default search action
Mawloud Omar
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Saher Tegane, Khaled Hamouid, Mawloud Omar, Fouzi Semchedine, Abdelmalek Boudries:
Corrigendum to "An extended Attribute-based access control with controlled delegation in IoT" [Journal of Information Systems and Applications 76 (2023) 103473]. J. Inf. Secur. Appl. 82: 103747 (2024) - [j39]Saher Tegane, Khaled Hamouid, Mawloud Omar, Fouzi Semchedine, Abdelmalek Boudries:
Corrigendum to "An extended Attribute-based access control with controlled delegation in IoT" [Journal of Information Systems and Applications 76 (2023) 103473]. J. Inf. Secur. Appl. 83: 103745 (2024) - [j38]Asma Belhadj, Karim Akilal, Siham Bouchelaghem, Mawloud Omar, Sofiane Aissani:
Next-cell prediction with LSTM based on vehicle mobility for 5G mc-IoT slices. Telecommun. Syst. 87(3): 809-833 (2024) - 2023
- [j37]Mohamed Mohammedi, Mawloud Omar, Abdelmadjid Bouabdallah:
Methods for detecting and removing ocular artifacts from EEG signals in drowsy driving warning systems: A survey. Multim. Tools Appl. 82(12): 17687-17714 (2023) - [j36]Mawloud Omar, Abdullah Baz, Hosam Alhakami, Wajdi Alhakami:
Reliable and Secure X2V Energy Trading Framework for Highly Dynamic Connected Electric Vehicles. IEEE Trans. Veh. Technol. 72(7): 8526-8540 (2023) - [j35]Djamila Zamouche, Sofiane Aissani, Mawloud Omar, Mohamed Mohammedi:
Highly efficient approach for discordant BSMs detection in connected vehicles environment. Wirel. Networks 29(1): 189-207 (2023) - [c23]Roumaissa Bekkouche, Mawloud Omar, Rami Langar:
Securing 5G Network Slices with Adaptive Machine Learning Models as-a-Service: A Novel Approach. GLOBECOM 2023: 4754-4759 - 2022
- [j34]Feriel Cherifi, Mawloud Omar, Tinhinane Chenache, Sylia Radji:
Efficient and lightweight protocol for anti-jamming communications in wireless body area networks. Comput. Electr. Eng. 98: 107698 (2022) - [j33]Djamila Zamouche, Mohamed Mohammedi, Sofiane Aissani, Mawloud Omar:
Ultra-safe and reliable enhanced train-centric communication-based train control system. Computing 104(3): 533-552 (2022) - [j32]Mohammed Nafi, Mohamed-Lamine Messai, Samia Bouzefrane, Mawloud Omar:
IFKMS: Inverse Function-based Key Management Scheme for IoT networks. J. Inf. Secur. Appl. 71: 103370 (2022) - [c22]Siham Bouchelaghem, Hakim Boudjelaba, Mawloud Omar, Mourad Amad:
User Mobility Dataset for 5G Networks Based on GPS Geolocation. CAMAD 2022: 128-133 - [c21]Djamila Zamouche, Sofiane Aissani, Kahina Zizi, Lina Bourkeb, Khaled Hamouid, Mawloud Omar:
A Behavioral Modeling-based Driver Authentication Approach for Smart Cars Self-Surveillance. CAMAD 2022: 232-237 - [c20]Roumaissa Bekkouche, Mawloud Omar, Rami Langar, Bechir Hamdaoui:
Ultra-Lightweight and Secure Intrusion Detection System for Massive-IoT Networks. ICC 2022: 5719-5724 - [c19]Djamila Zamouche, Sofiane Aissani, Mawloud Omar, Narimane Saad:
Safety-Oriented Train Control Systems Monitoring in Smart Railway Transportation: A Review. PAIS 2022: 1-8 - 2021
- [j31]Lamia Cheklat, Mourad Amad, Mawloud Omar, Abdellah Boukerram:
CHEARP: Chord-based hierarchical energy-aware routing protocol for wireless sensor networks. Comput. Sci. Inf. Syst. 18(3): 813-834 (2021) - [j30]Feriel Cherifi, Mawloud Omar, Kamal Amroun:
An efficient biometric-based continuous authentication scheme with HMM prehensile movements modeling. J. Inf. Secur. Appl. 57: 102739 (2021) - [j29]Feriel Cherifi, Kamal Amroun, Mawloud Omar:
Robust multimodal biometric authentication on IoT device through ear shape and arm gesture. Multim. Tools Appl. 80(10): 14807-14827 (2021) - [j28]Samia Belattaf, Mohamed Mohammedi, Mawloud Omar, Rachida Aoudjit:
Reliable and Adaptive Distributed Public-Key Management Infrastructure for the Internet of Things. Wirel. Pers. Commun. 120(1): 113-137 (2021) - [j27]Sofiane Aissani, Tarek Fettioune, Nafaa Maizia, Mohamed Mohammedi, Mawloud Omar:
