Authentication protocol for securing internet of things A Maarof, M Senhadji, Z Labbi, M Belkasmi Proceedings of the Fourth International Conference on Engineering & MIS 2018 …, 2018 | 10 | 2018 |
A congestion game-based routing algorithm for communicating vanets A Mabrouk, M Senhadji, A Kobbane, A Walid, E Sabir, MEL Koutbi 2014 International Wireless Communications and Mobile Computing Conference …, 2014 | 8 | 2014 |
Security analysis of low cost RFID systems A Maarof, M Senhadji, Z Labbi, M Belkasmi 2014 5th Workshop on Codes, Cryptography and Communication Systems (WCCCS …, 2014 | 7 | 2014 |
Symmetric encryption algorithm for RFID systems using a dynamic generation of key Z Labbi, M Senhadji, A Maarof, M Belkasmi Int. J. Comput. Sci. Issues 15 (1), 25-33, 2018 | 4 | 2018 |
Gateways’ mobility increases the capacity of communication in VANETs: routing algorithm based on congestion game A Mabrouk, M Senhadji, A Walid, A Kobbane, MEL Koutbi International Review on Computers and Software (IRECOS) 9 (S), 2014 | 4 | 2014 |
A novel mutual authentication scheme for low-cost RFID systems A Maarof, Z Labbi, M Senhadji, M Belkasmi 2016 international conference on wireless networks and mobile communications …, 2016 | 3 | 2016 |
A Survey on Lightweight Cryptography Approach for IoT Devices Security I El Gaabouri, M Senhadji, M Belkasmi 2022 5th International Conference on Networking, Information Systems and …, 2022 | 2 | 2022 |
IoT Smart Homes based on RFID Technology: Localization Systems Review Z Labbi, M Senhadji, A Maarof, M Belkasmi Proceedings of the Fourth International Conference on Engineering & MIS 2018 …, 2018 | 2 | 2018 |
Authentication protocol conforming to EPC class-1 Gen-2 standard A Maarof, M Senhadji, Z Labbi, M Belkasmi 2016 International Conference on Advanced Communication Systems and …, 2016 | 2 | 2016 |
Cryptographic algorithm approach for low cost rfid systems Z Labbi, A Maarof, M Senhadji, M Belkasmi Proceedings of the Mediterranean Conference on Information & Communication …, 2016 | 2 | 2016 |
A Systematic Literature Review on Authentication and Threat Challenges on RFID Based NFC Applications I El Gaabouri, M Senhadji, M Belkasmi, B El Bhiri Future Internet 15 (11), 354, 2023 | 1 | 2023 |
Security in the internet of things A Maarof, M Senhadji, Z Labbi, M Belkasmi Security and Privacy in Smart Sensor Networks, 105-121, 2018 | 1 | 2018 |
A novel efficient ultralightweight authentication algorithm for RFID systems Z Labbi, M Senhadji, A Maarof, M Belkasmi 2016 International Conference on Advanced Communication Systems and …, 2016 | 1 | 2016 |
A Twofold Encryption Scheme to Secure IoT-Based Smart Grid System IEL Gaabouri, M Senhadji, M Belkasmi, BEL Bhiri International Conference on Advanced Technologies for Humanity, 97-104, 2022 | | 2022 |
Cryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag A Maarof, M Senhadji, Z Labbi, M Belkasmi International Journal of Computer Science Issues (IJCSI) 14 (6), 76-84, 2017 | | 2017 |
Hybrid Encryption Approach Using Dynamic Key Generation and Symmetric Key Algorithm for RFID Systems Z Labbi, A Maarof, M Senhadji, M Belkasmi Networked Systems: 4th International Conference, NETYS 2016, Marrakech …, 2016 | | 2016 |
A Survey on Lightweight Cryptography Approach For IoT Devices Security ELG Ismail, M SENHADJI, M BELKASMI | | |