Narjes Ben Rajeb

According to our database1, Narjes Ben Rajeb authored at least 15 papers between 1997 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Distributed Multi-key Generation Protocol with a New Complaint Management Strategy.
Proceedings of the Information Systems, 2022

2021
Resource consumption trade-off for reducing hotspot migration in modern data centres.
Int. J. Grid Util. Comput., 2021

2018
A secure electronic voting protocol with a simple ballot's encryption function.
Int. J. Secur. Networks, 2018

2017
Formal Analyze of a Private Access Control Protocol to a Cloud Storage.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Incoercible Fully-Remote Electronic Voting Protocol.
Proceedings of the Networked Systems - 5th International Conference, 2017

2016
Distributed key generation protocol with a new complaint management strategy.
Secur. Commun. Networks, 2016

Co-location Resistant Strategy with Full Resources Optimization.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

2015
Symbolic Search of Insider Attack Scenarios from a Formal Information System Modeling.
Trans. Petri Nets Other Model. Concurr., 2015

2014
Extraction of Insider Attack Scenarios from a Formal Information System Modeling.
Proceedings of the Formal Methods for Security Workshop co-located with the PetriNets-2014 Conference , 2014

2013
Formal Verification of Secrecy, Coercion Resistance and Verifiability Properties for a Remote Electronic Voting Protocol.
Int. J. Inf. Secur. Priv., 2013

2011
Deciding knowledge in security protocols under some e-voting theories.
RAIRO Theor. Informatics Appl., 2011

2010
Linking Algebraic Observational Equivalence and Bisimulation.
Proceedings of the Developments in Language Theory, 14th International Conference, 2010

Towards Practical and Secure Coercion-Resistant Electronic Elections.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

2009
Verifying Multithreaded Recursive Programs with Integer Variables.
Proceedings of the Joint Proceedings of the 8th, 2009

1997
Preuves par induction implicite: cas des théories associatives-commutatives et observationnelles. (Proofs by implicit induction: case of associative-commutative and observational theories).
PhD thesis, 1997


  Loading...