Skip to Main content Skip to Navigation

Search by documents



hal-02354927v1  Journal articles
Mounira MsahliAhmed Serhrouchni. Profile centric modelling
INDERSCIENCE International Journal of Internet Technology and Secured Transactions., Inderscience Enterprises, 2014, 5 (4), pp.344. ⟨10.1504/IJITST.2014.068713⟩
hal-02354923v1  Conference papers
Ashref AlouiMounira MsahliTalel AbdessalemStephane BressanSihem Mesnager. Protocol for preserving privacy in distributed system (PPDS)
2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Jun 2017, Valencia, France. pp.1885-1890, ⟨10.1109/IWCMC.2017.7986571⟩
hal-02354925v1  Conference papers
Mounira Msahli. Keynote speech
2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ), Feb 2018, Miami Beach, France. pp.1-1, ⟨10.1109/MOBISECSERV.2018.8311434⟩
hal-02354919v1  Conference papers
Mayssa JemelMounira MsahliAhmed Serhrouchni. Digital safe: Secure synchronization of shared files
2015 11th International Conference on Information Assurance and Security (IAS), Dec 2015, Marrakech, France. pp.67-72, ⟨10.1109/ISIAS.2015.7492747⟩
hal-02354920v1  Conference papers
Mayssa JemelMounira MsahliAhmed Serhrouchni. Towards an Efficient File Synchronization between Digital Safes
2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), Mar 2017, Taipei, France. pp.136-143, ⟨10.1109/AINA.2017.115⟩
hal-02354922v1  Conference papers
Mayssa JemelMounira MsahliAhmed Serhrouchni. SyncDS: A digital safe based file synchronization approach
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), Jan 2016, Las Vegas, France. pp.317-318, ⟨10.1109/CCNC.2016.7444796⟩
hal-03042230v1  Conference papers
Mounira MsahliRached AbdeljaouedAhmed Serhrouchni. Access control in probative value cloud
8th International Conference for Internet Technology and Secured Transactions (ICITST 2013), Dec 2013, London, France. pp.607-611, ⟨10.1109/ICITST.2013.6750274⟩
hal-03042232v1  Conference papers
Balkis HamdaneMounira MsahliAhmed SerhrouchniSihem Guemara El Fatmi. Data-based access control in Named Data Networking
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Oct 2013, Austin, France. ⟨10.4108/icst.collaboratecom.2013.254180⟩
hal-02354918v1  Conference papers
Mounira MsahliGuy PujolleAhmed SerhrouchniAhmad FadlallahFouad Guenane. Openflow and on demand networks
2012 Third International Conference on the Network of the Future (NOF), Nov 2012, Tunis, Tunisia. pp.1-5, ⟨10.1109/NOF.2012.6464006⟩
hal-02354926v1  Conference papers
Mounira MsahliMohamed Tahar HammiAhmed Serhrouchni. Safe box cloud authentication using TLS extesion
2015 International Conference on Cyber Security of Smart cities, Industrial Control System and Communications (SSIC), Aug 2015, Shanghai, France. pp.1-6, ⟨10.1109/SSIC.2015.7245679⟩
hal-03569422v1  Conference papers
Mounira MsahliBadr Eddine BoukariAkshaya Ravi. Machine Learning Detection for SMiShing Frauds
2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), Jan 2021, Las Vegas, France. pp.1-2, ⟨10.1109/CCNC49032.2021.9369640⟩
hal-02353278v1  Conference papers
Ashref AlouiMounira MsahliTalel AbdessalemStephane BressanSihem Mesnager. Preserving privacy in distributed system (PPDS) protocol: Security analysis
2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC), Dec 2017, San Diego, France. pp.1-7, ⟨10.1109/PCCC.2017.8280505⟩
hal-02354694v1  Conference papers
Mounira MsahliHouda LabiodGilles Ampt. Security Interoperability for Cooperative ITS: Architecture and Validation
2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Jun 2019, CANARY ISLANDS, France. pp.1-6, ⟨10.1109/NTMS.2019.8763819⟩
hal-03569465v1  Journal articles
Sihem MesnagerBimal MandalMounira Msahli. Survey on recent trends towards generalized differential and boomerang uniformities
Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , Springer, 2021, ⟨10.1007/s12095-021-00551-6⟩
hal-03569438v1  Book sections
Laetitia DebesseSihem MesnagerMounira Msahli. POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack
Applied Cryptography and Network Security Workshops, 12809, Springer International Publishing, pp.485-489, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-81645-2_27⟩