Secure and Efficient Key Exchange Mechanism for Heterogeneous Connected Objects. Wirel. Pers. Commun. 120(4): 2631-2652 (2021) - [j26]Mohamed Mohammedi, Mawloud Omar, Djamila Zamouche, Kahina Louiba, Saliha Ouared, Kenza Hocini:
Energy-aware key management and access control for the Internet of things. World Wide Web 24(4): 1089-1120 (2021) - [c18]Mawloud Omar, Laurent George:
Toward a lightweight machine learning based solution against cyber-intrusions for IoT. LCN 2021: 519-524 - [c17]Khaled Hamouid, Mawloud Omar, Kamel Adi:
A Privacy-Preserving Authentication Model Based on Anonymous Certificates in IoT. WD 2021: 1-6 - 2020
- [j25]Mohammed Nafi, Samia Bouzefrane, Mawloud Omar:
Matrix-based key management scheme for IoT networks. Ad Hoc Networks 97 (2020) - [j24]Siham Bouchelaghem, Mawloud Omar:
Secure and efficient pseudonymization for privacy-preserving vehicular communications in smart cities. Comput. Electr. Eng. 82: 106557 (2020) - [j23]Karim Akilal, Mawloud Omar, Hachem Slimani:
Characterizing and using gullibility, competence, and reciprocity in a very fast and robust trust and distrust inference algorithm for weighted signed social networks. Knowl. Based Syst. 192: 105345 (2020) - [j22]Sofia Zebboudj, Hizia Djoudi, Dalila Lalaoui, Mawloud Omar:
Authenticated semi-quantum key distribution without entanglement. Quantum Inf. Process. 19(3): 77 (2020) - [c16]Siham Bouchelaghem, Abdelmadjid Bouabdallah, Mawloud Omar:
Autonomous Vehicle Security: Literature Review of Real Attack Experiments. CRiSIS 2020: 255-272 - [c15]Walid Arabi, Reda Yaich, Aymen Boudguiga, Mawloud Omar:
Secure Data Processing for Industrial Remote Diagnosis and Maintenance. CRiSIS 2020: 335-346 - [c14]Mohammed Nafi, Samia Bouzefrane, Mawloud Omar:
Efficient and Lightweight Polynomial-Based Key Management Scheme for Dynamic Networks. MSPN 2020: 110-122
2010 – 2019
- 2019
- [j21]Karim Akilal, Hachem Slimani, Mawloud Omar:
A very fast and robust trust inference algorithm in weighted signed social networks using controversy, eclecticism, and reciprocity. Comput. Secur. 83: 68-78 (2019) - [j20]Salah Zemmoudj, Nabila Bermad, Mawloud Omar:
Context-aware pseudonymization and authorization model for IoT-based smart hospitals. J. Ambient Intell. Humaniz. Comput. 10(11): 4473-4490 (2019) - [j19]Karim Akilal, Hachem Slimani, Mawloud Omar:
A robust trust inference algorithm in weighted signed social networks based on collaborative filtering and agreement as a similarity metric. J. Netw. Comput. Appl. 126: 123-132 (2019) - [j18]Nabila Bermad, Salah Zemmoudj, Mawloud Omar:
Context-aware negotiation, reputation and priority traffic light management protocols for VANET-based smart cities. Telecommun. Syst. 72(1): 131-153 (2019) - [j17]Siham Bouchelaghem, Mawloud Omar:
Reliable and Secure Distributed Smart Road Pricing System for Smart Cities. IEEE Trans. Intell. Transp. Syst. 20(5): 1592-1603 (2019) - [c13]Abdelghani Krinah, Yacine Challal, Mawloud Omar, Omar Nouali:
Using ABE for Medical Data Protection in Fog Computing. ICEIS (2) 2019: 155-161 - [c12]Mohamed Mohammedi, Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah:
Cryptanalysis and Improvement of Identity-Based Multisignature Scheme. ICFNDS 2019: 19:1-19:5 - [c11]Karim Akilal, Mawloud Omar, Hachem Slimani:
A wider picture of trust: confronting multi-contextual social traits for trust inference. ICFNDS 2019: 30:1-30:5 - [c10]Salah Zemmoudj, Nabila Bermad, Mawloud Omar:
CA-ADP: Context-Aware Authorization and Delegation Protocol for IoT-based healthcare smart systems. IINTEC 2019: 203-208 - [c9]Nabila Bermad, Salah Zemmoudj, Mawloud Omar:
Reputation based Intelligent Control Protocol. IWCMC 2019: 43-48 - [c8]Salah Zemmoudj, Nabila Bermad, Mawloud Omar:
CAPM: Context-Aware Privacy Model for IoT-Based Smart Hospitals. IWCMC 2019: 1139-1144 - [c7]Nabila Bermad, Salah Zemmoudj, Mawloud Omar:
Securing Vehicular Platooning against Vehicle Platooning Disruption (VPD) Attacks. PEMWN 2019: 1-6 - 2018
- [j16]Mawloud Omar, Imene Belalouache, Samia Amrane, Bournane Abbache:
