Nouha Oualha

Orcid: 0000-0002-4173-4831

According to our database1, Nouha Oualha authored at least 26 papers between 2007 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
USEIT Project: Empowering the Users to Protect Their Data.
Proceedings of the Security and Privacy in the Internet of Things: Challenges and Solutions, 2019

An Intrusion Detection and Response Scheme for CP-ABE-Encrypted IoT Networks.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Real-Time Dynamic Security for ProSe in 5G.
Proceedings of the 2nd International Conference on Signal Processing and Information Security, 2019

2018
Securely outsourcing the ciphertext-policy attribute-based encryption.
World Wide Web, 2018

Reinforcing IoT-Enforced Security Policies.
Proceedings of the 17th IEEE International Conference On Trust, 2018

An Energy Model for the IoT: Secure Networking Perspective.
Proceedings of the 29th IEEE Annual International Symposium on Personal, 2018

2017
Security establishment for IoT environments in 5G: Direct MTC-UE communications.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

2016
Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY.
Proceedings of the Information Security Theory and Practice, 2016

Lightweight Attribute-Based Encryption for the Internet of Things.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Authenticated Key Agreement Mediated by a Proxy Re-encryptor for the Internet of Things.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
Survey on secure communication protocols for the Internet of Things.
Ad Hoc Networks, 2015

Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2013
Server Assisted Key Establishment for WSN: A MIKEY-Ticket Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Pseudonymous communications in secure industrial wireless sensor networks.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

2012
Verifying remote data integrity in peer-to-peer data storage: A comprehensive survey of protocols.
Peer-to-Peer Netw. Appl., 2012

Challenges and Current Results of the TWISNet FP7 Project - (Extended Abstract).
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

AAA-based infrastructure for industrial wireless sensor networks.
Proceedings of the 2012 Future Network & Mobile Summit, Berlin, Germany, July 4-6, 2012, 2012

2011
A Trustworthy Architecture for Wireless Industrial Sensor Networks: Research Roadmap of EU TWISNet Trust and Security Project.
Proceedings of the First SysSec Workshop 2011, 2011

2010
Secure P2P Data Storage and Maintenance.
Int. J. Digit. Multim. Broadcast., 2010

Securing P2P Storage with a Self-organizing Payment Scheme.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

2009
A Game Theoretical Approach in Securing P2P Storage against Whitewashers.
Proceedings of the 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2009

2008
Reputation and Audits for Self-Organizing Storage.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

A Security Protocol for Self-Organizing Data Storage.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Validating Peer-to-Peer Storage Audits with Evolutionary Game Theory.
Proceedings of the Self-Organizing Systems, Third International Workshop, 2008

2007
Securing Ad Hoc Storage through Probabilistic Cooperation Assessment.
Proceedings of theThird Workshop on Cryptography for Ad-hoc Networks, 2007

A Game Theoretic Model of a Protocol for Data Possession Verification.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007


  Loading...