default search action
Yahya Benkaouz
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Imane El Abid, Yahya Benkaouz:
A Comparative Analysis of Blockchain Redaction Techniques. DAPPS 2024: 93-102 - 2023
- [c23]Jaouhara Bouamama, Yahya Benkaouz, Mohammed Ouzzif:
EdgeSA: Secure Aggregation for Privacy-Preserving Federated Learning in Edge Computing. DASC/PiCom/CBDCom/CyberSciTech 2023: 375-382 - [c22]Yunusa Simpa Abdulsalam, Jaouhara Bouamama, Yahya Benkaouz, Mustapha Hedabou:
Decentralized SGX-Based Cloud Key Management. NSS 2023: 327-341 - 2021
- [c21]Imane El Abid, Yahya Benkaouz:
LighTx: a lightweight transactions transfer system. IEEE ICBC 2021: 1-3 - [c20]Imane El Abid, Yahya Benkaouz, Ahmed Khoumsi:
LighTx: A Lightweight Proof-of-Bandwidth Transactions Transfer System. NETYS 2021: 144-160 - 2020
- [c19]Maryem Ait El Hadj, Ahmed Khoumsi, Yahya Benkaouz, Mohammed Erradi:
A Log-Based Method to Detect and Resolve Efficiently Conflicts in Access Control Policies. SoCPaR 2020: 836-846 - [c18]Karim Boubouh, Amine Boussetta, Yahya Benkaouz, Rachid Guerraoui:
Robust P2P Personalized Learning. SRDS 2020: 299-308 - [c17]Youssef Aamer, Yahya Benkaouz, Mohammed Ouzzif, Khalid Bouragba:
A new approach for increasing K-nearest neighbors performance. WINCOM 2020: 1-5
2010 – 2019
- 2019
- [j3]Yahya Benkaouz, Mohammed Erradi:
Special issue on NETYS'17 selected papers. Computing 101(9): 1305 (2019) - [c16]Maryem Ait El Hadj, Ahmed Khoumsi, Yahya Benkaouz, Mohammed Erradi:
Efficient Security Policy Management Using Suspicious Rules Through Access Log Analysis. NETYS 2019: 250-266 - [c15]Youssef Aamer, Yahya Benkaouz, Mohammed Ouzzif, Khalid Bouragba:
Initial Centroid Selection Method for an Enhanced K-means Clustering Algorithm. UNet 2019: 182-190 - 2018
- [j2]Maryem Ait El Hadj, Ahmed Khoumsi, Yahya Benkaouz, Mohammed Erradi:
Formal Approach to Detect and Resolve Anomalies while Clustering ABAC Policies. EAI Endorsed Trans. Security Safety 5(16): e3 (2018) - [c14]Maryem Ait El Hadj, Mohammed Erradi, Ahmed Khoumsi, Yahya Benkaouz:
Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach. IEEE BigData 2018: 5330-5332 - 2017
- [c13]Mohamed Amine Madani, Mohammed Erradi, Yahya Benkaouz:
ABAC Based Online Collaborations in the Cloud. AFRICATEK 2017: 67-76 - [c12]Maryem Ait El Hadj, Yahya Benkaouz, Ahmed Khoumsi, Mohammed Erradi:
Access Domain-Based Approach for Anomaly Detection and Resolution in XACML Policies. IBICA 2017: 298-308 - [c11]Maryem Ait El Hadj, Yahya Benkaouz, Bernd Freisleben, Mohammed Erradi:
ABAC Rule Reduction via Similarity Computation. NETYS 2017: 86-100 - [c10]Maryem Ait El Hadj, Meryeme Ayache, Yahya Benkaouz, Ahmed Khoumsi, Mohammed Erradi:
Clustering-based Approach for Anomaly Detection in XACML Policies. SECRYPT 2017: 548-553 - 2016
- [c9]Yahya Benkaouz, Mohammed Erradi, Bernd Freisleben:
Work in Progress: K-Nearest Neighbors Techniques for ABAC Policies Clustering. ABAC@CODASPY 2016: 72-75 - [c8]Yahya Benkaouz, Mohammed Erradi, Anne-Marie Kermarrec:
Nearest Neighbors Graph Construction: Peer Sampling to the Rescue. NETYS 2016: 48-62 - 2015
- [j1]Yahya Benkaouz, Mohammed Erradi:
A distributed protocol for privacy preserving aggregation with non-permanent participants. Computing 97(9): 893-912 (2015) - [c7]Mohamed Amine Madani, Mohammed Erradi, Yahya Benkaouz:
Access control in a collaborative session in multi tenant environment. IAS 2015: 129-134 - [c6]Yahya Benkaouz, Mohammed Erradi:
Towards a Decentralized OSN for a Privacy-preserving e-health System. EUSPN/ICTH 2015: 284-291 - [c5]Yahya Benkaouz, Mohammed Erradi, Bernd Freisleben:
Distributed Privacy-Preserving Data Aggregation via Anonymization. NETYS 2015: 94-108 - 2013
- [c4]Yahya Benkaouz, Mohammed Erradi:
A Distributed Protocol for Privacy Preserving Aggregation. NETYS 2013: 221-232 - [c3]Yahya Benkaouz, Rachid Guerraoui, Mohammed Erradi, Florian Huc:
A Distributed Polling with Probabilistic Privacy. SRDS 2013: 41-50 - 2012
- [c2]Yahya Benkaouz, Blaise Angoma, Mohammed Erradi:
Performance analysis of WiFi/WiMax vertical handover based on media independent handover. ICMCS 2012: 36-40 - 2011
- [c1]Blaise Angoma, Mohammed Erradi, Yahya Benkaouz, Amine Berqia, Mohammed Charaf Akalay:
HaVe-2W3G: A vertical handoff solution between WLAN, WiMAX and 3G networks. IWCMC 2011: 101-106
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-23 00:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint