default search action
Nouha Oualha
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c21]Filipe Conceição, Nouha Oualha, Djamal Zeghlache:
Real-Time Dynamic Security for ProSe in 5G. ICSPIS 2019: 1-4 - [c20]Younes Laaboudi, Alexis Olivereau, Nouha Oualha:
An Intrusion Detection and Response Scheme for CP-ABE-Encrypted IoT Networks. NTMS 2019: 1-5 - [p1]Dan García-Carrillo, Alejandro Molina Zarca, Nouha Oualha, Antonio F. Skarmeta:
USEIT Project: Empowering the Users to Protect Their Data. Security and Privacy in the Internet of Things 2019: 1-23 - 2018
- [j4]Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent:
Securely outsourcing the ciphertext-policy attribute-based encryption. World Wide Web 21(1): 169-183 (2018) - [c19]Filipe Conceição, Nouha Oualha, Djamal Zeghlache:
An Energy Model for the IoT: Secure Networking Perspective. PIMRC 2018: 1-5 - [c18]Nouha Oualha:
Reinforcing IoT-Enforced Security Policies. TrustCom/BigDataSE 2018: 831-836 - 2017
- [c17]Filipe Conceição, Nouha Oualha, Djamal Zeghlache:
Security establishment for IoT environments in 5G: Direct MTC-UE communications. PIMRC 2017: 1-5 - 2016
- [c16]Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent:
Authenticated Key Agreement Mediated by a Proxy Re-encryptor for the Internet of Things. ESORICS (2) 2016: 339-358 - [c15]Nouha Oualha, Kim Thuat Nguyen:
Lightweight Attribute-Based Encryption for the Internet of Things. ICCCN 2016: 1-6 - [c14]Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent:
Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY. WISTP 2016: 19-34 - 2015
- [j3]Kim Thuat Nguyen, Maryline Laurent, Nouha Oualha:
Survey on secure communication protocols for the Internet of Things. Ad Hoc Networks 32: 17-31 (2015) - [c13]Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent:
Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things. TrustCom/BigDataSE/ISPA (1) 2015: 467-474 - 2013
- [c12]Nouha Oualha, Alexis Olivereau, Aymen Boudguiga:
Pseudonymous communications in secure industrial wireless sensor networks. PST 2013: 98-102 - [c11]Aymen Boudguiga, Alexis Olivereau, Nouha Oualha:
Server Assisted Key Establishment for WSN: A MIKEY-Ticket Approach. TrustCom/ISPA/IUCC 2013: 94-101 - 2012
- [j2]Nouha Oualha, Jean Leneutre, Yves Roudier:
Verifying remote data integrity in peer-to-peer data storage: A comprehensive survey of protocols. Peer-to-Peer Netw. Appl. 5(3): 231-243 (2012) - [c10]Nouha Oualha, Alexis Olivereau, Markus Wehner, Thomas Bartzsch, Dirk Burggraf, Sven Zeisberg, Laura-Cristina Gheorghe, Emil Slusanschi, Dan Tudose:
AAA-based infrastructure for industrial wireless sensor networks. Future Network & Mobile Summit 2012: 1-8 - [c9]Markus Wehner, Sven Zeisberg, Nouha Oualha, Alexis Olivereau, Mike Ludwig, Dan Tudose, Laura Gheorghe, Emil Slusanschi, Basil Hess, Felix von Reischach, David Bateman:
Challenges and Current Results of the TWISNet FP7 Project - (Extended Abstract). TrustBus 2012: 232-233 - 2011
- [c8]Markus Wehner, Sven Zeisberg, Alexis Olivereau, Nouha Oualha, Laura Gheorghe, Emil Slusanschi, Basil Hess, Felix von Reischach, Mike Ludwig, David Bateman:
A Trustworthy Architecture for Wireless Industrial Sensor Networks: Research Roadmap of EU TWISNet Trust and Security Project. SysSec@DIMVA 2011: 63-66 - 2010
- [j1]Nouha Oualha, Melek Önen, Yves Roudier:
Secure P2P Data Storage and Maintenance. Int. J. Digit. Multim. Broadcast. 2010: 720251:1-720251:11 (2010) - [c7]Nouha Oualha, Yves Roudier:
Securing P2P Storage with a Self-organizing Payment Scheme. DPM/SETOP 2010: 155-169
2000 – 2009
- 2009
- [c6]Nouha Oualha, Yves Roudier:
A Game Theoretical Approach in Securing P2P Storage against Whitewashers. WETICE 2009: 128-133 - 2008
- [c5]Nouha Oualha, Yves Roudier:
Validating Peer-to-Peer Storage Audits with Evolutionary Game Theory. IWSOS 2008: 47-58 - [c4]Nouha Oualha, Melek Önen, Yves Roudier:
A Security Protocol for Self-Organizing Data Storage. SEC 2008: 675-679 - [c3]Nouha Oualha, Yves Roudier:
Reputation and Audits for Self-Organizing Storage. SecureComm 2008 - 2007
- [c2]Nouha Oualha, Pietro Michiardi, Yves Roudier:
A Game Theoretic Model of a Protocol for Data Possession Verification. WOWMOM 2007: 1-6 - [c1]Nouha Oualha, Yves Roudier:
Securing Ad Hoc Storage through Probabilistic Cooperation Assessment. WCAN@ICALP 2007: 17-29
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-18 20:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint