default search action
Mustapha Hedabou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Gursharan Singh, Parminder Singh, Anas Motii, Mustapha Hedabou:
A secure and lightweight container migration technique in cloud computing. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101887 (2024) - 2023
- [j11]Sandeep Kumar Arora, Gulshan Kumar, Mustapha Hedabou, El Mehdi Amhoud, Celestine Iwendi:
Blockchain-inspired lightweight trust-based system in vehicular networks. Int. J. Netw. Manag. 33(5) (2023) - [j10]Omar Farooq, Parminder Singh, Mustapha Hedabou, Wadii Boulila, Bilel Benjdira:
Machine Learning Analytic-Based Two-Staged Data Management Framework for Internet of Things. Sensors 23(5): 2427 (2023) - [j9]Parminder Singh, Gurjot Singh Gaba, Avinash Kaur, Mustapha Hedabou, Andrei V. Gurtov:
Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT. IEEE J. Biomed. Health Informatics 27(2): 722-731 (2023) - [j8]Jagdeep Singh, Parminder Singh, Mustapha Hedabou, Neeraj Kumar:
An Efficient Machine Learning-Based Resource Allocation Scheme for SDN-Enabled Fog Computing Environment. IEEE Trans. Veh. Technol. 72(6): 8004-8017 (2023) - [c16]Parminder Singh, Avinash Kaur, Mustapha Hedabou:
Blockchain and Dew Computing-based Model for Secure Energy Trading in Smart Grids. ICC Workshops 2023: 176-181 - [c15]Yunusa Simpa Abdulsalam, Jaouhara Bouamama, Yahya Benkaouz, Mustapha Hedabou:
Decentralized SGX-Based Cloud Key Management. NSS 2023: 327-341 - 2022
- [j7]P. Srikanth, Adarsh Kumar, Mustapha Hedabou:
An Uncertainty Trust Assessment Scheme for Trustworthy Partner Selection in Online Games. IEEE Access 10: 132232-132249 (2022) - [j6]Yunusa Simpa Abdulsalam, Mustapha Hedabou:
Security and Privacy in Cloud Computing: Technical Review. Future Internet 14(1): 11 (2022) - [c14]Amar V. Sable, Parminder Singh, Jatinder Singh, Mustapha Hedabou:
A Survey on Soybean Seed Varieties and Defects Identification Using Neural Network. ACI@ISIC 2022: 61-69 - 2021
- [j5]Amandeep Singh, Gurjot Singh Gaba, Mustapha Hedabou:
Robust and effective image preprocessing conglomerate method for denoising of both grayscale and color images. J. Electronic Imaging 31(4) (2021) - [c13]Mustapha Hedabou:
Cloud Key Management Based on Verifiable Secret Sharing. NSS 2021: 289-303 - [c12]Jaouhara Bouamama, Mustapha Hedabou, Mohammed Erradi:
Cloud Key Management using Trusted Execution Environment. SECRYPT 2021: 560-567 - [c11]Yunusa Simpa Abdulsalam, Mustapha Hedabou:
Decentralized Data Integrity Scheme for Preserving Privacy in Cloud Computing. SPAC 2021: 607-612 - 2020
- [c10]Mustapha Hedabou, Yunusa Simpa Abdulsalam:
Efficient and Secure Implementation of BLS Multisignature Scheme on TPM. ISI 2020: 1-6
2010 – 2019
- 2019
- [j4]Ahmed Bentajer, Mustapha Hedabou, Karim Abouelmehdi, Zakaria Igarramen, Said El Fezazi:
An IBE-based design for assured deletion in cloud storage. Cryptologia 43(3): 254-265 (2019) - [c9]Zakaria Igarramen, Ahmed Bentajer, Mustapha Hedabou:
TPM Based Schema for Reinforcing Security in IBE's Key Manager. MEDI Workshops 2019: 146-153 - 2018
- [c8]Ahmed Bentajer, Mustapha Hedabou, Karim Abouelmehdi, Said Elfezazi:
CS-IBE: A Data Confidentiality System in Public Cloud Storage System. EUSPN/ICTH 2018: 559-564 - 2017
- [c7]Hicham Boukhriss, Mustapha Hedabou, Omar Boutkhoum:
CDT to Detect Co-residence in Cloud Computing. SCA 2017: 313-323 - 2016
- [c6]Ali Azougaghe, Omar Ait Oualhaj, Mustapha Hedabou, Mostafa Belkasmi, Abdellatif Kobbane:
Many-to-one matching game towards secure virtual machines migration in cloud computing. ACOSIS 2016: 1-7 - 2015
- [c5]Ali Azougaghe, Mustapha Hedabou, Mostafa Belkasmi:
An electronic voting system based on homomorphic encryption and prime numbers. IAS 2015: 140-145 - [c4]Ali Azougaghe, Zaid Kartit, Mustapha Hedabou, Mostafa Belkasmi, Mohamed El Marraki:
An efficient algorithm for data security in Cloud storage. ISDA 2015: 421-427 - [c3]Zaid Kartit, Ali Azougaghe, Hamza Kamal Idrissi, Mohamed El Marraki, Mustapha Hedabou, Mostafa Belkasmi, Ali Kartit:
Applying Encryption Algorithm for Data Security in Cloud Storage. UNet 2015: 141-154 - 2012
- [j3]Mustapha Hedabou:
Securing pairing-based cryptography on smartcards. Int. J. Inf. Comput. Secur. 5(1): 68-76 (2012) - [j2]Mustapha Hedabou:
Efficient Countermeasure for Securing the Eta Pairing Computation over Binary Fields. Int. J. Netw. Secur. 14(1): 47-52 (2012)
2000 – 2009
- 2006
- [j1]Mustapha Hedabou:
A Frobenius Map Approach for an Efficient and Secure Multiplication on Koblitz. Int. J. Netw. Secur. 3(3): 239-243 (2006) - 2005
- [c2]Mustapha Hedabou:
Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods. IMACC 2005: 248-261 - [c1]Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau:
Countermeasures for Preventing Comb Method Against SCA Attacks. ISPEC 2005: 85-96 - 2004
- [i1]Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau:
A comb method to render ECC resistant against Side Channel Attacks. IACR Cryptol. ePrint Arch. 2004: 342 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint