Ali Kassem
Ali Kassem
Bestätigte E-Mail-Adresse bei polytechnique.edu
Titel
Zitiert von
Zitiert von
Jahr
Decentralized voting platform based on ethereum blockchain
D Khoury, EF Kfoury, A Kassem, H Harb
2018 IEEE International Multidisciplinary Conference on Engineering …, 2018
362018
Efficient neural chaotic generator for image encryption
A Kassem, HAH Hassan, Y Harkouss, R Assaf
Digital Signal Processing 25, 266-274, 2014
332014
A framework for analyzing verifiability in traditional and electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini
International Conference on Information Security Practice and Experience …, 2015
222015
Formal analysis of e-cash protocols
J Dreier, A Kassem, P Lafourcade
2015 12th International Joint Conference on e-Business and …, 2015
202015
The pitfalls of hashing for privacy
L Demir, A Kumar, M Cunche, C Lauradoux
IEEE Communications Surveys & Tutorials 20 (1), 551-565, 2017
172017
Formal analysis of electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini, PYA Ryan
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-12, 2014
172014
Monitoring electronic exams
A Kassem, Y Falcone, P Lafourcade
Runtime Verification, 118-135, 2015
112015
On the verifiability of (electronic) exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini
VERIMAG UMR 5104, Université Grenoble Alpes, France, 2015
82015
Formal analysis and offline monitoring of electronic exams
A Kassem, Y Falcone, P Lafourcade
Formal Methods in System Design 51 (1), 117-153, 2017
62017
New chaotic image encryption technique
HAH Hassan, A Kassem, Y Harkouss, R Assaf, S El Assad
2012 Symposium on Broadband Networks and Fast Internet (RELABIRA), 103-108, 2012
52012
Formal verification of e-reputation protocols
A Kassem, P Lafourcade, Y Lakhnech
International Symposium on Foundations and Practice of Security, 247-261, 2014
32014
Automated verification of e-cash protocols
J Dreier, A Kassem, P Lafourcade
International Conference on E-Business and Telecommunications, 223-244, 2015
22015
Formal security analysis of traditional and electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini, PYA Ryan
International Conference on E-Business and Telecommunications, 294-318, 2014
22014
A more realistic model for verifying route validity in ad-hoc networks
A Kassem, P Lafourcade, Y Lakhnech
International Symposium on Foundations and Practice of Security, 306-322, 2013
22013
Multiple independent lazy intruders
A Kassem, P Lafourcade, Y Lakhnech, S Mödersheim
1st Workshop on Hot Issues in Security Principles and Trust (HotSpot 2013), 2013
22013
Differential inference testing: A practical approach to evaluate sanitizations of datasets
A Kassem, G Acs, C Castelluccia, C Palamidessi
2019 IEEE Security and Privacy Workshops (SPW), 72-79, 2019
12019
Differential inference testing a practical approach to evaluate anonymized data
A Kassem, G Acs, C Castelluccia, C Palamidessi
INRIA, 2018
12018
BISM: Bytecode-Level Instrumentation for Software Monitoring
C Soueidi, A Kassem, Y Falcone
International Conference on Runtime Verification, 323-335, 2020
2020
Detecting Fault Injection Attacks with Runtime Verification
A Kassem, Y Falcone
Proceedings of the 3rd ACM Workshop on Software Protection, 65-76, 2019
2019
Trading Optimality for Performance in Location Privacy
K Chatzikokolakis, S Haddad, A Kassem, C Palamidessi
Proceedings of the 11th EAI International Conference on Performance …, 2017
2017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20