default search action
Mohamed Aymen Chalouf
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c26]Tidiane Sylla, Mohamed Aymen Chalouf, Léo Mendiboure, Francine Krief, Hasnaâ Aniss, Lylia Alouache:
Applying Fuzzy Logic to Efficiently Manage Shared Edge Infrastructure. WETICE 2023: 1-6 - 2022
- [j16]Tidiane Sylla, Léo Mendiboure, Sassi Maaloul, Hasnaâ Aniss, Mohamed Aymen Chalouf, Stéphane Delbruel:
Multi-Connectivity for 5G Networks and Beyond: A Survey. Sensors 22(19): 7591 (2022) - 2021
- [j15]Tidiane Sylla, Mohamed Aymen Chalouf, Francine Krief, Karim Samaké:
Context-aware security in the internet of things: a survey. Int. J. Auton. Adapt. Commun. Syst. 14(3): 231-263 (2021) - [j14]Tidiane Sylla, Mohamed Aymen Chalouf, Francine Krief, Karim Samaké:
SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things. Secur. Commun. Networks 2021: 6632747:1-6632747:24 (2021) - [j13]Tidiane Sylla, Léo Mendiboure, Mohamed Aymen Chalouf, Francine Krief:
Blockchain-Based Context-Aware Authorization Management as a Service in IoT. Sensors 21(22): 7656 (2021) - 2020
- [j12]Léo Mendiboure, Mohamed Aymen Chalouf, Francine Krief:
Load-Aware and Mobility-Aware Flow Rules Management in Software Defined Vehicular Access Networks. IEEE Access 8: 167411-167424 (2020) - [j11]Léo Mendiboure, Mohamed Aymen Chalouf, Francine Krief:
Survey on blockchain-based applications in internet of vehicles. Comput. Electr. Eng. 84: 106646 (2020) - [j10]Amal Sammoud, Mohamed Aymen Chalouf, Omessaad Hamdi, Nicolas Montavont, Ammar Bouallegue:
A new biometrics-based key establishment protocol in WBAN: energy efficiency and security robustness analysis. Comput. Secur. 96: 101838 (2020) - [c25]Léo Mendiboure, Mohamed Aymen Chalouf, Francine Krief:
A Scalable Blockchain-based Approach for Authentication and Access Control in Software Defined Vehicular Networks. ICCCN 2020: 1-11 - [c24]Amal Sammoud, Mohamed Aymen Chalouf, Omessaad Hamdi, Nicolas Montavont, Ammar Bouallègue:
A secure and lightweight three-factor authentication and key generation scheme for direct communication between healthcare professionals and patient's WMSN. ISCC 2020: 1-6 - [c23]Amal Sammoud, Mohamed Aymen Chalouf, Omessaad Hamdi, Nicolas Montavont, Ammar Bouallegue:
A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity. IWCMC 2020: 1916-1921 - [i1]Tidiane Sylla, Mohamed Aymen Chalouf, Francine Krief, Karim Samaké:
Towards a Context-Aware Security and Privacy as a Service in the Internet of Things. CoRR abs/2003.02164 (2020)
2010 – 2019
- 2019
- [j9]Dramane Ouattara, Mohamed Aymen Chalouf, Francine Krief:
Towards cognitive radio-based eHealth systems. Int. J. Auton. Adapt. Commun. Syst. 12(1): 1-33 (2019) - [j8]Léo Mendiboure, Mohamed Aymen Chalouf, Francine Krief:
Edge Computing Based Applications in Vehicular Environments: Comparative Study and Main Issues. J. Comput. Sci. Technol. 34(4): 869-886 (2019) - [c22]Léo Mendiboure, Mohamed Aymen Chalouf, Francine Krief:
Towards a 5G Vehicular Architecture. Nets4Cars/Nets4Trains/Nets4Aircraft 2019: 3-15 - [c21]Léo Mendiboure, Mohamed Aymen Chalouf, Francine Krief:
A SDN-Based Pub/Sub Middleware for Geographic Content Dissemination in Internet of Vehicles. VTC Fall 2019: 1-6 - [c20]Tidiane Sylla, Mohamed Aymen Chalouf, Francine Krief, Karim Samaké:
Towards a Context-Aware Security and Privacy as a Service in the Internet of Things. WISTP 2019: 240-252 - 2018
- [c19]Léo Mendiboure, Mohamed Aymen Chalouf, Francine Krief:
Towards a Blockchain-Based SD-IoV for Applications Authentication and Trust Management. IOV 2018: 265-277 - [c18]Amal Sammoud, Omessaad Hamdi, Mohamed Aymen Chalouf, Ammar Bouallegue:
A new protocol for an efficient and green biometric-based security key establishment in WBAN's. IWCMC 2018: 762-767 - 2015
- [j7]Dramane Ouattara, Mohamed Aymen Chalouf, Francine Krief, Omessaad Hamdi:
Wireless Broadband Opportunities through TVWS for Networking in Rural areas of Africa. EAI Endorsed Trans. Ind. Networks Intell. Syst. 2(3): e4 (2015) - [c17]Mohamed Aymen Chalouf, Martin Peres, Francine Krief:
Fast deployment of an energy-efficient heterogeneous wireless network for disaster management. ICT-DM 2015: 49-56 - [c16]Dramane Ouattara, Mohamed Aymen Chalouf, Martin Peres, Francine Krief:
Signaling and QoS control in resilient cognitive radio networks. CFIP/NOTERE 2015: 1-6 - 2014
- [j6]Omessaad Hamdi, Mohamed Aymen Chalouf, Dramane Ouattara, Francine Krief:
eHealth: Survey on research projects, comparative study of telemonitoring architectures and main issues. J. Netw. Comput. Appl. 46: 100-112 (2014) - [c15]Dramane Ouattara, Mohamed Aymen Chalouf, Omessaad Hamdi, Francine Krief:
A QoS-control framework for medical multimedia data transmission in CRN environment. ISCC 2014: 1-7 - [c14]Martin Peres, Mohamed Aymen Chalouf, Francine Krief:
PHY/MAC signalling protocols for resilient cognitive radio networks. SoftCOM 2014: 310-314 - [c13]Martin Peres, Mohamed Aymen Chalouf, Francine Krief:
A Run-Time Generic Decision Framework for Power and Performance Management on Mobile Devices. UIC/ATC/ScalCom 2014: 72-79 - [c12]Dramane Ouattara, Mohamed Aymen Chalouf, Omessaad Hamdi, Francine Krief:
Multimedia content delivery for remote patient monitoring using cognitive radio networks. WTS 2014: 1-8 - 2013
- [j5]Mohamed Aymen Chalouf, Francine Krief:
A secured, automated, and dynamic end-to-end service level negotiation. Concurr. Comput. Pract. Exp. 25(2): 180-202 (2013) - [c11]Dramane Ouattara, Francine Krief, Mohamed Aymen Chalouf, Tegawendé F. Bissyandé:
Improving Rural Emergency Services with Cognitive Radio Networks in Sub-Saharan Africa. AFRICOMM 2013: 104-114 - [c10]Dramane Ouattara, Minh Thao Quach, Francine Krief, Mohamed Aymen Chalouf, Hicham Khalife:
Mitigating the hospital area communication's interference using Cognitive Radio Networks. Healthcom 2013: 324-328 - [c9]Mohamed Aymen Chalouf, Francine Krief, Nader Mbarek, Tayeb Lemlouma:
Improvement of a service level negotiation protocol using formal verification. ISCC 2013: 783-788 - 2012
- [j4]Mohamed Aymen Chalouf, Ismail Djama, Toufik Ahmed, Francine Krief:
An end-to-end QoS and security joint management for IPTV service delivery. Int. J. Auton. Adapt. Commun. Syst. 5(4): 398-416 (2012) - [c8]Tayeb Lemlouma, Mohamed Aymen Chalouf:
Smart Media Services through TV Sets for Elderly and Dependent Persons. MobiHealth 2012: 30-40 - [c7]Dramane Ouattara, Francine Krief, Mohamed Aymen Chalouf, Omessaad Hamdi:
Spectrum Sensing Improvement in Cognitive Radio Networks for Real-Time Patients Monitoring. MobiHealth 2012: 179-188 - [c6]Dramane Ouattara, Francine Krief, Mohamed Aymen Chalouf, Omessaad Hamdi:
Un système de prédiction spectrale pour une connectivité permanente dans le cadre du suivi en temps réel de patients. CFIP/NOTERE (Sélection) 2012: 99-120 - 2011
- [j3]Mohamed Aymen Chalouf, Nader Mbarek, Francine Krief:
Quality of Service and security negotiation for autonomous management of Next Generation Networks. Netw. Protoc. Algorithms 3(2): 54-86 (2011) - [c5]Nader Mbarek, Mohamed Aymen Chalouf, Francine Krief:
Towards global service level guarantee within autonomic computing systems. Integrated Network Management 2011: 446-453 - 2010
- [j2]Mohamed Aymen Chalouf, Francine Krief:
Négociation de niveau de service dans les environnements ubiquitaires. Stud. Inform. Univ. 8(3): 1-24 (2010) - [c4]Mohamed Aymen Chalouf, Francine Krief, Sinda Boussen:
A Service Level Guarantee for SCTP-Based Applications. RIVF 2010: 1-4
2000 – 2009
- 2009
- [j1]Mohamed Aymen Chalouf, Francine Krief:
A Secured Service Level Negotiation In Ubiquitous Environments. Int. J. Commun. Networks Inf. Secur. 1(2) (2009) - [c3]Mohamed Aymen Chalouf, Francine Krief:
Service level negotiation in ubiquitous environments. ISCC 2009: 655-660 - [c2]Mohamed Aymen Chalouf, Ismail Djama, Toufik Ahmed, Francine Krief:
On tightly managing end-to-end QoS and security for IPTV service delivery. IWCMC 2009: 1030-1034 - 2008
- [c1]Mohamed Aymen Chalouf, Xavier Delord, Francine Krief:
Introduction of Security in the Service Level Negotiated with SLNP Protocol. NTMS 2008: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint