Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Mohamed
    Last name: Hamdi
    DBLP: 91/2937
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 77  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Mohamed Nidhal Mejri, Nadjib Achir, Mohamed Hamdi.
    A new group Diffie-Hellman key generation proposal for secure VANET communications.
    13th IEEE Annual Consumer Communications Networking Conference, CCNC 2016, Las Vegas, NV, USA, January 9-12, 2016 2016 (0) 2016
    Conference paper
    Mohamed Nidhal Mejri, Nadjib Achir, Mohamed Hamdi.
    A new security games based reaction algorithm against DOS attacks in VANETs.
    13th IEEE Annual Consumer Communications Networking Conference, CCNC 2016, Las Vegas, NV, USA, January 9-12, 2016 2016 (0) 2016
    Conference paper
    Nouha Samet, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane.
    Real-Time User Experience Evaluation for Cloud-Based Mobile Video.
    30th International Conference on Advanced Information Networking and Applications Workshops, AINA 2016 Workshops, Crans-Montana, Switzerland, March 23-25, 2016 2016 (0) 2016
    Conference paper
    Haythem Hayouni, Mohamed Hamdi.
    Secure data aggregation with homomorphic primitives in wireless sensor networks: A critical survey and open research issues.
    13th IEEE International Conference on Networking, Sensing, and Control, ICNSC 2016, Mexico City, Mexico, April 28-30, 2016 2016 (0) 2016
    Conference paper
    Haythem Hayouni, Mohamed Hamdi.
    A Novel Algorithm for Securing Data Aggregation in Wireless Sensor Networks.
    Ad-hoc, Mobile, and Wireless Networks - 15th International Conference, ADHOC-NOW 2016, Lille, France, July 4-6, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Manel Medhioub, Mohamed Hamdi, Tai-Hoon Kim.
    A New Authentication Scheme for Cloud-based Storage Applications.
    Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016 2016 (0) 2016
    Conference paper
    Ihsen Nakouri, Mohamed Hamdi, Tai-Hoon Kim.
    Chaotic construction of cryptographic keys based on biometric data.
    International Conference on High Performance Computing Simulation, HPCS 2016, Innsbruck, Austria, July 18-22, 2016 2016 (0) 2016
    Journal article
    Maha Jebalia, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane.
    An overview on coalitional game-theoretic approaches for resource allocation in cloud computing architectures.
    IJCC 2015, Volume 4 (0) 2015
    Conference paper
    Haythem Hayouni, Mohamed Hamdi.
    Energy efficient key management scheme for clustered hierarchical wireless sensor networks.
    12th IEEE International Conference on Networking, Sensing and Control, ICNSC 2015, Taipei, Taiwan, April 9-11, 2015 2015 (0) 2015
    Conference paper
    Zohir Irki, Abdelatif Oussar, Mohamed Hamdi, Fatah Seddi.
    A fuzzy UV-disparity based approach for following a leader mobile robot.
    International Conference on Advanced Robotics, ICAR 2015, Istanbul, Turkey, July 27-31, 2015 2015 (0) 2015
    Show item 1 to 10 of 77  

    Your query returned 77 matches in the database.