Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Mohamed
    Last name: Hamdi
    DBLP: 91/2937
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 77  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Mohamed Nidhal Mejri, Nadjib Achir, Mohamed Hamdi.
    A new group Diffie-Hellman key generation proposal for secure VANET communications.
    13th IEEE Annual Consumer Communications Networking Conference, CCNC 2016, Las Vegas, NV, USA, January 9-12, 2016 2016 (0) 2016
    Conference paper
    Mohamed Nidhal Mejri, Nadjib Achir, Mohamed Hamdi.
    A new security games based reaction algorithm against DOS attacks in VANETs.
    13th IEEE Annual Consumer Communications Networking Conference, CCNC 2016, Las Vegas, NV, USA, January 9-12, 2016 2016 (0) 2016
    Conference paper
    Nouha Samet, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane.
    Real-Time User Experience Evaluation for Cloud-Based Mobile Video.
    30th International Conference on Advanced Information Networking and Applications Workshops, AINA 2016 Workshops, Crans-Montana, Switzerland, March 23-25, 2016 2016 (0) 2016
    Conference paper
    Haythem Hayouni, Mohamed Hamdi.
    Secure data aggregation with homomorphic primitives in wireless sensor networks: A critical survey and open research issues.
    13th IEEE International Conference on Networking, Sensing, and Control, ICNSC 2016, Mexico City, Mexico, April 28-30, 2016 2016 (0) 2016
    Conference paper
    Haythem Hayouni, Mohamed Hamdi.
    A Novel Algorithm for Securing Data Aggregation in Wireless Sensor Networks.
    Ad-hoc, Mobile, and Wireless Networks - 15th International Conference, ADHOC-NOW 2016, Lille, France, July 4-6, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Manel Medhioub, Mohamed Hamdi, Tai-Hoon Kim.
    A New Authentication Scheme for Cloud-based Storage Applications.
    Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016 2016 (0) 2016
    Conference paper
    Ihsen Nakouri, Mohamed Hamdi, Tai-Hoon Kim.
    Chaotic construction of cryptographic keys based on biometric data.
    International Conference on High Performance Computing Simulation, HPCS 2016, Innsbruck, Austria, July 18-22, 2016 2016 (0) 2016
    Journal article
    Maha Jebalia, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane.
    An overview on coalitional game-theoretic approaches for resource allocation in cloud computing architectures.
    IJCC 2015, Volume 4 (0) 2015
    Conference paper
    Haythem Hayouni, Mohamed Hamdi.
    Energy efficient key management scheme for clustered hierarchical wireless sensor networks.
    12th IEEE International Conference on Networking, Sensing and Control, ICNSC 2015, Taipei, Taiwan, April 9-11, 2015 2015 (0) 2015
    Conference paper
    Zohir Irki, Abdelatif Oussar, Mohamed Hamdi, Fatah Seddi.
    A fuzzy UV-disparity based approach for following a leader mobile robot.
    International Conference on Advanced Robotics, ICAR 2015, Istanbul, Turkey, July 27-31, 2015 2015 (0) 2015
    Conference paper
    Nouha Samet, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane.
    Toward Quality of Experience models of cloud-based mobile services.
    International Wireless Communications and Mobile Computing Conference, IWCMC 2015, Dubrovnik, Croatia, August 24-28, 2015 2015 (0) 2015
    Conference paper
    Haythem Hayouni, Mohamed Hamdi, Tai-Hoon Kim.
    A novel efficient approach for protecting integrity of data aggregation in wireless sensor networks.
    International Wireless Communications and Mobile Computing Conference, IWCMC 2015, Dubrovnik, Croatia, August 24-28, 2015 2015 (0) 2015
    Conference paper
    Mohamed Nidhal Mejri, Mohamed Hamdi.
    Recent advances in cryptographic solutions for vehicular networks.
    International Symposium on Networks, Computers and Communications, ISNCC 2015, Yasmine Hammamet, Tunisia, May 13-15, 2015 2015 (0) 2015
    Conference paper
    Boutheina A. Fessi, Salah Benabdallah, Noureddine Boudriga, Mohamed Hamdi.
    A multi-attribute decision model for intrusion response system.
    Inf. Sci. 2014, Volume 270 (0) 2014
    Conference paper
    Mohamed Hamdi, Habtamu Abie.
    Game-based adaptive security in the Internet of Things for eHealth.
    IEEE International Conference on Communications, ICC 2014, Sydney, Australia, June 10-14, 2014 2014 (0) 2014
    Conference paper
    Maha Jebalia, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane.
    A revocation game model for secure cloud storage.
    International Conference on High Performance Computing Simulation, HPCS 2014, Bologna, Italy, 21-25 July, 2014 2014 (0) 2014
    Journal article
    Mohamed Nidhal Mejri, Jalel Ben-Othman, Mohamed Hamdi.
    Survey on VANET security challenges and possible cryptographic solutions.
    Vehicular Communications 2014, Volume 1 (0) 2014
    Conference paper
    Maha Jebalia, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane.
    A Novel Approach for Fair and Secure Resource Allocation in Storage Cloud Architectures Based on DRF Mechanism.
    2014 IEEE International Conference on High Performance Computing and Communications, 6th IEEE International Symposium on Cyberspace Safety and Security, 11th IEEE International Conference on Embedded Software and Systems, HPCC/CSS/ICESS 2014, Paris, Franc 2014 (0) 2014
    Conference paper
    Maha Jebalia, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane.
    A Coalitional Game-Theoretic Approach for QoS-Based and Secure Data Storage in Cloud Environment.
    2014 IEEE International Conference on High Performance Computing and Communications, 6th IEEE International Symposium on Cyberspace Safety and Security, 11th IEEE International Conference on Embedded Software and Systems, HPCC/CSS/ICESS 2014, Paris, Franc 2014 (0) 2014
    Conference paper
    Nouha Samet, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane.
    Forensic investigation in Mobile Cloud environment.
    The International Symposium on Networks, Computers and Communications, ISNCC 2014, Hammamet, Tunisia, June 17-19, 2014 2014 (0) 2014
    Conference paper
    Maha Jebalia, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane.
    A Comparative Study on Game Theoretic Approaches for Resource Allocation in Cloud Computing Architectures.
    2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Hammamet, Tunisia, June 17-20, 2013 2013 (0) 2013
    Conference paper
    Stefan Poslad, Mohamed Hamdi, Habtamu Abie.
    Adaptive security and privacy management for the internet of things (ASPI 2013).
    The 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '13, Zurich, Switzerland, September 8-12, 2013 - Adjunct Publication 2013 (0) 2013
    Conference paper
    Mohamed Hamdi.
    Secure cooperative physical-layer coding for the internet of things.
    Proceedings of the International Workshop on Adaptive Security, ASPI@UbiComp 2013, Zurich, Switzerland, September 8, 2013 2013 (0) 2013
    Conference paper
    Yared Berhanu, Habtamu Abie, Mohamed Hamdi.
    A testbed for adaptive security for IoT in eHealth.
    Proceedings of the International Workshop on Adaptive Security, ASPI@UbiComp 2013, Zurich, Switzerland, September 8, 2013 2013 (0) 2013
    Conference paper
    Mohamed Hamdi.
    Security of cloud computing, storage, and networking.
    2012 International Conference on Collaboration Technologies and Systems, CTS 2012, Denver, CO, USA, May 21-25, 2012 2012 (0) 2012
    Show item 1 to 25 of 77  

    Your query returned 77 matches in the database.