This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
en:students [2020/05/22 19:02] – [Alumni Ph. D. Students :] bouabdal | en:students [2020/06/05 07:05] – [Alumni Ph. D. Students :] bouabdal | ||
---|---|---|---|
Line 29: | Line 29: | ||
* ** A. Barki**, " M2M security", | * ** A. Barki**, " M2M security", | ||
| | ||
- | * **M. Sabt**, "Trust in mobile communication architectures", | + | * **M. Sabt**, "Trust in mobile communication architectures", |
- | * **T. Rault**, | + | * **T. Rault**, |
- | * **A. Lounis**, " Cloud computing security", | + | * **A. Lounis**, " Cloud computing security", |
* **N. Maalel **, " Reliable routing in highly dynamic networks", | * **N. Maalel **, " Reliable routing in highly dynamic networks", | ||
Line 41: | Line 41: | ||
* **A. Hadjidj**, " Wireless Sensor Networks Reliability", | * **A. Hadjidj**, " Wireless Sensor Networks Reliability", | ||
- | * **W. Bechkit**, " Security and energy saving in Wireless Sensor Networks" | + | * **W. Bechkit**, " Security and energy saving in Wireless Sensor Networks" |
* **S. Hattahet**, " Worms propagation and detection in P2P networks ", (April 2011), //Currently Consultant in industry//. | * **S. Hattahet**, " Worms propagation and detection in P2P networks ", (April 2011), //Currently Consultant in industry//. |