Noureddine Chikouche

ORCID: 0000-0001-9653-6608
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Authentication Protocols Security
  • RFID technology advancements
  • User Authentication and Security Systems
  • Cryptography and Data Security
  • Cryptographic Implementations and Security
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Cloud Data Security Solutions
  • Wireless Body Area Networks
  • Privacy-Preserving Technologies in Data
  • Vehicular Ad Hoc Networks (VANETs)
  • Antenna Design and Analysis
  • IPv6, Mobility, Handover, Networks, Security
  • Digital Media Forensic Detection
  • Coding theory and cryptography
  • Biometric Identification and Security
  • Quantum Computing Algorithms and Architecture
  • Privacy, Security, and Data Protection
  • Physical Unclonable Functions (PUFs) and Hardware Security

Université de M'Sila
2013-2024

University of Biskra
2015

Centre National de la Recherche Scientifique
2015

Laboratoire Hubert Curien
2015

University of Constantine 3
2015

University Frères Mentouri Constantine 1
2015

The steganography is the art of hidden; its main aim to pass unnoticed data in another data. There are many types that used steganography, such as message, image, and video. In this work, we interested hiding a message inside an image. Our work focuses on study three approaches based least significant bit (LSB) techniques mean put bits each pixel Moreover, propose improved approach for LSB-based image steganography. approach, reduce length hidden by Deflate algorithm which lossless...

10.1109/icee-b.2017.8192077 article EN 2017-10-01

With the progression in sensor technology and low-cost electronic circuits' proliferation, Internet of Things (IoT) is emerging as a promising for enhancing people life terms making decisions communicating with ease, especially healthcare domain, IoT transforms traditional hospital into smart enhanced benefit using sensors to get better diagnosis monitoring patients, patient data are collected sent through internet be analysed cloud, This produces growth privacy security risks such sensitive...

10.1109/ai-csp52968.2021.9671083 article EN 2021-11-20

10.1016/j.compeleceng.2023.108613 article EN Computers & Electrical Engineering 2023-02-08

Two essential problems are still posed in terms of Radio Frequency Identification (RFID) systems, including: security and limitation resources. Recently, Li et al.'s proposed a mutual authentication scheme for RFID systems 2014, it is based on Quasi Cyclic-Moderate Density Parity Check (QC-MDPC) McEliece cryptosystem. This cryptosystem designed to reducing the key sizes. In this paper, we found that does not provide untraceability forward secrecy properties. Furthermore, propose an improved...

10.5815/ijcnis.2015.09.01 article EN International Journal of Computer Network and Information Security 2015-08-08

Radio Frequency Identification (RFID) and biometric technologies saw fast evolutions during the last years which are used in several applications, such as access control. Among important characteristics RFID tags, we mention limitation of resources (memory, energy, …). Our work focuses on design a authentication protocol uses data confirms secrecy, privacy. requires PRNG (Pseud-Random Number Generator), robust hash function Biometric function. The is to optimize protect data. For Security...

10.14569/ijacsa.2012.030411 article EN cc-by International Journal of Advanced Computer Science and Applications 2012-01-01

Wireless sensor networks (WSNs) technology is one of the most important technologies Internet things. It effectively applied within several applications in actual world, including health care, environmental monitoring, tracking, etc. WSNs consist small nodes having limited resources. The communication between components unsecured though. Therefore, order to secure exchanged data, it crucial implement efficient and lightweight cryptographic schemes. In this paper, we evaluate performance...

10.1109/icd47981.2019.9105883 article EN 2019-11-01

The communication channel between the tag and reader in radiofrequency identification technology (RFID) is unsecured, which makes it opened to logical attacks on authentication protocol. In this paper, we analyze security of two recently proposed RFID protocols for mobile reader. Firstly, a protocol by Wei et al. (2011) second Jialiang (2012). Our work focused automatic verification secrecy properties protocols. For vulnerability analysis these protocols, will use AVISPA tools. main cause...

10.1109/icocs.2012.6458584 article EN 2012-11-01

Radio Frequency Identification (RFID) and Near Field Communication (NFC) are wireless technologies applied in several domains, among which, remote education.The communication between different components of this system is unsecured, which may lead to security privacy problems.Designing authentication protocols protect a education an open environment (e.g.NFC, RFID, Internet) challenging task.Recently, Yang et al. proposed mutual protocol based on the hash function for RFID systems secure...

10.12785/ijcds/090309 article EN cc-by-nc-nd International Journal of Computing and Digital Systems 2020-05-01

Radio Frequency Identification (RFID) and biometric technologies saw fast evolutions during the last years which are used in several applications, such as access control. Among important characteristics RFID tags, we mention limitation of resources (memory, energy, ...). Our work focuses on design a authentication protocol uses data confirms secrecy, privacy. requires PRNG (Pseud-Random Number Generator), robust hash function Biometric function. The is to optimize protect data. For Security...

10.48550/arxiv.1207.5627 preprint EN other-oa arXiv (Cornell University) 2012-01-01

One of the most important ubiquitous computing systems that have seen fast evolution during last years, we cite radio frequency identification (RFID) system. There are numerous authentication protocols proposed to secure RFID systems. In our paper, interested in recent work Dass and Om who an protocol using pseudo-randomness property. The authors claimed their is efficient against different possible attacks. Using Automated Validation Internet Security Protocols Applications (AVISPA) tool...

10.1109/icccnt.2017.8203930 article EN 2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) 2017-07-01
Coming Soon ...