default search action
Sihem Guemara El Fatmi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c59]Nadia Kammoun, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
Ensuring Data Integrity Using Digital Signature in an IoT Environment. AINA (3) 2022: 482-491 - 2021
- [c58]Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
Formal Validation of Credibility and Accuracy Assessment of Safety Messages in VANETs. ARES 2021: 52:1-52:7 - [c57]Ons Chikhaoui, Ryma Abassi, Aida Ben Chehida Douss, Sihem Guemara El Fatmi:
Formal Validation of a Security Mechanism against the RSU Compromise Attack. ARES 2021: 54:1-54:8 - [c56]Hana Rhim, Karim Tamine, Ryma Abassi, Damien Sauveron, Sihem Guemara El Fatmi:
Enhancing security using digital signature in an efficient Network Coding-enabled WSN. SSD 2021: 70-78 - [c55]Amira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi:
Towards the Performance Evaluation of a Trust Based Routing Protocol for VANET. AINA (1) 2021: 113-124 - [c54]Nadia Kammoun, Ryma Abassi, Sihem Guemara El Fatmi, Mohamed Mosbah:
A Lightweight Authentication Scheme for SDN-Based Architecture in IoT. AINA (3) 2021: 336-345 - [c53]Amira Kchaou, Ryma Abassi, Samiha Ayed, Sihem Guemara El Fatmi:
A Distributed Resource Management for VANET using Smart Contract. IWCMC 2021: 1448-1453 - 2020
- [c52]Amira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi:
Towards the performance evaluation of a clustering and trust based security mechanism for VANET. ARES 2020: 52:1-52:6 - [c51]Nadia Kammoun, Ryma Abassi, Sihem Guemara El Fatmi, Mohamed Mosbah:
A New SDN Architecture Based on Trust Management and Access Control for IoT. AINA Workshops 2020: 245-254 - [c50]Hana Rhim, Ryma Abassi, Karim Tamine, Damien Sauveron, Sihem Guemara El Fatmi:
A secure network coding-enabled approach for a confidential cluster-based routing in wireless sensor networks. SAC 2020: 2151-2157 - [c49]Amira Kchaou, Samiha Ayed, Ryma Abassi, Sihem Guemara El Fatmi:
Smart Contract-Based Access Control for the Vehicular Networks. SoftCOM 2020: 1-6
2010 – 2019
- 2019
- [c48]Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
A Formal Environment for Credibility and Accuracy Assessment of Safety Messages Exchanged in VANETs. EMCIS 2019: 391-402 - [c47]Ons Chikhaoui, Ryma Abassi, Aida Ben Chehida Douss, Sihem Guemara El Fatmi:
A Security Mechanism Against the RSU Compromise Attack in a Ticket-Based Authentication Scheme for VANETs. EMCIS 2019: 403-416 - [c46]Nadia Kammoun, Ryma Abassi, Sihem Guemara El Fatmi:
Towards a New Clustering Algorithm based on Trust Management and Edge Computing for IoT. IWCMC 2019: 1570-1575 - 2018
- [j6]Hana Rhim, Karim Tamine, Ryma Abassi, Damien Sauveron, Sihem Guemara El Fatmi:
A multi-hop graph-based approach for an energy-efficient routing protocol in wireless sensor networks. Hum. centric Comput. Inf. Sci. 8: 30 (2018) - [j5]Balkis Hamdane, Rihab Boussada, Mohamed Elhoucine Elhdhili, Sihem Guemara El Fatmi:
Enhancing Security and Trust in Named Data Networking using Hierarchical Identity Based Cryptography. Int. J. Syst. Serv. Oriented Eng. 8(1): 1-20 (2018) - [c45]Amira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi:
Toward a Distributed Trust Management scheme for VANET. ARES 2018: 53:1-53:6 - [c44]Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
Towards a Privacy Preserving and Flexible Scheme for Assessing the Credibility and the Accuracy of Safety Messages Exchanged in VANETs. ARES 2018: 55:1-55:9 - [c43]Amira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi:
Towards a Secured Clustering Mechanism for Messages Exchange in VANET. AINA Workshops 2018: 88-93 - [c42]Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
Towards the Formal Validation of a Ticket-Based Authentication Scheme for VANETs. AINA Workshops 2018: 496-501 - [c41]Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
Towards the Optimization of a Ticket-based Authentication Scheme for VANETs. COMNET 2018: 1-4 - [c40]Amira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi:
A New Trust based Routing Protocol for VANETs. COMNET 2018: 1-6 - 2017
- [j4]Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
A trust-based security environment in MANET: definition and performance evaluation. Ann. des Télécommunications 72(7-8): 491-498 (2017) - [c39]Ons Chikhaoui, Aida Ben Chehida, Ryma Abassi, Sihem Guemara El Fatmi:
A Ticket-Based Authentication Scheme for VANETs Preserving Privacy. ADHOC-NOW 2017: 77-91 - [c38]Ryma Abassi, Sihem Guemara El Fatmi:
A Trust Based Communication Scheme for Safety Messages Exchange in VANETs. ADHOC-NOW 2017: 92-103 - [c37]Balkis Hamdane, Rihab Boussada, Mohamed Elhoucine Elhdhili, Sihem Guemara El Fatmi:
Hierarchical Identity Based Cryptography for Security and Trust in Named Data Networking. WETICE 2017: 226-231 - [c36]Balkis Hamdane, Rihab Boussada, Mohamed Elhoucine Elhdhili, Sihem Guemara El Fatmi:
Towards a Secure Access to Content in Named Data Networking. WETICE 2017: 250-255 - 2015
- [c35]Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
A Model for Specification and Validation of a Trust Management Based Security Scheme in a MANET Environment. ARES 2015: 341-350 - [c34]Aida Ben Chehida Douss, Samiha Ayed, Ryma Abassi, Nora Cuppens, Sihem Guemara El Fatmi:
Trust Negotiation Based Approach to Enforce MANET Routing Security. ARES 2015: 360-366 - [c33]Aida Ben Chehida Douss, Ryma Abassi, Nihel Ben Youssef, Sihem Guemara El Fatmi:
A Formal Environment for MANET Organization and Security. CANS 2015: 144-159 - [c32]Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
Toward Securing MANET Against the Energy Depletion Attack. CRiSIS 2015: 292-306 - [c31]Balkis Hamdane, Sihem Guemara El Fatmi:
A credential and encryption based access control solution for named data networking. IM 2015: 1234-1237 - 2014
- [c30]Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
A Trust Management Based Security Mechanism against Collusion Attacks in a MANET Environment. ARES 2014: 325-332 - [c29]Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
A novel secure Ad hoc routing protocol using one time password. ICALT 2014: 41-46 - [c28]Balkis Hamdane, Sihem Guemara El Fatmi, Ahmed Serhrouchni:
A novel name-based security mechanism for information-centric networking. WCNC 2014: 2928-2933 - 2013
- [c27]Aida Ben Chehida, Ryma Abassi, Sihem Guemara El Fatmi:
A Reputation-Based Clustering Mechanism for MANET Routing Security. ARES 2013: 310-315 - [c26]Balkis Hamdane, Mounira Msahli, Ahmed Serhrouchni, Sihem Guemara El Fatmi:
Data-based access control in named data networking. CollaborateCom 2013: 531-536 - [c25]Balkis Hamdane, Ahmed Serhrouchni, Sihem Guemara El Fatmi:
Access control enforcement in Named Data Networking. ICITST 2013: 576-581 - [c24]Ryma Abassi, Sihem Guemara El Fatmi:
Dealing with delegation in a trust-based MANET. ICT 2013: 1-5 - 2012
- [c23]Ryma Abassi, Sihem Guemara El Fatmi:
Trust-based delegation for Ad Hoc QoS enhancing. CRiSIS 2012: 1-7 - [c22]Ryma Abassi, Sihem Guemara El Fatmi:
Towards a generic trust management model. ICT 2012: 1-6 - [c21]Ryma Abassi, Sihem Guemara El Fatmi:
Delegation Management Modeling in a Security Policy based Environment. SCSS 2012: 85-95 - 2011
- [c20]Ryma Abassi, Sihem Guemara El Fatmi:
Using security policies in a network securing process. ICT 2011: 416-421
