A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT)
Hammi, Badis, Fayad, Achraf, Khatoun, Rida, Zeadally, Sherali, Begriche, Youcef
Published in IEEE systems journal (01.09.2020)
Published in IEEE systems journal (01.09.2020)
Get full text
Journal Article
Bubbles of Trust: A decentralized blockchain-based authentication system for IoT
Hammi, Mohamed Tahar, Hammi, Badis, Bellot, Patrick, Serhrouchni, Ahmed
Published in Computers & security (01.09.2018)
Published in Computers & security (01.09.2018)
Get full text
Journal Article
Survey on smart homes: Vulnerabilities, risks, and countermeasures
Hammi, Badis, Zeadally, Sherali, Khatoun, Rida, Nebhen, Jamel
Published in Computers & security (01.06.2022)
Published in Computers & security (01.06.2022)
Get full text
Journal Article
IoT technologies for smart cities
Hammi, Badis, Khatoun, Rida, Zeadally, Sherali, Fayad, Achraf, Khoukhi, Lyes
Published in IET networks (01.01.2018)
Published in IET networks (01.01.2018)
Get full text
Journal Article
Total Eclipse: How To Completely Isolate a Bitcoin Peer
Yves-Christian, Adja Elloh, Hammi, Badis, Serhrouchni, Ahmed, Labiod, Houda
Published in 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.10.2018)
Published in 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.10.2018)
Get full text
Conference Proceeding
A blockchain-based certificate revocation management and status verification system
Elloh Adja, Yves Christian, Hammi, Badis, Serhrouchni, Ahmed, Zeadally, Sherali
Published in Computers & security (01.05.2021)
Published in Computers & security (01.05.2021)
Get full text
Journal Article
PKIs in C-ITS: Security functions, architectures and projects: A survey
Hammi, Badis, Monteuuis, Jean-Philippe, Petit, Jonathan
Published in Vehicular Communications (01.12.2022)
Published in Vehicular Communications (01.12.2022)
Get full text
Journal Article
A secure multipath reactive protocol for routing in IoT and HANETs
Hammi, Badis, Zeadally, Sherali, Labiod, Houda, Khatoun, Rida, Begriche, Youcef, Khoukhi, Lyes
Published in Ad hoc networks (01.06.2020)
Published in Ad hoc networks (01.06.2020)
Get full text
Journal Article
Understanding botclouds from a system perspective: A principal component analysis
Badis, Hammi, Doyen, Guillaume, Khatoun, Rida
Published in 2014 IEEE Network Operations and Management Symposium (NOMS) (01.05.2014)
Published in 2014 IEEE Network Operations and Management Symposium (NOMS) (01.05.2014)
Get full text
Conference Proceeding
IoT technologiesfor smart cities
Hammi, Badis, Khatoun, Rida, Zeadally, Sherali, Fayad, Achraf, Khoukhi, Lyes
Published in IET networks (01.01.2018)
Published in IET networks (01.01.2018)
Get full text
Journal Article
A machine learning based approach for the detection of sybil attacks in C-ITS
Hammi, Badis, Idir, Mohamed Yacine, Khatoun, Rida
Published in 2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS) (28.09.2022)
Published in 2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS) (28.09.2022)
Get full text
Conference Proceeding
An adaptive authentication and authorization scheme for IoT's gateways: a blockchain based approach
Fayad, Achraf, Hammi, Badis, Khatoun, Rida
Published in 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.10.2018)
Published in 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.10.2018)
Get full text
Conference Proceeding
Blockchain Technology in the Healthcare Sector: Overview and Security Analysis
Madhoun, Nour El, Hammi, Badis
Published in 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC) (08.01.2024)
Published in 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC) (08.01.2024)
Get full text
Conference Proceeding
A Blockchain-based Lightweight Authentication Solution for IoT
Fayad, Achraf, Hammi, Badis, Khatoun, Rida, Serhrouchni, Ahmed
Published in 2019 3rd Cyber Security in Networking Conference (CSNet) (01.10.2019)
Published in 2019 3rd Cyber Security in Networking Conference (CSNet) (01.10.2019)
Get full text
Conference Proceeding
Clustering methods comparison: Application to source based detection of botclouds
Hammi, Badis, Rahal, Mohamed Cherif, Khatoun, Rida
Published in 2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.07.2016)
Published in 2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.07.2016)
Get full text
Conference Proceeding