Said Gharout

According to our database1, Said Gharout authored at least 16 papers between 2004 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Separate session key generation approach for network and application flows in LoRaWAN.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

2018
Questioning the security and efficiency of the ESIoT approach.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

2017
Anonymous attestations made practical.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Designing and Proving an EMV-Compliant Payment Protocol for Mobile Devices.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
M2M Security: Challenges and Solutions.
IEEE Commun. Surv. Tutorials, 2016

Private eCash in Practice (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

2015
A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing.
Proc. Priv. Enhancing Technol., 2015

Practical and Privacy-Preserving TEE Migration.
Proceedings of the Information Security Theory and Practice, 2015

2014
Trusted Execution Environments: A Look under the Hood.
Proceedings of the 2nd IEEE International Conference on Mobile Cloud Computing, 2014

2012
Adaptive Group Key Management Protocol for Wireless Communications.
J. Univers. Comput. Sci., 2012

2010
Key management with host mobility in dynamic groups.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

2008
Adaptive clustering for scalable key management in dynamic group communications.
Int. J. Secur. Networks, 2008

Scalable Delay-constrained Multicast Group Key Management.
Int. J. Netw. Secur., 2008

2006
S-DV: A new approach to Secure Distance Vector routing protocols.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

2005
Solving Partitioning Problem in Codesign with Ant Colonies.
Proceedings of the Artificial Intelligence and Knowledge Engineering Applications: A Bioinspired Approach: First International Work-Conference on the Interplay Between Natural and Artificial Computation, 2005

2004
Using ant colonies to solve data-mining problems.
Proceedings of the IEEE International Conference on Systems, 2004


  Loading...