Follow
Mohamed Dafir ECH-CHERIF EL KETTANI
Mohamed Dafir ECH-CHERIF EL KETTANI
Mohammed V University in Rabat
Verified email at um5.ac.ma
Title
Cited by
Cited by
Year
Load balancing cloud computing: state of art
A Khiyaita, H El Bakkali, M Zbakh, D El Kettani
2012 National Days of Network Security and Systems, 106-109, 2012
1882012
Analysis of identity management systems using blockchain technology
S El Haddouti, MDEC El Kettani
2019 International Conference on Advanced Communication Technologies and …, 2019
1032019
MitM detection and defense mechanism CBNA-RF based on machine learning for large-scale SDN context
A Sebbar, K Zkik, Y Baddi, M Boulmalf, MDECE Kettani
Journal of Ambient Intelligence and Humanized Computing 11 (12), 5875-5894, 2020
482020
A verifiable fully homomorphic encryption scheme for cloud computing security
A El-Yahyaoui, MD ECH-CHERIF EL KETTANI
Technologies 7 (1), 21, 2019
262019
Detection MITM attack in multi-SDN controller
A Sebbar, M Boulmalf, MDEC El Kettani, Y Baddi
2018 IEEE 5th International Congress on Information Science and Technology …, 2018
232018
MIdM: an open architecture for mobile identity management
MDEC El Kettani, B En-Nasry
JoC 2 (2), 25-32, 2011
232011
Fully homomorphic encryption: state of art and comparison
ELY Ahmed, MD Elkettani
International Journal of Computer Science and Information Security (IJCSIS …, 2016
212016
A verifiable fully homomorphic encryption scheme to secure big data in cloud computing
AEYMDECE Kettani
International Conference on Wireless Networks and Mobile Communications …, 2017
19*2017
VNS-RP algorithm for RP selection in multicast routing protocol PIM-SM
Y Baddi, MDEC El Kettani
2012 International Conference on Multimedia Computing and Systems, 595-600, 2012
192012
Towards an interoperable identity management framework: a comparative study
SE Haddouti, MDECE Kettani
arXiv preprint arXiv:1902.11184, 2019
172019
An Efficient Fully Homomorphic Encryption Scheme.
A El-Yahyaoui, MDEC El Kettani
Int. J. Netw. Secur. 21 (1), 91-99, 2019
172019
Data privacy in cloud computing
A El-Yahyaoui, MDEC El Kettani
2018 4th International Conference on Computer and Technology Applications …, 2018
152018
Using advanced detection and prevention technique to mitigate threats in SDN architecture
A Sebbar, Z Karim, Y Baddi, M Boulmalf, MDEC El Kettani
2019 15th International Wireless Communications & Mobile Computing …, 2019
142019
Parallel GRASP algorithm with delay and delay variation for core selection in shared tree based multicast routing protocols
Y Baddi, MDEC El Kettani
Third international conference on innovative computing technology (INTECH …, 2013
112013
A Task Allocation Algorithm For Distributed Systems
M Zbakh, MDE Kettani
Journal of Theoretical and Applied Information Technology 33 (1), 15-21, 2011
112011
Towards an open framework for mobile digital identity management through strong authentication methods
B En-Nasry, M Dafir Ech-Cherif El Kettani
Secure and Trust Computing, Data Management, and Applications: STA 2011 …, 2011
112011
VND-CS: A variable neighborhood descent algorithm for core selection problem in multicast routing protocol
Y Baddi, MDEC El Kettani
Networked Digital Technologies: 4th International Conference, NDT 2012 …, 2012
102012
New context-based node acceptance CBNA framework for MitM detection in SDN Architecture
A Sebbar, K Zkik, M Boulmalf, MDEC El Kettani
Procedia Computer Science 160, 825-830, 2019
92019
Secure data sharing framework based on supervised machine learning detection system for future SDN-based networks
A Sebbar, K Zkik, Y Baddi, M Boulmalf, MD Ech-Cherif El Kettani
Machine Intelligence and Big Data Analytics for Cybersecurity Applications …, 2021
82021
Key management for secure multicast communication: A survey
Y Baddi, MDEC El Kettani
2013 National Security Days (JNS3), 1-6, 2013
82013
The system can't perform the operation now. Try again later.
Articles 1–20