scispace - formally typeset
M

Marwa Ahmim

Researcher at University of Annaba

Publications -  8
Citations -  20

Marwa Ahmim is an academic researcher from University of Annaba. The author has contributed to research in topics: Computer science & Authentication (law). The author has an hindex of 1, co-authored 3 publications receiving 1 citations.

Papers
More filters
Journal ArticleDOI

TAKE-IoT: Tiny Authenticated Key Exchange Protocol for the Internet of Things

TL;DR: Results show that TAKE-IoT can reach a proper level of security without sacrificing its efficiency in the context of IoT.
Journal ArticleDOI

Security analysis on “Three-factor authentication protocol using physical unclonable function for IoV”

TL;DR: The security analysis of Jiang et al.'s proposed three-factor authentication protocol for IoV environment is detailed, which proves the limit of security guarantees between only user and data center due to the possibility for an adversary to deduce a session key shared between vehicle sensor and data Center and between vehicle Sensor and user.
Journal ArticleDOI

Formal analysis of efficiency and safety in IPSec based on internet key exchange protocol

TL;DR: The security analysis and formal verification using automated validation of internet security protocols and applications AVISPA tools show that the proposed IKE protocol can resist to various attack types such as modification, reflection, replay, DoS and man-in-the-middle.
Journal ArticleDOI

Blockchain-Based Authentication Scheme for Collaborative Traffic Light Systems Using Fog Computing

TL;DR: In this article , a blockchain-based authentication scheme named VDAS using the fog computing paradigm is presented. But no published work has addressed the security of a traffic light system from data collection to data access, and it is evident that the conventional cloud computing architecture is incapable of analyzing and managing the massive amount of generated data.
Proceedings ArticleDOI

An Enhanced of Secure Authentication Scheme for the Internet of Things

TL;DR: Wang et al. as discussed by the authors presented an enhanced secure authentication scheme (E-SAS) to solve the security flaws of SAS, which is secure face to several active and passive security attacks.