2000 – 2009
- 2009
- [c19]Ryma Abassi, Sihem Guemara El Fatmi:
Dealing with Multi Security Policies in Communication Networks. ICNS 2009: 282-287 - [c18]Ryma Abassi, Sihem Guemara El Fatmi:
Towards a test cases generation method for Security Policies. ICT 2009: 41-46 - 2008
- [c17]Ryma Abassi, Sihem Guemara El Fatmi:
A Model for Specification and Validation of Security Policies in Communication Networks: The Firewall Case. ARES 2008: 467-472 - [c16]Ryma Abassi, Sihem Guemara El Fatmi:
An Automated Validation Method for Security Policies: The Firewall Case. IAS 2008: 291-294 - [c15]Ryma Abassi, Sihem Guemara El Fatmi:
Towards an automated firewall security policies validation process. CRiSIS 2008: 267-272 - 2007
- [j3]Amor Lazzez, Yassine Ramadhane Khlifi, Sihem Guemara-ElFatmi, Noureddine Boudriga, Mohammad S. Obaidat:
A novel node architecture for optical networks: Modeling, analysis and performance evaluation. Comput. Commun. 30(5): 999-1014 (2007) - [c14]Amor Lazzez, Noureddine Boudriga, Mohammad S. Obaidat, Sihem Guemara-ElFatmi:
A QoS-Oriented Protocol for Burst Admission Control in OBS Networks. AICCSA 2007: 172-179 - [c13]Yassine Ramadhane Khlifi, Noureddine Boudriga, Mohammad S. Obaidat, Sihem Guemara-ElFatmi:
Admission Control in Optical Label Switched Networks: A Dynamic QoS-Based Approach. Annual Simulation Symposium 2007: 106-113 - [c12]Amor Lazzez, Sihem Guemara-ElFatmi, Noureddine Boudriga, Mohammad S. Obaidat:
A Dynamic QoS-Based Scheme for Admission Control in OBS Networks. ICC 2007: 449-454 - [c11]Hassene Bouhouch, Sihem Guemara El Fatmi:
QoS Routing In Ad Hoc Networks by Integreting Activity in the OLSR Protocol. ICSNC 2007: 1 - 2006
- [c10]Moëz Cherif, Sihem Guemara El Fatmi:
QoS Oriented Contention Resolution Techniques for Optical Burst Switching Networks. BROADNETS 2006 - 2005
- [c9]Noureddine Boudriga, Mohammad S. Obaidat, Moëz Cherif, Sihem Guemara-ElFatmi:
An advance dynamic resource reservation algorithm for OBS networks: Design and performance. ICECS 2005: 1-4 - [c8]Yassine Ramadhane Khlifi, Sihem Guemara El Fatmi, Noureddine Boudriga:
Optical Label Switching: Design issues, modeling and performance analysis. ICECS 2005: 1-5 - [c7]Amor Lazzez, Sihem Guemara El Fatmi, Noureddine Boudriga:
Performance analysis and simulation of a novel OBS network architecture. ICECS 2005: 1-5 - [c6]Amel Meddeb-Makhlouf, Sihem Guemara-ElFatmi, Sihem Barrah:
New correlation method for an efficient intrusion detection system. ICECS 2005: 1-4 - 2004
- [j2]Sihem Guemara-ElFatmi, Noureddine Boudriga, Mohammad S. Obaidat:
Relational-based calculus for trust management in networked services. Comput. Commun. 27(12): 1206-1219 (2004) - [c5]Lamia Chaffai-Sghaier, Sihem Guemara-ElFatmi:
Relational-based Trust Management in a Generic Payment System. EGCDMAS 2004: 116-126 - 2002
- [c4]Sihem Guemara El Fatmi, Noureddine Boudriga, Mohammad S. Obaidat:
Quality of service provision in high-speed networks: an active approach. ICECS 2002: 1071-1074 - 2001
- [c3]Sihem Guemara El Fatmi, Noureddine Boudriga:
Synchronizing multimedia flows in active-high-speed networks. ICON 2001: 50-55
1990 – 1999
- 1997
- [j1]Noureddine Boudriga, Mohammad S. Obaidat, Sihem Guemara-ElFatmi:
Multiple connections in data communication and advanced applications. Comput. Commun. 20(12): 1051-1058 (1997) - [c2]Noureddine Boudriga, Sihem Guemara-ElFatmi:
Formal Protocol Description: Model and validation. RelMiCS 1997: 187-203 - [c1]Noureddine Boudriga, Sihem Guemara-ElFatmi:
Extended connection models for advanced applications. FTDCS 1997: 208-215
Coauthor Index
aka: Aida Ben Chehida
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint