logo EDITE Mohamed ABID
Identité
Mohamed ABID
État académique
Thèse soutenue le 2011-02-01
Sujet: A User Identity Based Authentication Mechanisms for Network Security Enhancement
Direction de thèse:
Laboratoire:
Voisinage
Ellipse bleue: doctorant, ellipse jaune: docteur, rectangle vert: permanent, rectangle jaune: HDR. Trait vert: encadrant de thèse, trait bleu: directeur de thèse, pointillé: jury d'évaluation à mi-parcours ou jury de thèse.
Productions scientifiques
oai:hal.archives-ouvertes.fr:hal-00626733
Performance Evaluation of an Authentication Solution for IMS Services Access
, special issue of "Wireless and Network Security" in Telecommunication System journalnon peer-reviewed article 2011
oai:hal.archives-ouvertes.fr:hal-00629918
A new method to improve Network Selection
Proceeding of The 2nd Joint Conference on Security in Network Architectures and Information Systems (SAR-SSI'07) The 2nd Joint Conference on Security in Network Architectures and Information Systems (SAR-SSI'07)proceeding with peer review 2007
oai:hal.archives-ouvertes.fr:hal-00629922
Secure E-passport Protocol using Elliptic Curve Diffie-Hellman Key Agreement Protocol
Proceeding of The Fourth International Conference on Information Assurance and Security (IAS 2008) (IEEE) The Fourth International Conference on Information Assurance and Security (IAS 2008)proceeding with peer review 2008-09
oai:hal.archives-ouvertes.fr:hal-00629924
Iris Based Authentication Mechanism for e‑Passports
Proceeding of the 2nd International Workshop on Security and Communication Networks (IWSCN 2010) The 2nd International Workshop on Security and Communication Networks (IWSCN 2010)proceeding with peer review 2010-05
oai:hal.archives-ouvertes.fr:hal-00629920
Fuzzy Biometric Authentication in Home Networks for Personalized Users' Access
Proceeding of the 15th International Conference on Telecommunications (ICT 2008) (IEEE)15th International Conference on Telecommunications (ICT 2008)proceeding with peer review 2008
oai:hal.archives-ouvertes.fr:hal-00629923
Efficient Identity-Based Authentication for IMS based Services Access
Proceeding of the 7th International Conference on Advances in Mobile Computing and Multimedia (MoMM2009) the 7th International Conference on Advances in Mobile Computing and Multimedia (MoMM2009)proceeding with peer review 2009-12
oai:hal.archives-ouvertes.fr:hal-00626730
Towards a secure E-passport protocol based on biometrics
Journal of Information Assurance and Security (JIAS), Special Issue on Access Control and Protcolspeer-reviewed article 2009
oai:hal.archives-ouvertes.fr:hal-00626731
Integrating Identity-Based Cryptography in IMS Service Authentication
International journal of network security & its applications (IJNSA)non peer-reviewed article 2009
oai:hal.archives-ouvertes.fr:hal-00626732
Access Control to Objects and their Description in the Future Network of Information
Journal of Information Processing Systems (JIPS)non peer-reviewed article 2010
oai:hal.archives-ouvertes.fr:hal-00629925
Video Streaming Security: Window-Based Hash Chain Signature Combines With Redundancy Code
Proceeding of the IEEE International Symposium on Multimedia (ISM2010) The IEEE International Symposium on Multimedia (ISM2010)proceeding with peer review 2010-12
oai:hal.archives-ouvertes.fr:hal-00629927
Un nouveau protocole sécurisé pour les passeports biométriques
Workshop Interdisciplinaire sur la Sécurité Globale (WISG'10)proceeding, seminar, workshop without peer review 2010-01-26
oai:hal.archives-ouvertes.fr:hal-00447552
Toward a security model for the future network of information
The Future Internet that includes Real World Objects and the Internet of Things together with the more classic web pages will move communications from a node-centric organization to an information-centric network allowing new paradigm to take place. The 4WARD project initiated some works on the Future Internet. One of them is the creation of a Network of Information designed to enable more powerful semantic searches. This article presents a solution to secure the access and management of both objects and their metadata.
. IWUCA '09 : International Workshop on Ubiquitous Computing & Applications, Workshop of ICUT 2009proceeding with peer review 2009
TELECOM_BRETAGNE-9793
Access control to objects and their description in the future network of information
JIPS : Journal of Information Processing Systems, Vol. 6, No. 3, pp. 359 -- 374 2010-09
Soutenance
Thèse: DES MECANISMES D'AUTHENTIFICATION BASES SUR L'IDENTITE DE L'UTILISATEUR POUR RENFORCER LA SECURITE DES RESEAUX
Soutenance: 2011-02-01