default search action
Ryma Abassi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Ryma Abassi, Mohamed Amine Riahla, Karim Tamine, Sihem Goumiri:
Towards a Formal MultipathP2P Protocol. Int. J. Bus. Data Commun. Netw. 19: 1-13 (2024) - 2023
- [c40]Nadia Kammoun, Aida Ben Chehida Douss, Ryma Abassi:
A Trust-based algorithms for securing IoT clusters in an edge computing environment. ComNet 2023: 1-6 - 2022
- [c39]Nadia Kammoun, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
Ensuring Data Integrity Using Digital Signature in an IoT Environment. AINA (3) 2022: 482-491 - 2021
- [j6]Mohamed Amine Riahla, Ryma Abassi, Karim Tamine:
Towards a Formal Validation of a Hybrid Multi-Agent Routing Protocol for Ad hoc Networks. Int. J. Bus. Data Commun. Netw. 17(2): 1-15 (2021) - [c38]Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
Formal Validation of Credibility and Accuracy Assessment of Safety Messages in VANETs. ARES 2021: 52:1-52:7 - [c37]Ons Chikhaoui, Ryma Abassi, Aida Ben Chehida Douss, Sihem Guemara El Fatmi:
Formal Validation of a Security Mechanism against the RSU Compromise Attack. ARES 2021: 54:1-54:8 - [c36]Hana Rhim, Karim Tamine, Ryma Abassi, Damien Sauveron, Sihem Guemara El Fatmi:
Enhancing security using digital signature in an efficient Network Coding-enabled WSN. SSD 2021: 70-78 - [c35]Amira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi:
Towards the Performance Evaluation of a Trust Based Routing Protocol for VANET. AINA (1) 2021: 113-124 - [c34]Nadia Kammoun, Ryma Abassi, Sihem Guemara El Fatmi, Mohamed Mosbah:
A Lightweight Authentication Scheme for SDN-Based Architecture in IoT. AINA (3) 2021: 336-345 - [c33]Amira Kchaou, Ryma Abassi, Samiha Ayed, Sihem Guemara El Fatmi:
A Distributed Resource Management for VANET using Smart Contract. IWCMC 2021: 1448-1453 - 2020
- [j5]Ryma Abassi, Aida Ben Chehida Douss, Damien Sauveron:
TSME: a trust-based security scheme for message exchange in vehicular Ad hoc networks. Hum. centric Comput. Inf. Sci. 10: 43 (2020) - [c32]Amira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi:
Towards the performance evaluation of a clustering and trust based security mechanism for VANET. ARES 2020: 52:1-52:6 - [c31]Nadia Kammoun, Ryma Abassi, Sihem Guemara El Fatmi, Mohamed Mosbah:
A New SDN Architecture Based on Trust Management and Access Control for IoT. AINA Workshops 2020: 245-254 - [c30]Hana Rhim, Ryma Abassi, Karim Tamine, Damien Sauveron, Sihem Guemara El Fatmi:
A secure network coding-enabled approach for a confidential cluster-based routing in wireless sensor networks. SAC 2020: 2151-2157 - [c29]Amira Kchaou, Samiha Ayed, Ryma Abassi, Sihem Guemara El Fatmi:
Smart Contract-Based Access Control for the Vehicular Networks. SoftCOM 2020: 1-6
2010 – 2019
- 2019
- [c28]Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
A Formal Environment for Credibility and Accuracy Assessment of Safety Messages Exchanged in VANETs. EMCIS 2019: 391-402 - [c27]Ons Chikhaoui, Ryma Abassi, Aida Ben Chehida Douss, Sihem Guemara El Fatmi:
A Security Mechanism Against the RSU Compromise Attack in a Ticket-Based Authentication Scheme for VANETs. EMCIS 2019: 403-416 - [c26]Nadia Kammoun, Ryma Abassi, Sihem Guemara El Fatmi:
Towards a New Clustering Algorithm based on Trust Management and Edge Computing for IoT. IWCMC 2019: 1570-1575 - 2018
- [j4]Ryma Abassi:
Dealing with Collusion Attack in a Trust-Based MANET. Cybern. Syst. 49(7-8): 475-496 (2018) - [j3]Hana Rhim, Karim Tamine, Ryma Abassi, Damien Sauveron, Sihem Guemara El Fatmi:
A multi-hop graph-based approach for an energy-efficient routing protocol in wireless sensor networks. Hum. centric Comput. Inf. Sci. 8: 30 (2018) - [c25]Amira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi:
Toward a Distributed Trust Management scheme for VANET. ARES 2018: 53:1-53:6 - [c24]Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
