Follow
Aymen Boudguiga
Aymen Boudguiga
Verified email at cea.fr - Homepage
Title
Cited by
Cited by
Year
Towards better availability and accountability for iot updates by means of a blockchain
A Boudguiga, N Bouzerna, L Granboulan, A Olivereau, F Quesnel, ...
2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 50-58, 2017
2772017
Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU
T Cheneau, A Boudguiga, M Laurent
computers & security 29 (4), 419-431, 2010
642010
A secure and authenticated key management protocol (SA-KMP) for vehicular networks
H Tan, M Ma, H Labiod, A Boudguiga, J Zhang, PHJ Chong
IEEE Transactions on Vehicular Technology 65 (12), 9570-9584, 2016
582016
Sara: Security automotive risk analysis method
JP Monteuuis, A Boudguiga, J Zhang, H Labiod, A Servel, P Urien
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 3-14, 2018
502018
A simple intrusion detection method for controller area network
A Boudguiga, W Klaudel, A Boulanger, P Chiron
2016 ieee international conference on communications (icc), 1-7, 2016
442016
ID based cryptography for cloud data storage
N Kaaniche, A Boudguiga, M Laurent
2013 IEEE Sixth International Conference on Cloud Computing, 375-382, 2013
392013
An efficient cyber defense framework for UAV-Edge computing network
H Sedjelmaci, A Boudguiga, IB Jemaa, SM Senouci
Ad Hoc Networks 94, 101970, 2019
262019
RACE: Risk analysis for cooperative engines
A Boudguiga, A Boulanger, P Chiron, W Klaudel, H Labiod, JC Seguy
2015 7th International Conference on New Technologies, Mobility and Security …, 2015
192015
Putting up the swiss army knife of homomorphic calculations by means of TFHE functional bootstrapping
PE Clet, M Zuber, A Boudguiga, R Sirdey, C Gouy-Pailler
Cryptology ePrint Archive, 2022
182022
Cooperative-its architecture and security challenges: a survey
A Boudguiga, A Kaiser, P Cincilla
Inteligent Transport System World Congress, 2015
142015
An authentication scheme for IEEE 802.11 s mesh networks relying on Sakai-Kasahara ID-Based Cryptographic algorithms
A Boudguiga, M Laurent
Third International Conference on Communications and Networking, 1-8, 2012
142012
A generic cyber defense scheme based on stackelberg game for vehicular network
H Sedjelmaci, IH Brahmi, A Boudguiga, W Klaudel
2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2018
102018
Cooperative and smart attacks detection systems in 6G-enabled Internet of Things
H Sedjelmaci, N Kheir, A Boudguiga, N Kaaniche
ICC 2022-IEEE International Conference on Communications, 5238-5243, 2022
92022
Server assisted key establishment for WSN: A MIKEY-Ticket approach
A Boudguiga, A Olivereau, N Oualha
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
9*2013
Revisiting stream-cipher-based homomorphic transciphering in the TFHE era
AA Bendoukha, A Boudguiga, R Sirdey
International Symposium on Foundations and Practice of Security, 19-33, 2021
82021
Cooperative security framework for CBTC network
H Sedjelmaci, F Guenab, A Boudguiga, Y Petiot
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
72018
Method and device for establishing session keys
A Boudguiga, N Oualha, A Olivereau, C Janneteau
US Patent 9,787,651, 2017
72017
Privacy Preserving Services for Intelligent Transportation Systems with Homomorphic Encryption.
A Boudguiga, O Stan, A Fazzat, H Labiod, PE Clet
ICISSP, 684-693, 2021
62021
On the performance of freescale i. MX6 cryptographic acceleration and assurance module
A Boudguiga, W Klaudel, JD Wesolowski
Proceedings of the 2015 Workshop on Rapid Simulation and Performance …, 2015
62015
Key-escrow resistant ID-based authentication scheme for IEEE 802.11 s mesh networks
A Boudguiga, M Laurent
2011 IEEE Wireless Communications and Networking Conference, 784-789, 2011
62011
The system can't perform the operation now. Try again later.
Articles 1–20