A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications PE Abi-Char, A Mhamed, ELH Bachar The 2007 International Conference on Next Generation Mobile Applications …, 2007 | 95 | 2007 |
A secure authenticated key agreement protocol based on elliptic curve cryptography PE Abi-Char, A Mhamed, B El-Hassan Third International Symposium on Information Assurance and Security, 89-94, 2007 | 30 | 2007 |
Simulation models for enhancing the health care systems S Oueida, PA Char, S Kadry, S Ionescu FAIMA Business & Management Journal 4 (4), 5-20, 2016 | 27 | 2016 |
Comparative analysis of block cipher-based encryption algorithms: a survey C Riman, PE Abi-Char Information Security and Computer Fraud 3 (1), 1-7, 2015 | 25 | 2015 |
RSSI-based classification for indoor localization in wireless sensor networks S Mahfouz, P Nader, PE Abi-Char 2020 IEEE International Conference on Informatics, IoT, and Enabling …, 2020 | 11 | 2020 |
Towards a mobile payment market: A comparative analysis of host card emulation and secure element P Pourghomi, PE Abi-Char, G Ghinea International Journal of Computer Science and Information Security 13 (12), 156, 2015 | 10 | 2015 |
A secure authenticated key agreement protocol for wireless security PE Abi-Char, A Mhamed, B El-Hassan Third International Symposium on Information Assurance and Security, 33-38, 2007 | 9 | 2007 |
An enhanced authenticated key agreement protocol with a neural network-based model for joining-phase in mobile environments PE Abi-Char, B El-Hassan, A Mhamed International Journal of Engineering and Industries 2 (2), 2011 | 8 | 2011 |
A dynamic trust-based context-aware authentication framework with privacy preserving P Abi-Char, M Mokhtari, A Mhamed, B El-Hassan Int J Comput Sci Netw Secur 2 (2), 2010 | 8 | 2010 |
A flexible privacy and trust based context-aware secure framework PE Abi-Char, A Mhamed, B El-Hassan, M Mokhtari Aging Friendly Technology for Health and Independence: 8th International …, 2010 | 7 | 2010 |
A new Fuzzy-TOPSIS based risk decision making framework for dangerous good transportation H Kanj, PE Abi-Char 2019 IEEE 21st International Conference on High Performance Computing and …, 2019 | 6 | 2019 |
Emergency department proposed model: Estimating kpis S Oueida, S Kadry, P Abichar International conference on management and industrial engineering, 390-403, 2017 | 6 | 2017 |
A BP-based Key Management Protocol for Data Sharing on Cloud Storage with Access Control PE Abi-Char 2022 45th International Conference on Telecommunications and Signal …, 2022 | 5 | 2022 |
The applications of simulation modeling in emergency departments: A review S Oueida, S Kadry, P Abichar, S Ionescu Health Care Delivery and Clinical Science: Concepts, Methodologies, Tools …, 2018 | 4 | 2018 |
A Priority-based Modified A∗ Path Planning Algorithm for Multi-Mobile Robot Navigation C Riman, PE Abi-Char 2022 19th International Conference on Electrical Engineering, Computing …, 2022 | 3 | 2022 |
A secure and lightweight authenticated key agreement protocol for distributed IoT applications PE Abi-Char, P Nader, S Mahfouz 2020 43rd International Conference on Telecommunications and Signal …, 2020 | 3 | 2020 |
A dynamic trust-based context-aware secure authentication framework for pervasive computing environments PAC Abi-Char Institut National des Télécommunications, 2010 | 3 | 2010 |
Secure authenticated and key agreement protocols with access control for mobile environments P Abi-Char, A Mhamed, B El-Hassan, M Mokhtari Proceeding of International Journal of Computer Science and Information …, 2009 | 3 | 2009 |
A Collision-Free Path Planning Algorithm for Non-Complex ASRS Using Heuristic Functions PE Abi-Char, C Riman 2021 44th International Conference on Telecommunications and Signal …, 2021 | 2 | 2021 |
A secure key management scheme for hierarchical access control with secret key validity checking PE Abi-Char, P Nader, S Mahfouz 2021 44th International Conference on Telecommunications and Signal …, 2021 | 2 | 2021 |