- Advanced Authentication Protocols Security
- RFID technology advancements
- User Authentication and Security Systems
- Cryptography and Data Security
- Cryptographic Implementations and Security
- Chaos-based Image/Signal Encryption
- Advanced Steganography and Watermarking Techniques
- Cloud Data Security Solutions
- Wireless Body Area Networks
- Privacy-Preserving Technologies in Data
- Vehicular Ad Hoc Networks (VANETs)
- Antenna Design and Analysis
- IPv6, Mobility, Handover, Networks, Security
- Digital Media Forensic Detection
- Coding theory and cryptography
- Biometric Identification and Security
- Quantum Computing Algorithms and Architecture
- Privacy, Security, and Data Protection
- Physical Unclonable Functions (PUFs) and Hardware Security
Université de M'Sila
2013-2024
University of Biskra
2015
Centre National de la Recherche Scientifique
2015
Laboratoire Hubert Curien
2015
University of Constantine 3
2015
University Frères Mentouri Constantine 1
2015
The steganography is the art of hidden; its main aim to pass unnoticed data in another data. There are many types that used steganography, such as message, image, and video. In this work, we interested hiding a message inside an image. Our work focuses on study three approaches based least significant bit (LSB) techniques mean put bits each pixel Moreover, propose improved approach for LSB-based image steganography. approach, reduce length hidden by Deflate algorithm which lossless...
With the progression in sensor technology and low-cost electronic circuits' proliferation, Internet of Things (IoT) is emerging as a promising for enhancing people life terms making decisions communicating with ease, especially healthcare domain, IoT transforms traditional hospital into smart enhanced benefit using sensors to get better diagnosis monitoring patients, patient data are collected sent through internet be analysed cloud, This produces growth privacy security risks such sensitive...
Two essential problems are still posed in terms of Radio Frequency Identification (RFID) systems, including: security and limitation resources. Recently, Li et al.'s proposed a mutual authentication scheme for RFID systems 2014, it is based on Quasi Cyclic-Moderate Density Parity Check (QC-MDPC) McEliece cryptosystem. This cryptosystem designed to reducing the key sizes. In this paper, we found that does not provide untraceability forward secrecy properties. Furthermore, propose an improved...
Radio Frequency Identification (RFID) and biometric technologies saw fast evolutions during the last years which are used in several applications, such as access control. Among important characteristics RFID tags, we mention limitation of resources (memory, energy, …). Our work focuses on design a authentication protocol uses data confirms secrecy, privacy. requires PRNG (Pseud-Random Number Generator), robust hash function Biometric function. The is to optimize protect data. For Security...
Wireless sensor networks (WSNs) technology is one of the most important technologies Internet things. It effectively applied within several applications in actual world, including health care, environmental monitoring, tracking, etc. WSNs consist small nodes having limited resources. The communication between components unsecured though. Therefore, order to secure exchanged data, it crucial implement efficient and lightweight cryptographic schemes. In this paper, we evaluate performance...
The communication channel between the tag and reader in radiofrequency identification technology (RFID) is unsecured, which makes it opened to logical attacks on authentication protocol. In this paper, we analyze security of two recently proposed RFID protocols for mobile reader. Firstly, a protocol by Wei et al. (2011) second Jialiang (2012). Our work focused automatic verification secrecy properties protocols. For vulnerability analysis these protocols, will use AVISPA tools. main cause...
Radio Frequency Identification (RFID) and Near Field Communication (NFC) are wireless technologies applied in several domains, among which, remote education.The communication between different components of this system is unsecured, which may lead to security privacy problems.Designing authentication protocols protect a education an open environment (e.g.NFC, RFID, Internet) challenging task.Recently, Yang et al. proposed mutual protocol based on the hash function for RFID systems secure...
Radio Frequency Identification (RFID) and biometric technologies saw fast evolutions during the last years which are used in several applications, such as access control. Among important characteristics RFID tags, we mention limitation of resources (memory, energy, ...). Our work focuses on design a authentication protocol uses data confirms secrecy, privacy. requires PRNG (Pseud-Random Number Generator), robust hash function Biometric function. The is to optimize protect data. For Security...
One of the most important ubiquitous computing systems that have seen fast evolution during last years, we cite radio frequency identification (RFID) system. There are numerous authentication protocols proposed to secure RFID systems. In our paper, interested in recent work Dass and Om who an protocol using pseudo-randomness property. The authors claimed their is efficient against different possible attacks. Using Automated Validation Internet Security Protocols Applications (AVISPA) tool...