Efficient and energy-aware key management framework for dynamic sensor networks. Comput. Electr. Eng. 72: 990-1005 (2018) - [j15]Nawel Yessad, Mawloud Omar, Abdelkamel Tari, Abdelmadjid Bouabdallah:
QoS-based routing in Wireless Body Area Networks: a survey and taxonomy. Computing 100(3): 245-275 (2018) - [j14]Sofiane Aissani, Mawloud Omar, Abdelkamel Tari, Feriel Bouakkaz:
µKMS: micro key management system for WSNs. IET Wirel. Sens. Syst. 8(2): 87-97 (2018) - [j13]Nawel Yessad, Mawloud Omar:
Reliable and Efficient Data Communication Protocol for WBAN-Based Healthcare Systems. Int. J. E Health Medical Commun. 9(2): 19-37 (2018) - [j12]Assia Hammamouche, Mawloud Omar, Nabil Djebari, Abdelkamel Tari:
Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET. J. Inf. Secur. Appl. 43: 12-20 (2018) - [j11]Mohamed Mohammedi, Mawloud Omar, Abdelmadjid Bouabdallah:
Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments. J. Ambient Intell. Humaniz. Comput. 9(5): 1527-1539 (2018) - [j10]Sofia Zebboudj, Mawloud Omar:
Deterministic MDI QKD with two secret bits per shared entangled pair. Quantum Inf. Process. 17(3): 43 (2018) - 2017
- [j9]Djoudi Touazi, Mawloud Omar, Abdelhakim Bendib, Abdelmadjid Bouabdallah:
A trust-based approach for securing data communication in delay tolerant networks. Int. J. Inf. Comput. Secur. 9(4): 324-336 (2017) - [j8]Nawel Yessad, Siham Bouchelaghem, Farah-Sarah Ouada, Mawloud Omar:
Secure and reliable patient body motion based authentication approach for medical body area networks. Pervasive Mob. Comput. 42: 351-370 (2017) - [j7]Tiziri Oulhaci, Mawloud Omar, Fatiha Harzine, Ines Harfi:
Secure and distributed certification system architecture for safety message authentication in VANET. Telecommun. Syst. 64(4): 679-694 (2017) - [c6]Nawel Yessad, Farah-Sarah Ouada, Mawloud Omar:
A comprehensive analytical model for QoS-based routing protocols evaluation in WBANs. ICC 2017: 127:1-127:6 - 2016
- [j6]Mawloud Omar, Souraya Yahiaoui, Abdelmadjid Bouabdallah:
Reliable and energy aware query-driven routing protocol for wireless sensor networks. Ann. des Télécommunications 71(1-2): 73-85 (2016) - [j5]Farah-Sarah Ouada, Mawloud Omar, Abdelmadjid Bouabdallah, Abdelkamel Tari:
Lightweight identity-based authentication protocol for wireless sensor networks. Int. J. Inf. Comput. Secur. 8(2): 121-138 (2016) - [j4]Mawloud Omar, Hamida Boufaghes, Lydia Mammeri, Amel Taalba, Abdelkamel Tari:
Secure and reliable certificate chains recovery protocol for mobile ad hoc networks. J. Netw. Comput. Appl. 62: 153-162 (2016) - [j3]Feriel Bouakkaz, Mawloud Omar, Souad Laib, Lilia Guermouz, Abdelkamel Tari, Abdelmadjid Bouabdallah:
Lightweight Sharing Scheme for Data Integrity Protection in WSNs. Wirel. Pers. Commun. 89(1): 211-226 (2016) - [c5]Bournane Abbache, Nadjim Roumila, Sofiane Rezzoug, Mawloud Omar, Abdelkamel Tari:
Collaborative Localization Algorithm based on Constraint Programming. BDAW 2016: 19:1-19:6 - [c4]Farah-Sarah Ouada, Nawel Yessad, Mawloud Omar:
Trust-ticket based authentication scheme for WSN multi-domain applications. BDAW 2016: 23:1-23:6 - [c3]Asma Boudrioua, Souraya Yahiaoui, Mawloud Omar, Abdelmadjid Bouabdallah:
EREAT: Efficient Route Estimation based-on Actuator Tracking for WSANs. BDAW 2016: 27:1-27:5 - 2015
- [c2]Feriel Bouakkaz, Mawloud Omar, Ahcène Bounceur, Abdelkamel Tari:
Secure and efficient sharing aggregation scheme for data protection in WSNs. ISSPIT 2015: 432-437 - 2012
- [j2]Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah:
Certification-based trust models in mobile ad hoc networks: A survey and taxonomy. J. Netw. Comput. Appl. 35(1): 268-286 (2012)
2000 – 2009
- 2009
- [j1]Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah:
Reliable and fully distributed trust model for mobile ad hoc networks. Comput. Secur. 28(3-4): 199-214 (2009) - 2007
- [c1]Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah:
NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography. SecureComm 2007: 2-10
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint