M2M security: Challenges and solutions A Barki, A Bouabdallah, S Gharout, J Traore IEEE Communications Surveys & Tutorials 18 (2), 1241-1254, 2016 | 150 | 2016 |
Trusted execution environments: A look under the hood G Arfaoui, S Gharout, J Traoré 2014 2nd IEEE international conference on mobile cloud computing, services …, 2014 | 51 | 2014 |
Trusted platform module as an enabler for security in cloud computing M Achemlal, S Gharout, C Gaber 2011 Conference on Network and Information Systems Security, 1-6, 2011 | 45 | 2011 |
A practical set-membership proof for privacy-preserving NFC mobile ticketing G Arfaoui, JF Lalande, J Traoré, N Desmoulins, P Berthomé, S Gharout arXiv preprint arXiv:1505.03048, 2015 | 43 | 2015 |
Adaptive clustering for scalable key management in dynamic group communications Y Challal, S Gharout, A Bouabdallah, H Bettahar International Journal of Security and Networks 3 (2), 133-146, 2008 | 29 | 2008 |
Designing and proving an EMV-compliant payment protocol for mobile devices V Cortier, A Filipiak, J Florent, S Gharout, J Traoré 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 467-480, 2017 | 28 | 2017 |
Key management with host mobility in dynamic groups S Gharout, A Bouabdallah, M Kellil, Y Challal Proceedings of the 3rd international conference on Security of information …, 2010 | 25 | 2010 |
Adaptive group key management protocol for wireless communications S Gharout, A Bouabdallah, Y Challal, M Achemlal Journal of Universal Computer Science 18 (6), 874-899, 2012 | 24 | 2012 |
Anonymous attestations made practical A Barki, N Desmoulins, S Gharout, J Traoré Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017 | 16 | 2017 |
Scalable delay-constrained multicast group key management S Gharout, Y Challal, A Bouabdallah International Journal of Network Security 7 (2), 142-156, 2008 | 15 | 2008 |
S-DV: a new approach to Secure Distance Vector routing protocols A Babakhouya, Y Challal, A Bouabdallah, S Gharout 2006 Securecomm and Workshops, 1-10, 2006 | 14 | 2006 |
Solving partitioning problem in codesign with ant colonies M Koudil, K Benatchba, S Gharout, N Hamani International Work-Conference on the Interplay Between Natural and …, 2005 | 13 | 2005 |
Using ant colonies to solve data-mining problems L Admane, K Benatchba, M Koudil, M Drias, S Gharout, N Hamani 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat …, 2004 | 11 | 2004 |
Private eCash in practice (short paper) A Barki, S Brunet, N Desmoulins, S Gambs, S Gharout, J Traoré Financial Cryptography and Data Security: 20th International Conference, FC …, 2017 | 10 | 2017 |
Practical and privacy-preserving TEE migration G Arfaoui, S Gharout, JF Lalande, J Traoré Information Security Theory and Practice: 9th IFIP WG 11.2 International …, 2015 | 9 | 2015 |
Scenario requirements M Achemlal, S Gharout, C Gaber, M Llanes, E Prieto, R Diaz, L Coppolino, ... Bericht, MASSIF FP7-257475, 2011 | 7 | 2011 |
Method for anonymously identifying a security module A Barki, S Gharout, J Traore, L Coureau US Patent 11,051,162, 2021 | 6 | 2021 |
Scenario requirements (public version) M Llanes, E Prieto, R Diaz, L Coppolino, A Sergio, R Cristaldi, ... FP7-257475 MASSIF European project, Tech. Rep, 2011 | 6 | 2011 |
Method for obtaining a security token by a mobile terminal A Filipiak, S Gharout, J Traore, V Cortier US Patent 11,922,384, 2024 | 5 | 2024 |
Application of satisfiability algorithms to time-table problems F NADER, M KOUDIL, K BENATCHBA, L ADMANE, S GHAROUT, ... Rapport Interne LMCS, INI, 2004 | 3 | 2004 |