This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
en:students [2020/05/22 19:02] – [Alumni Ph. D. Students :] bouabdal | en:students [2020/06/05 07:12] – [Alumni Ph. D. Students :] bouabdal | ||
---|---|---|---|
Line 29: | Line 29: | ||
* ** A. Barki**, " M2M security", | * ** A. Barki**, " M2M security", | ||
| | ||
- | * **M. Sabt**, "Trust in mobile communication architectures", | + | * **M. Sabt**, "Trust in mobile communication architectures", |
- | * **T. Rault**, | + | * **T. Rault**, |
- | * **A. Lounis**, " Cloud computing security", | + | * **A. Lounis**, " Cloud computing security", |
* **N. Maalel **, " Reliable routing in highly dynamic networks", | * **N. Maalel **, " Reliable routing in highly dynamic networks", | ||
Line 41: | Line 41: | ||
* **A. Hadjidj**, " Wireless Sensor Networks Reliability", | * **A. Hadjidj**, " Wireless Sensor Networks Reliability", | ||
- | * **W. Bechkit**, " Security and energy saving in Wireless Sensor Networks" | + | * **W. Bechkit**, " Security and energy saving in Wireless Sensor Networks" |
* **S. Hattahet**, " Worms propagation and detection in P2P networks ", (April 2011), //Currently Consultant in industry//. | * **S. Hattahet**, " Worms propagation and detection in P2P networks ", (April 2011), //Currently Consultant in industry//. | ||
Line 47: | Line 47: | ||
* **M. Omar**, " Thrust models and architectures for mobile Ad'Hoc Networks", | * **M. Omar**, " Thrust models and architectures for mobile Ad'Hoc Networks", | ||
- | * **M. Abdelouahab**, | + | * **M. Abdelouahab**, |
* **S. Lanièpce**, | * **S. Lanièpce**, |