This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
en:students [2015/01/24 06:40] – [Alumni Ph. D. Students :] bouabdal | en:students [2021/01/26 07:15] (current) – [Alumni Ph. D. Students :] bouabdal | ||
---|---|---|---|
Line 7: | Line 7: | ||
===== Current Ph. D. Students : ===== | ===== Current Ph. D. Students : ===== | ||
- | | + | |
- | * **T. Rault**, " | + | |
- | * ** A. Barki**, " | + | * ** M. Mahamat** , "Green IoT security" |
- | + | ||
- | * **M. Sabt**, "Trust in mobile communication architectures" | + | |
- | * **L. Zaouche**, "Mobile swarm communication security" | + | * ** K. Abid**, "Security of channel acces protocols in dynamic IoT" |
+ | |||
+ | | ||
Line 22: | Line 22: | ||
===== Alumni Ph. D. Students : ===== | ===== Alumni Ph. D. Students : ===== | ||
- | * **A. Lounis**, " Cloud computing | + | * ** M. A. Kandi**, " Lightweight Key Management Solutions for Heterogeneous IoT", (December 2020)// |
+ | |||
+ | * ** M. Aboubakar**, | ||
+ | |||
+ | * **Y. Imine**, | ||
+ | |||
+ | * ** D-E, Kouicem**, | ||
+ | |||
+ | * **L. Zaouche**, " | ||
+ | |||
+ | * ** A. Barki**, " M2M security", | ||
+ | |||
+ | * **M. Sabt**, "Trust in mobile communication architectures", | ||
+ | |||
+ | * **T. Rault**, | ||
+ | |||
+ | * **A. Lounis**, " Cloud computing security", | ||
- | * **N. Maalel **, " Reliable routing in highly dynamic networks", | + | * **N. Maalel **, " Reliable routing in highly dynamic networks", |
- | * **M. Souil**, " Quality of service in Wireless Sensor Networks", | + | * **M. Souil**, " Quality of service in Wireless Sensor Networks", |
- | * **A. Hadjidj**, " Wireless Sensor Networks Reliability", | + | * **A. Hadjidj**, " Wireless Sensor Networks Reliability", |
- | * **W. Bechkit**, " Security and energy saving in Wireless Sensor Networks" | + | * **W. Bechkit**, " Security and energy saving in Wireless Sensor Networks" |
- | * **S. Hattahet**, " Worms propagation and detection in P2P networks ", | + | * **S. Hattahet**, " Worms propagation and detection in P2P networks ", (April 2011), //Currently |
- | * **M. Omar**, " Thrust models and architectures for mobile Ad'Hoc Networks", | + | * **M. Omar**, " Thrust models and architectures for mobile Ad'Hoc Networks", |
- | * **M. Abdelouahab**, | + | * **M. Abdelouahab**, |
- | * **S. Lanièpce**, | + | * **S. Lanièpce**, |
- | * **B. Malla**, " Key management in Wireless Sensor Networks", | + | * **B. Malla**, " Key management in Wireless Sensor Networks", |
- | * **M. Alkubeily**, | + | * **M. Alkubeily**, |
- | * **S. Gharout**, " multicast security in dynamic groups ", | + | * **S. Gharout**, " multicast security in dynamic groups ", (Nov. 2009), |
- | * **Y. Hinard**, " Billing in multicast communication ", | + | * **Y. Hinard**, " Billing in multicast communication ", (Oct. 2008), |
- | * **H. Ragab**, " security in hierarchical group communications", | + | * **H. Ragab**, " security in hierarchical group communications", |
- | * **M. Kellil**, " Multicast security in mobile IPv6", | + | * **M. Kellil**, " Multicast security in mobile IPv6", (sep. 2005), actually research enginneer in Industry |
- | * **I. Romdhani**, " Multicast communication in mobile IPv6 ", | + | * **I. Romdhani**, " Multicast communication in mobile IPv6 ", (may 2005), |
- | * **Y. Challal**, " multicast security ", | + | * **Y. Challal**, " multicast security ", (may 2005), HDR, associate professor at UTC (France) |
- | * **S. Hamida**, " security and fault-tolerance in mobile environment" | + | * **S. Hamida**, " security and fault-tolerance in mobile environment" |
- | * **H. Bettahar**, " Multicast communication in IP networks", | + | * **H. Bettahar**, " Multicast communication in IP networks", |
- | * **C. Beaujean**, " Routing in large scale networks ", | + | * **C. Beaujean**, " Routing in large scale networks ", (June 2001), |
- | * **S. Cateloin**, " Internet Routing and Quality of service", | + | * **S. Cateloin**, " Internet Routing and Quality of service", |
- | * **M. Yagoubi**, " Mutual exclusion in distributed systems", | + | * **M. Yagoubi**, " Mutual exclusion in distributed systems", |