This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
en:students [2014/07/17 00:00] – [Alumni Ph. D. Students :] bouabdal | en:students [2021/01/26 07:15] (current) – [Alumni Ph. D. Students :] bouabdal | ||
---|---|---|---|
Line 7: | Line 7: | ||
===== Current Ph. D. Students : ===== | ===== Current Ph. D. Students : ===== | ||
- | | + | |
- | * **Ahmed Lounis**, " | + | * **S. Benhamaid**, " |
- | * **Mallel Nourhene**, " | + | * ** M. Mahamat** , "Green IoT security" |
- | * **Tifenn Rault**, " | + | * ** K. Abid**, "Security of channel acces protocols |
- | * ** Amira Barki**, " M2M security" | ||
| | ||
- | * **Mohamed Sabt**, "Trust in mobile communication architectures" | ||
- | |||
- | * **Lotfi Zaouche**, " | ||
Line 26: | Line 22: | ||
===== Alumni Ph. D. Students : ===== | ===== Alumni Ph. D. Students : ===== | ||
- | * **Ahmed Lounis**, " Cloud computing | + | * ** M. A. Kandi**, " Lightweight Key Management Solutions for Heterogeneous IoT", (December 2020)// |
+ | |||
+ | * ** M. Aboubakar**, | ||
+ | |||
+ | * **Y. Imine**, | ||
+ | |||
+ | * ** D-E, Kouicem**, | ||
+ | |||
+ | * **L. Zaouche**, " | ||
+ | |||
+ | * ** A. Barki**, " M2M security", | ||
+ | |||
+ | * **M. Sabt**, "Trust in mobile communication architectures", | ||
+ | |||
+ | * **T. Rault**, | ||
+ | |||
+ | * **A. Lounis**, " Cloud computing security", | ||
- | * **Mallel Nourhene**, " Reliable routing in highly dynamic networks", | + | * **N. Maalel |
- | * **Marion | + | * **M. Souil**, " Quality of service in Wireless Sensor Networks", |
- | * **Abdelkrim | + | * **A. Hadjidj**, " Wireless Sensor Networks Reliability", |
- | * **Walid Bechkit**, " Security and energy saving in Wireless Sensor Networks" | + | * **W. Bechkit**, " Security and energy saving in Wireless Sensor Networks" |
- | * **Sinan Hattahet**, " Worms propagation and detection in P2P networks ", | + | * **S. Hattahet**, " Worms propagation and detection in P2P networks ", (April 2011), //Currently |
- | * **Mawloud | + | * **M. Omar**, " Thrust models and architectures for mobile Ad'Hoc Networks", |
- | * **Mahdi Abdelouahab**, | + | * **M. Abdelouahab**, |
- | * **Sylvie lanièpce**, " Routing by availability in hybrid Ad'Hoc Networks", | + | * **S. Lanièpce**, " Routing by availability in hybrid Ad'Hoc Networks", |
- | * **Boushra | + | * **B. Malla**, " Key management in Wireless Sensor Networks", |
- | * **Mothanna | + | * **M. Alkubeily**, |
- | * **Said Gharout**, " multicast security in dynamic groups ", | + | * **S. Gharout**, " multicast security in dynamic groups ", (Nov. 2009), |
- | * **Yoann Hinard**, " Billing in multicast communication ", | + | * **Y. Hinard**, " Billing in multicast communication ", (Oct. 2008), |
- | * **Hani Ragab**, " security in hierarchical group communications", | + | * **H. Ragab**, " security in hierarchical group communications", |
- | * **Mounir | + | * **M. Kellil**, " Multicast security in mobile IPv6", (sep. 2005), actually research enginneer in Industry |
- | * **Imed Romdhani**, " Multicast communication in mobile IPv6 ", | + | * **I. Romdhani**, " Multicast communication in mobile IPv6 ", (may 2005), |
- | * **Yacine | + | * **Y. Challal**, " multicast security ", (may 2005), HDR, associate professor at UTC (France) |
- | * **Seba Hamida**, " security and fault-tolerance in mobile environment" | + | * **S. Hamida**, " security and fault-tolerance in mobile environment" |
- | * **Hatem Bettahar**, " Multicast communication in IP networks", | + | * **H. Bettahar**, " Multicast communication in IP networks", |
- | * **Christophe | + | * **C. Beaujean**, " Routing in large scale networks ", (June 2001), |
- | * **Stephane | + | * **S. Cateloin**, " Internet Routing and Quality of service", |
- | * **Mohamed | + | * **M. Yagoubi**, " Mutual exclusion in distributed systems", |