Towards a Privacy Preserving and Flexible Scheme for Assessing the Credibility and the Accuracy of Safety Messages Exchanged in VANETs. ARES 2018: 55:1-55:9 - [c23]Amira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi:
Towards a Secured Clustering Mechanism for Messages Exchange in VANET. AINA Workshops 2018: 88-93 - [c22]Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
Towards the Formal Validation of a Ticket-Based Authentication Scheme for VANETs. AINA Workshops 2018: 496-501 - [c21]Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
Towards the Optimization of a Ticket-based Authentication Scheme for VANETs. COMNET 2018: 1-4 - [c20]Amira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi:
A New Trust based Routing Protocol for VANETs. COMNET 2018: 1-6 - 2017
- [j2]Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
A trust-based security environment in MANET: definition and performance evaluation. Ann. des Télécommunications 72(7-8): 491-498 (2017) - [c19]Ons Chikhaoui, Aida Ben Chehida, Ryma Abassi, Sihem Guemara El Fatmi:
A Ticket-Based Authentication Scheme for VANETs Preserving Privacy. ADHOC-NOW 2017: 77-91 - [c18]Ryma Abassi, Sihem Guemara El Fatmi:
A Trust Based Communication Scheme for Safety Messages Exchange in VANETs. ADHOC-NOW 2017: 92-103 - 2015
- [j1]Abdeljebar Ameziane El Hassani, Anas Abou El Kalam, Adel Bouhoula, Ryma Abassi, Abdellah Ait Ouahman:
Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity. Int. J. Inf. Sec. 14(4): 367-385 (2015) - [c17]Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
A Model for Specification and Validation of a Trust Management Based Security Scheme in a MANET Environment. ARES 2015: 341-350 - [c16]Aida Ben Chehida Douss, Samiha Ayed, Ryma Abassi, Nora Cuppens, Sihem Guemara El Fatmi:
Trust Negotiation Based Approach to Enforce MANET Routing Security. ARES 2015: 360-366 - [c15]Aida Ben Chehida Douss, Ryma Abassi, Nihel Ben Youssef, Sihem Guemara El Fatmi:
A Formal Environment for MANET Organization and Security. CANS 2015: 144-159 - [c14]Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
Toward Securing MANET Against the Energy Depletion Attack. CRiSIS 2015: 292-306 - 2014
- [c13]Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
A Trust Management Based Security Mechanism against Collusion Attacks in a MANET Environment. ARES 2014: 325-332 - [c12]Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
A novel secure Ad hoc routing protocol using one time password. ICALT 2014: 41-46 - 2013
- [c11]Aida Ben Chehida, Ryma Abassi, Sihem Guemara El Fatmi:
A Reputation-Based Clustering Mechanism for MANET Routing Security. ARES 2013: 310-315 - [c10]Ryma Abassi, Sihem Guemara El Fatmi:
Dealing with delegation in a trust-based MANET. ICT 2013: 1-5 - 2012
- [c9]Ryma Abassi, Sihem Guemara El Fatmi:
Trust-based delegation for Ad Hoc QoS enhancing. CRiSIS 2012: 1-7 - [c8]Ryma Abassi, Sihem Guemara El Fatmi:
Towards a generic trust management model. ICT 2012: 1-6 - [c7]Ryma Abassi, Sihem Guemara El Fatmi:
Delegation Management Modeling in a Security Policy based Environment. SCSS 2012: 85-95 - 2011
- [c6]Ryma Abassi, Sihem Guemara El Fatmi:
Using security policies in a network securing process. ICT 2011: 416-421
2000 – 2009
- 2009
- [c5]Ryma Abassi, Sihem Guemara El Fatmi:
Dealing with Multi Security Policies in Communication Networks. ICNS 2009: 282-287 - [c4]Ryma Abassi, Sihem Guemara El Fatmi:
Towards a test cases generation method for Security Policies. ICT 2009: 41-46 - 2008
- [c3]Ryma Abassi, Sihem Guemara El Fatmi:
A Model for Specification and Validation of Security Policies in Communication Networks: The Firewall Case. ARES 2008: 467-472 - [c2]Ryma Abassi, Sihem Guemara El Fatmi:
An Automated Validation Method for Security Policies: The Firewall Case. IAS 2008: 291-294 - [c1]Ryma Abassi, Sihem Guemara El Fatmi:
Towards an automated firewall security policies validation process. CRiSIS 2008: 267-272
Coauthor Index
aka: Aida Ben Chehida
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint