering, 2019

2018
CS-IBE: A Data Confidentiality System in Public Cloud Storage System.
Proceedings of the 9th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2018) / The 8th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2018) / Affiliated Workshops, 2018

2017
CDT to Detect Co-residence in Cloud Computing.
Proceedings of the Innovations in Smart Cities and Applications, 2017

2016
Many-to-one matching game towards secure virtual machines migration in cloud computing.
Proceedings of the International Conference on Advanced Communication Systems and Information Security, 2016

2015
Applying Encryption Algorithm for Data Security in Cloud Storage.
Proceedings of the Advances in Ubiquitous Networking, 2015

An efficient algorithm for data security in Cloud storage.
Proceedings of the 15th International Conference on Intelligent Systems Design and Applications, 2015

An electronic voting system based on homomorphic encryption and prime numbers.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

2012
Efficient Countermeasure for Securing the Eta Pairing Computation over Binary Fields.
Int. J. Netw. Secur., 2012

Securing pairing-based cryptography on smartcards.
Int. J. Inf. Comput. Secur., 2012

2006
A Frobenius Map Approach for an Efficient and Secure Multiplication on Koblitz.
Int. J. Netw. Secur., 2006

2005
Countermeasures for Preventing Comb Method Against SCA Attacks.
Proceedings of the Information Security Practice and Experience, 2005

Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods.
Proceedings of the Cryptography and Coding, 2005

2004
A comb method to render ECC resistant against Side Channel Attacks.
IACR Cryptol. ePrint Arch., 2004


  Loading...