default search action
Hassan N. Noura
Person information
- affiliation: University of Franche-Comté, Institut FEMTO-ST, France
- affiliation (former): American University of Beirut (AUB), Department of Electrical and Computer Engineering, Lebanon
Other persons with the same name
- Hassan Noura 0002 — Aix-Marseille University (AMU), Marseille, France (and 4 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j65]Hassan N. Noura, Zaid Allal, Ola Salman, Khaled Chahine:
Explainable artificial intelligence of tree-based algorithms for fault detection and diagnosis in grid-connected photovoltaic systems. Eng. Appl. Artif. Intell. 139: 109503 (2025) - 2024
- [j64]Zaid Allal, Hassan N. Noura, Ola Salman, Khaled Chahine:
Leveraging the power of machine learning and data balancing techniques to evaluate stability in smart grids. Eng. Appl. Artif. Intell. 133: 108304 (2024) - [j63]Zaid Allal, Hassan N. Noura, Flavien Vernier, Ola Salman, Khaled Chahine:
Wind turbine fault detection and identification using a two-tier machine learning framework. Intell. Syst. Appl. 22: 200372 (2024) - [j62]Ahmed Fanfakh, Hassan Noura, Raphaël Couturier:
Simultaneous encryption and authentication of messages over GPUs. Multim. Tools Appl. 83(2): 4757-4789 (2024) - [j61]Raphaël Couturier, Pablo Gregori, Hassan N. Noura, Ola Salman, Abderrahmane Sider:
A deep learning object detection method to improve cluster analysis of two-dimensional data. Multim. Tools Appl. 83(28): 71171-71187 (2024) - [j60]Hassan N. Noura, Reem Melki, Mohammad M. Mansour, Ali Chehab:
Lightweight and secure cipher scheme for multi-homed systems. Wirel. Networks 30(7): 6273-6290 (2024) - [j59]Hassan N. Noura, Reem Melki, Ali Chehab, Javier Hernandez Fernandez:
Efficient and secure message authentication algorithm at the physical layer. Wirel. Networks 30(7): 6291-6305 (2024) - [c46]Jean-Paul A. Yaacoub, Benoît Piranda, Frédéric Lassabe, Hassan N. Noura:
Efficient Communication Protocol for Programmable Matter. AINA (3) 2024: 1-11 - [c45]Raphaël Couturier, Hassan N. Noura:
RFCA: Efficient, Robust and Flexible Cipher Algorithm For FPGA Implementation. ECMS 2024: 579-584 - 2023
- [j58]Hassan N. Noura, Joseph Azar, Ola Salman, Raphaël Couturier, Kamel Mazouzi:
A deep learning scheme for efficient multimedia IoT data compression. Ad Hoc Networks 138: 102998 (2023) - [j57]Hassan Noura, Ola Salman, Raphaël Couturier, Ali Chehab:
LESCA: LightwEight Stream Cipher Algorithm for emerging systems. Ad Hoc Networks 138: 102999 (2023) - [j56]Jean-Paul A. Yaacoub, Hassan N. Noura, Benoît Piranda:
The internet of modular robotic things: Issues, limitations, challenges, & solutions. Internet Things 23: 100886 (2023) - [j55]Hassan N. Noura, Ola Salman, Ali Chehab:
Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms. J. Inf. Secur. Appl. 76: 103514 (2023) - [j54]Khalil Hariss, Hassan N. Noura:
Homomorphic additive lightweight block cipher scheme for securing IoT applications. J. Inf. Secur. Appl. 76: 103540 (2023) - 2022
- [j53]Hassan N. Noura, Ola Salman, Raphaël Couturier, Ali Chehab:
Efficient and secure selective cipher scheme for MIoT compressed images. Ad Hoc Networks 135: 102928 (2022) - [j52]Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab:
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. Int. J. Inf. Sec. 21(1): 115-158 (2022) - [j51]Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab:
Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations. Internet Things 19: 100544 (2022) - [j50]Hassan N. Noura, Ola Salman, Raphaël Couturier, Ali Chehab:
A Single-Pass and One-Round Message Authentication Encryption for Limited IoT Devices. IEEE Internet Things J. 9(18): 17885-17900 (2022) - [j49]Hassan N. Noura, Reem Melki, Ali Chehab:
Network coding and MPTCP: Enhancing security and performance in an SDN environment. J. Inf. Secur. Appl. 66: 103165 (2022) - [j48]Hassan N. Noura, Ali Chehab:
Efficient binary diffusion matrix structures for dynamic key-dependent cryptographic algorithms. J. Inf. Secur. Appl. 68: 103264 (2022) - [j47]Hassan N. Noura, Ola Salman, Raphaël Couturier, Ali Chehab:
Novel one round message authentication scheme for constrained IoT devices. J. Ambient Intell. Humaniz. Comput. 13(1): 483-499 (2022) - [j46]Khalil Hariss, Hassan Noura:
Towards a fully homomorphic symmetric cipher scheme resistant to plain-text/cipher-text attacks. Multim. Tools Appl. 81(10): 14403-14449 (2022) - [j45]Reem Melki, Hassan N. Noura, Ali Chehab:
An efficient and secure cipher scheme for MIMO-OFDM systems based on physical layer security. Telecommun. Syst. 79(1): 17-32 (2022) - [j44]Ahmed Fanfakh, Hassan N. Noura, Raphaël Couturier:
ORSCA-GPU: one round stream cipher algorithm for GPU implementation. J. Supercomput. 78(9): 11744-11767 (2022) - [j43]Hassan N. Noura, Raphaël Couturier, Ola Salman, Kamel Mazouzi:
DKEMA: GPU-based and dynamic key-dependent efficient message authentication algorithm. J. Supercomput. 78(12): 14034-14071 (2022) - [j42]Hassan N. Noura, Ola Salman, Raphaël Couturier, Ali Chehab:
LoRCA: Lightweight round block and stream cipher algorithms for IoV systems. Veh. Commun. 34: 100416 (2022) - [c44]Hassan N. Noura, Raphaël Couturier, Joseph Azar, Mohamad Moussa, Ola Salman:
An Efficient and Robust MIoT Communication Solution using a Deep Learning Approach. IWCMC 2022: 366-371 - [c43]Khalil Hariss, Hassan N. Noura:
ACiS: Lightweight and Robust Homomorphic Block Cipher Additive Scheme. IWCMC 2022: 413-418 - [c42]Hassan N. Noura, Ola Salman, Ali Chehab, Raphaël Couturier:
Distributed Gateway-based Security Scheme for Guaranteeing LoRaWAN Networks Availability. SITIS 2022: 45-52 - [c41]Reem Melki, Hassan N. Noura, Ali Chehab, Raphaël Couturier:
Machine Learning for Physical Layer Security: Limitations, Challenges and Recommendation. SITIS 2022: 53-60 - [c40]Hassan Noura, Joseph Azar, Raphaël Couturier, Ola Salman:
A Novel Lightweight and Robust Source-Channel Coding Solution for MIoT Communication Based on DL Denoising/Super Resolution Model. SITIS 2022: 203-210 - 2021
- [j41]Reem Melki, Hassan N. Noura, Ali Chehab:
Physical layer security for NOMA: limitations, issues, and recommendations. Ann. des Télécommunications 76(5-6): 375-397 (2021) - [j40]Hassan N. Noura, Reem Melki, Ali Chehab, Javier Hernandez Fernandez:
Efficient and robust data availability solution for hybrid PLC/RF systems. Comput. Networks 185: 107675 (2021) - [j39]Jean-Paul A. Yaacoub, Javier Hernandez Fernandez, Hassan N. Noura, Ali Chehab:
Security of Power Line Communication systems: Issues, limitations and existing solutions. Comput. Sci. Rev. 39: 100331 (2021) - [j38]Hassan N. Noura, Reem Melki, Ali Chehab:
Efficient data confidentiality scheme for 5G wireless NOMA communications. J. Inf. Secur. Appl. 58: 102781 (2021) - [j37]Hassan N. Noura, Ola Salman, Nesrine Kaaniche, Nicolas Sklavos, Ali Chehab, Raphaël Couturier:
TRESC: Towards redesigning existing symmetric ciphers. Microprocess. Microsystems 87: 103478 (2021) - [j36]Han Qiu, Hassan N. Noura, Meikang Qiu, Zhong Ming, Gérard Memmi:
A User-Centric Data Protection Method for Cloud Storage Based on Invertible DWT. IEEE Trans. Cloud Comput. 9(4): 1293-1304 (2021) - [j35]Reem Melki, Hassan N. Noura, Javier Hernandez Fernandez, Ali Chehab:
Message authentication algorithm for OFDM communication systems. Telecommun. Syst. 76(3): 403-422 (2021) - [j34]Hassan N. Noura, Reem Melki, Rouwaida Kanj, Ali Chehab:
Secure MIMO D2D communication based on a lightweight and robust PLS cipher scheme. Wirel. Networks 27(1): 557-574 (2021) - [c39]Hassan Noura, Ali Chehab:
Efficient and Robust Keyed Hash Function Based on Artificial Neural Networks. ISNCC 2021: 1-7 - [i7]Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab:
A Survey on Ethical Hacking: Issues and Challenges. CoRR abs/2103.15072 (2021) - [i6]Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab:
Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations. CoRR abs/2103.17028 (2021) - [i5]Hassan N. Noura, Ola Salman, Raphaël Couturier, Abderrahmane Sider:
A Deep Learning Object Detection Method for an Efficient Clusters Initialization. CoRR abs/2104.13634 (2021) - [i4]Hassan N. Noura, Ola Salman, Raphaël Couturier:
A Deep Learning Scheme for Efficient Multimedia IoT Data Compression. CoRR abs/2105.09280 (2021) - 2020
- [j33]Hassan N. Noura, Ola Salman, Ali Chehab, Raphaël Couturier:
DistLog: A distributed logging scheme for IoT forensics. Ad Hoc Networks 98 (2020) - [j32]Reem Melki, Hassan N. Noura, Ali Chehab:
Efficient and secure multi-homed systems based on binary random linear network coding. Comput. Electr. Eng. 87: 106774 (2020) - [j31]Jean-Paul A. Yaacoub, Mohamad Noura, Hassan N. Noura, Ola Salman, Elias Yaacoub, Raphaël Couturier, Ali Chehab:
Securing internet of medical things systems: Limitations, issues and recommendations. Future Gener. Comput. Syst. 105: 581-606 (2020) - [j30]Reem Melki, Hassan N. Noura, Ali Chehab:
Lightweight multi-factor mutual authentication protocol for IoT devices. Int. J. Inf. Sec. 19(6): 679-694 (2020) - [j29]Jean-Paul A. Yaacoub, Hassan Noura, Ola Salman, Ali Chehab:
Security analysis of drones systems: Attacks, limitations, and recommendations. Internet Things 11: 100218 (2020) - [j28]Hassan Noura, Tarif Hatoum, Ola Salman, Jean-Paul A. Yaacoub, Ali Chehab:
LoRaWAN security survey: Issues, threats and possible mitigation techniques. Internet Things 12: 100303 (2020) - [j27]Lama Sleem, Hassan N. Noura, Raphaël Couturier:
Towards a secure ITS: Overview, challenges and solutions. J. Inf. Secur. Appl. 55: 102637 (2020) - [j26]Jean-Paul A. Yaacoub, Ola Salman, Hassan N. Noura, Nesrine Kaaniche, Ali Chehab, Mohammad Malli:
Cyber-physical systems security: Limitations, issues and future trends. Microprocess. Microsystems 77: 103201 (2020) - [j25]Khalil Hariss, Hassan Noura, Abed Ellatif Samhat:
An efficient fully homomorphic symmetric encryption algorithm. Multim. Tools Appl. 79(17-18): 12139-12164 (2020) - [j24]Raphaël Couturier, Hassan N. Noura, Ali Chehab:
ESSENCE: GPU-based and dynamic key-dependent efficient stream cipher for multimedia contents. Multim. Tools Appl. 79(19-20): 13559-13579 (2020) - [j23]Hassan Noura, Mohamad Noura, Ola Salman, Raphaël Couturier, Ali Chehab:
Efficient & secure image availability and content protection. Multim. Tools Appl. 79(31-32): 22869-22904 (2020) - [j22]Reem Melki, Hassan N. Noura, Mohammad M. Mansour, Ali Chehab:
Physical layer security schemes for MIMO systems: an overview. Wirel. Networks 26(3): 2089-2111 (2020) - [c38]Hassan N. Noura, Ola Salman, Tarif Hatoum, Mohammad Malli, Ali Chehab:
Towards Securing LoRaWAN ABP Communication System. CLOSER 2020: 440-447 - [c37]Reem Melki, Hassan Noura, Ali Chehab:
An Efficient and Secure Cipher Scheme for Filter Bank Multi-Carrier Systems. ICETE (1) 2020: 133-141 - [c36]Hassan N. Noura, Ola Salman, Ali Chehab:
Efficient and Secure Cipher Scheme for Limited IoT Devices. ICETE (1) 2020: 142-150 - [c35]Hussein Majed, Hassan N. Noura, Ola Salman, Mohammad Malli, Ali Chehab:
Efficient and Secure Statistical DDoS Detection Scheme. ICETE (1) 2020: 153-161 - [c34]Hassan Noura, Ola Salman, Ali Chehab, Raphaël Couturier:
Efficient and Secure Keyed Hash Function Scheme Based on RC4 Stream Cipher. ISCC 2020: 1-7 - [c33]Hussein Majed, Hassan N. Noura, Ali Chehab:
Overview of Digital Forensics and Anti-Forensics Techniques. ISDFS 2020: 1-5 - [c32]Hassan N. Noura, Ali Chehab, Raphaël Couturier:
Overview of Efficient Symmetric Cryptography: Dynamic vs Static Approaches. ISDFS 2020: 1-6 - [c31]Hussein Majed, Hassan N. Noura, Ola Salman, Ali Chehab, Raphaël Couturier:
Efficient and Secure Statistical Port Scan Detection Scheme. MSPN 2020: 72-88
2010 – 2019
- 2019
- [j21]Ahmed Mostefaoui, Zeinab Fawaz, Hassan Noura:
A robust image-encryption approach against transmission errors in Communicating Things Networks. Ad Hoc Networks 94 (2019) - [j20]Hassan Noura, Ola Salman, Ali Chehab, Raphaël Couturier:
Preserving data security in distributed fog computing. Ad Hoc Networks 94 (2019) - [j19]Katarzyna Kapusta, Gérard Memmi, Hassan Noura:
Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks. Ann. des Télécommunications 74(3-4): 157-165 (2019) - [j18]Hassan N. Noura, Reem Melki, Mohammad M. Mansour, Ali Chehab:
Design and realization of efficient & secure multi-homed systems based on random linear network coding. Comput. Networks 163 (2019) - [j17]Hassan Noura, Christophe Guyeux, Ali Chehab, Mohammad M. Mansour, Raphaël Couturier:
Efficient Chaotic Encryption Scheme with OFB Mode. Int. J. Bifurc. Chaos 29(5): 1950059:1-1950059:24 (2019) - [j16]Reem Melki, Hassan N. Noura, Mohammad M. Mansour, Ali Chehab:
An Efficient OFDM-Based Encryption Scheme Using a Dynamic Key Approach. IEEE Internet Things J. 6(1): 361-378 (2019) - [j15]Hassan N. Noura, Reem Melki, Ali Chehab, Mohammad M. Mansour:
A Physical Encryption Scheme for Low-Power Wireless M2M Devices: a Dynamic Key Approach. Mob. Networks Appl. 24(2): 447-463 (2019) - [j14]Hassan N. Noura, Mohamad Noura, Ali Chehab, Mohammad M. Mansour, Raphaël Couturier:
Efficient and secure cipher scheme for multimedia contents. Multim. Tools Appl. 78(11): 14837-14866 (2019) - [j13]Hassan Noura, Ali Chehab, Mohamad Noura, Raphaël Couturier, Mohammad M. Mansour:
Lightweight, dynamic and efficient image encryption scheme. Multim. Tools Appl. 78(12): 16527-16561 (2019) - [j12]Reem Melki, Hassan N. Noura, Mohammad M. Mansour, Ali Chehab:
A survey on OFDM physical layer security. Phys. Commun. 32: 1-30 (2019) - [j11]Hassan N. Noura, Ali Chehab, Raphaël Couturier:
Efficient & secure cipher scheme with dynamic key-dependent mode of operation. Signal Process. Image Commun. 78: 448-464 (2019) - [c30]Mahdi Chehimi, Rofaida Al Ahmad Matar, Elias Yaacoub, Ali Chehab, Hassan Noura:
Massive Planar Antenna Arrays for Physical Layer Security. ACTEA 2019: 1-6 - [c29]Reem Melki, Hassan N. Noura, Ali Chehab:
Efficient & Secure Physical Layer Cipher Scheme for VLC Systems. VTC Fall 2019: 1-6 - [c28]Reem Melki, Hassan N. Noura, Ali Chehab:
Lightweight and Secure D2D Authentication & Key Management Based on PLS. VTC Fall 2019: 1-7 - [c27]Hassan N. Noura, Reem Melki, Ali Chehab:
Secure and Lightweight Mutual Multi-Factor Authentication for IoT Communication Systems. VTC Fall 2019: 1-7 - [c26]Hassan Noura, Ali Chehab:
An Efficient and Secure Variant of RC4 Stream Cipher Scheme for Emerging Networks. WCNC 2019: 1-8 - [c25]Hassan Noura, Ali Chehab, Raphaël Couturier:
Lightweight Dynamic Key-Dependent and Flexible Cipher Scheme for IoT Devices. WCNC 2019: 1-8 - [c24]Hassan Noura, Raphaël Couturier, Congduc Pham, Ali Chehab:
Lightweight Stream Cipher Scheme for Resource-Constrained IoT Devices. WiMob 2019: 1-8 - 2018
- [j10]Zeinab Fawaz, Hassan Noura, Ahmed Mostefaoui:
Securing JPEG-2000 images in constrained environments: a dynamic approach. Multim. Syst. 24(6): 669-694 (2018) - [j9]Hassan Noura, Lama Sleem, Mohamad Noura, Mohammad M. Mansour, Ali Chehab, Raphaël Couturier:
A new efficient lightweight and secure image cipher scheme. Multim. Tools Appl. 77(12): 15457-15484 (2018) - [j8]Hassan Noura, Ali Chehab, Lama Sleem, Mohamad Noura, Raphaël Couturier, Mohammad M. Mansour:
One round cipher algorithm for multimedia IoT devices. Multim. Tools Appl. 77(14): 18383-18413 (2018) - [j7]Mohamad Noura, Hassan Noura, Ali Chehab, Mohammad M. Mansour, Lama Sleem, Raphaël Couturier:
A dynamic approach for a lightweight and secure cipher for medical images. Multim. Tools Appl. 77(23): 31397-31426 (2018) - [c23]Rida Diba, Elias Yaacoub, Mohammed Al-Husseini, Hassan Noura, Khalid Abualsaud, Tamer Khattab, Mohsen Guizani:
A Simple Approach for Securing IoT Data Transmitted over Multi-RATs. IWCMC 2018: 249-254 - [c22]Hassan Noura, Reem Melki, Ali Chehab, Mohammad M. Mansour, Steven Martin:
Efficient and Secure Physical Encryption Scheme for Low-Power Wireless M2M Devices. IWCMC 2018: 1267-1272 - [c21]Mohamad Noura, Hassan N. Noura, Ali Chehab, Mohammad M. Mansour, Raphaël Couturier:
S-DES: An efficient & secure DES variant. MENACOMM 2018: 1-6 - [c20]Ali Sakr, Elias Yaacoub, Hassan Noura, Mohammed Al-Husseini, Khalid Abualsaud, Tamer Khattab, Mohsen Guizani:
A secure client-side framework for protecting the privacy of health data stored on the cloud. MENACOMM 2018: 1-6 - 2017
- [j6]Khalil Hariss, Hassan Noura, Abed Ellatif Samhat:
Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications. J. Inf. Secur. Appl. 34: 233-242 (2017) - [c19]Khalil Hariss, Hassan Noura, Abed Ellatif Samhat, Maroun Chamoun:
Design and Realization of a Fully Homomorphic Encryption Algorithm for Cloud Applications. CRiSIS 2017: 127-139 - [c18]Han Qiu, Gérard Memmi, Hassan Noura:
An Efficient Secure Storage Scheme Based on Information Fragmentation. CSCloud 2017: 108-113 - [c17]Katarzyna Kapusta, Gérard Memmi, Hassan Noura:
Secure and resilient scheme for data protection in unattended wireless sensor networks. CSNet 2017: 1-8 - [c16]Zeinab Fawaz, Hassan Noura, Ahmed Mostefaoui:
Lightweight format-compliant encryption algorithm for JPEG 2000 images. IWCMC 2017: 1871-1878 - [i3]Hassan Noura, Lama Sleem, Raphaël Couturier:
A Revision of a New Chaos-Based Image Encryption System: Weaknesses and Limitations. CoRR abs/1701.08371 (2017) - [i2]Katarzyna Kapusta, Gérard Memmi, Hassan Noura:
An Efficient Keyless Fragmentation Algorithm for Data Protection. CoRR abs/1705.09872 (2017) - 2016
- [j5]Zeinab Fawaz, Hassan Noura, Ahmed Mostefaoui:
An efficient and secure cipher scheme for images confidentiality preservation. Signal Process. Image Commun. 42: 90-108 (2016) - [c15]Katarzyna Kapusta, Gérard Memmi, Hassan Noura:
POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation. CCS 2016: 1745-1747 - 2015
- [j4]Ahmed Mostefaoui, Hassan Noura, Zeinab Fawaz:
An integrated multimedia data reduction and content confidentiality approach for limited networked devices. Ad Hoc Networks 32: 81-97 (2015) - [j3]Ali Kanso, Mohammad Ghebleh, Hassan Noura:
A variant of Baptista's encryption scheme. Secur. Commun. Networks 8(18): 3701-3712 (2015) - [c14]Hassan Noura, Damien Couroussé:
Lightweight, Dynamic, and Flexible Cipher Scheme for Wireless and Mobile Networks. ADHOCNETS 2015: 225-236 - [c13]Zeinab Fawaz, Ahmed Mostefaoui, Hassan Noura:
Secure and Error Resilient Approach for Multimedia Data Transmission in Constrained Networks. Q2SWinet@MSWiM 2015: 149-156 - [c12]Hassan Noura, Soran Hussein, Steven Martin, Lila Boukhatem, Khaldoun Al Agha:
ERDIA: An efficient and robust data integrity algorithm for mobile and wireless networks. WCNC 2015: 2103-2108 - [i1]Hassan Noura, Damien Couroussé:
HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network. IACR Cryptol. ePrint Arch. 2015: 928 (2015) - 2014
- [j2]Hassan Noura, Steven Martin, Khaldoun Al Agha, Khaled Chahine:
ERSS-RLNC: Efficient and robust secure scheme for random linear network coding. Comput. Networks 75: 99-112 (2014) - [j1]Mohammad Ghebleh, Ali Kanso, Hassan Noura:
An image encryption scheme based on irregularly decimated chaotic maps. Signal Process. Image Commun. 29(5): 618-627 (2014) - [c11]Ahmed Mostefaoui, Hassan Noura, Zeinab Fawaz:
Efficient and Secure Visual Data Transmission Approach for Wireless Multimedia Sensor Networks. MASCOTS 2014: 463-472 - [c10]Hassan Noura, Steven Martin, Khaldoun Al Agha:
An Efficient Lightweight Security Algorithm for Random Linear Network Coding. SECRYPT 2014: 171-177 - [c9]Damien Couroussé, Bruno Robisson, Jean-Louis Lanet, Thierno Barry, Hassan Noura, Philippe Jaillon, Philippe Lalevée:
COGITO: Code Polymorphism to Secure Devices. SECRYPT 2014: 451-456 - [c8]Hassan Noura, Steven Martin, Khaldoun Al Agha:
EDCA: Efficient diffusion cipher and authentication scheme for Wireless Sensor Networks. WCNC 2014: 2635-2640 - 2013
- [c7]Hassan Noura, Steven Martin, Khaldoun Al Agha:
A New Efficient Secure Coding Scheme for Random Linear Network Coding. ICCCN 2013: 1-7 - [c6]Hassan Noura, Steven Martin, Khaldoun Al Agha, Walter Grote:
Key dependent cipher scheme for sensor networks. Med-Hoc-Net 2013: 148-154 - [c5]Soran Hussein, Hassan Noura, Steven Martin, Lila Boukhatem, Khaldoun Al Agha:
ERCA: efficient and robust cipher algorithm for LTE data confidentiality. MSWiM 2013: 299-308 - [c4]Hassan Noura, Steven Martin, Khaldoun Al Agha:
E3SN - Efficient Security Scheme for Sensor Networks. SECRYPT 2013: 615-621 - 2012
- [c3]Maryline Chetto, Hassan Noura, Safwan El Assad, Mousa Farajallah:
How to guarantee secured transactions with QoS and real-time constraints. ICITST 2012: 40-44 - [c2]Relu Laurentiu Tataru, Dalia Battikh, Safwan El Assad, Hassan Noura, Olivier Déforges:
Enhanced Adaptive Data Hiding in Spatial LSB Domain by using Chaotic Sequences. IIH-MSP 2012: 85-88 - 2011
- [c1]Hassan Noura, Safwan El Assad, Calin Vladeanu, Daniel Caragata:
An efficient and secure SPN cryptosystem based on chaotic control parameters. ICITST 2011: 226-231
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-30 01:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint