Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Mostafa Azizi
@article{DBLP:journals/access/KhanAAG22, author = {M. Umar Khan and Mostafa Azizi and Ana Garc{\'{\i}}a Armada and Jos{\'{e}} Joaqu{\'{\i}}n Escudero Garz{\'{a}}s}, title = {Unsupervised Clustering for 5G Network Planning Assisted by Real Data}, journal = {{IEEE} Access}, volume = {10}, pages = {39269--39281}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3165799}, doi = {10.1109/ACCESS.2022.3165799}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KhanAAG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijim/AziziAE22, author = {Yassine Azizi and Mostafa Azizi and Mohamed Elboukhari}, title = {Log Data Integrity Solution based on Blockchain Technology and {IPFS}}, journal = {Int. J. Interact. Mob. Technol.}, volume = {16}, number = {15}, pages = {4--15}, year = {2022}, url = {https://doi.org/10.3991/ijim.v16i15.31713}, doi = {10.3991/IJIM.V16I15.31713}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijim/AziziAE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijris/HamzaouiBALB20, author = {Khalil Ibrahim Hamzaoui and Mohammed Berrajaa and Mostafa Azizi and Giuseppe Lipari and Pierre Boulet}, title = {Measurement-based methodology for modelling the energy consumption of mobile devices}, journal = {Int. J. Reason. based Intell. Syst.}, volume = {12}, number = {1}, pages = {4--16}, year = {2020}, url = {https://doi.org/10.1504/IJRIS.2020.105007}, doi = {10.1504/IJRIS.2020.105007}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijris/HamzaouiBALB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scpe/MokhtariAG20, author = {Anas Mokhtari and Mostafa Azizi and Mohammed Gabli}, title = {Scientific Applications in the Cloud: Resource Optimisation based on Metaheuristics}, journal = {Scalable Comput. Pract. Exp.}, volume = {21}, number = {4}, pages = {649--660}, year = {2020}, url = {https://doi.org/10.12694/scpe.v21i4.1799}, doi = {10.12694/SCPE.V21I4.1799}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scpe/MokhtariAG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/worldcist/KerzaziTBBA20, author = {Noureddine Kerzazi and Mariam Tajir and Redouane Boulouiz and Mohammed Bellaoui and Mostafa Azizi}, editor = {{\'{A}}lvaro Rocha and Hojjat Adeli and Lu{\'{\i}}s Paulo Reis and Sandra Costanzo and Irena Orovic and Fernando Moreira}, title = {Teaching Pedigree Analysis and Risk Calculation for Diagnosis Purposes of Genetic Disease}, booktitle = {Trends and Innovations in Information Systems and Technologies - Volume 1, WorldCIST 2020, Budva, Montenegro, 7-10 April 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1159}, pages = {472--485}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45688-7\_48}, doi = {10.1007/978-3-030-45688-7\_48}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/worldcist/KerzaziTBBA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/GhilenA19, author = {Aymen Ghilen and Mostafa Azizi}, title = {Integration of a quantum scheme for key distribution and authentication within {EAP-TLS} protocol}, journal = {Int. J. Inf. Commun. Technol.}, volume = {14}, number = {3}, pages = {277--294}, year = {2019}, url = {https://doi.org/10.1504/IJICT.2019.099112}, doi = {10.1504/IJICT.2019.099112}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijict/GhilenA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijim/BeqqalA18, author = {Mohamed El Beqqal and Mostafa Azizi}, title = {Taxonomy on IoT Technologies for Designing Smart Systems}, journal = {Int. J. Interact. Mob. Technol.}, volume = {12}, number = {5}, pages = {182--191}, year = {2018}, url = {https://doi.org/10.3991/ijim.v12i5.8831}, doi = {10.3991/IJIM.V12I5.8831}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijim/BeqqalA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijim/BeqqalAL18, author = {Mohamed El Beqqal and Mostafa Azizi and Jean{-}Louis Lanet}, title = {A Novel Approach for an Interoperable Biometric Verification}, journal = {Int. J. Interact. Mob. Technol.}, volume = {12}, number = {6}, pages = {124--132}, year = {2018}, url = {https://doi.org/10.3991/ijim.v12i6.9528}, doi = {10.3991/IJIM.V12I6.9528}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijim/BeqqalAL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/GhilenAB17, author = {Aymen Ghilen and Mostafa Azizi and Ridha Bouallegue}, title = {Enhancing the Security of {IEEE} 802.11i Standard by Integrating a Quantum Scheme for Authentication and Encryption Key Distribution}, journal = {Wirel. Pers. Commun.}, volume = {95}, number = {2}, pages = {1655--1675}, year = {2017}, url = {https://doi.org/10.1007/s11277-016-3873-9}, doi = {10.1007/S11277-016-3873-9}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/GhilenAB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdca/AissaouiA17, author = {Karima Aissaoui and Mostafa Azizi}, editor = {Mohamed Lazaar and Youness Tabii and Mohamed Chrayah and Mohammed Al Achhab}, title = {El-Security: E-learning Systems Security Checker Plug-in}, booktitle = {Proceedings of the 2nd international Conference on Big Data, Cloud and Applications, {BDCA} 2017, Tetouan, Morocco, March 29-30, 2017}, pages = {96:1--96:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3090354.3090452}, doi = {10.1145/3090354.3090452}, timestamp = {Tue, 06 Nov 2018 16:57:31 +0100}, biburl = {https://dblp.org/rec/conf/bdca/AissaouiA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/KoulaliSTA16, author = {Sara Koulali and Essaid Sabir and Tarik Taleb and Mostafa Azizi}, title = {A green strategic activity scheduling for {UAV} networks: {A} sub-modular game perspective}, journal = {{IEEE} Commun. Mag.}, volume = {54}, number = {5}, pages = {58--64}, year = {2016}, url = {https://doi.org/10.1109/MCOM.2016.7470936}, doi = {10.1109/MCOM.2016.7470936}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/KoulaliSTA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijet/AissaouiEA16, author = {Karima Aissaoui and El Hassane Ettifouri and Mostafa Azizi}, title = {{EXPEL} Protocol Based Architecture for Cooperative E-Learning}, journal = {Int. J. Emerg. Technol. Learn.}, volume = {11}, number = {10}, pages = {59--64}, year = {2016}, url = {https://doi.org/10.3991/ijet.v11i10.5543}, doi = {10.3991/IJET.V11I10.5543}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijet/AissaouiEA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GhilenAB16, author = {Aymen Ghilen and Mostafa Azizi and Ridha Bouall{\`{e}}gue}, title = {Upgrade of a quantum scheme for authentication and key distribution along with a formal verification based on model checking technique}, journal = {Secur. Commun. Networks}, volume = {9}, number = {18}, pages = {4949--4956}, year = {2016}, url = {https://doi.org/10.1002/sec.1666}, doi = {10.1002/SEC.1666}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/GhilenAB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/KoulaliSA16, author = {Sara Koulali and Essaid Sabir and Mostafa Azizi}, editor = {Sema Oktug and Mehmet Ulema and Cicek Cavdar and Lisandro Zambenedetti Granville and Carlos Raniery Paula dos Santos}, title = {Energy optimization through duty cycling scheduling in mobile social networks: {A} non-cooperative game theory approach}, booktitle = {2016 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2016, Istanbul, Turkey, April 25-29, 2016}, pages = {772--775}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NOMS.2016.7502896}, doi = {10.1109/NOMS.2016.7502896}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/KoulaliSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/unet/KoulaliASK16, author = {Sara Koulali and Mostafa Azizi and Essa{\"{\i}}d Sabir and Rim Koulali}, editor = {Rachid El Azouzi and Daniel Sadoc Menasch{\'{e}} and Essaid Sabir and Francesco De Pellegrini and Mustapha Benjillali}, title = {Optimal Beaconing Policy for Tactical Unmanned Aerial Vehicles}, booktitle = {Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16, Casablanca, Morocco, May 30 - June 1, 2016}, series = {Lecture Notes in Electrical Engineering}, volume = {397}, pages = {659--667}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-1627-1\_52}, doi = {10.1007/978-981-10-1627-1\_52}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/unet/KoulaliASK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/OuerdiEAA15, author = {Noura Ouerdi and Ilhame El Farissi and Abdelmalek Azizi and Mostafa Azizi}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Artificial neural network-based methodology for vulnerabilities detection in {EMV} cards}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {85--90}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492750}, doi = {10.1109/ISIAS.2015.7492750}, timestamp = {Thu, 22 Feb 2024 09:42:25 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/OuerdiEAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/KasmiAL15, author = {Mohammed Amine Kasmi and Mostafa Azizi and Jean{-}Louis Lanet}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Side channel analysis techniques towards a methodology for reverse engineering of Java Card byte-code}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {104--110}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492753}, doi = {10.1109/ISIAS.2015.7492753}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/KasmiAL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/GhilenAB15, author = {Aymen Ghilen and Mostafa Azizi and Ridha Bouallegue}, title = {Integration of a quantum protocol for mutual authentication and secret key distribution within 802.11i standard}, booktitle = {12th {IEEE/ACS} International Conference of Computer Systems and Applications, {AICCSA} 2015, Marrakech, Morocco, November 17-20, 2015}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AICCSA.2015.7507110}, doi = {10.1109/AICCSA.2015.7507110}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aiccsa/GhilenAB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/GhilenAB15a, author = {Aymen Ghilen and Mostafa Azizi and Ridha Bouallegue}, title = {Integration of a quantum authenticated key distribution scheme in the {EAP-TLS} protocol}, booktitle = {12th {IEEE/ACS} International Conference of Computer Systems and Applications, {AICCSA} 2015, Marrakech, Morocco, November 17-20, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AICCSA.2015.7507125}, doi = {10.1109/AICCSA.2015.7507125}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aiccsa/GhilenAB15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/GhilenAB15b, author = {Aymen Ghilen and Mostafa Azizi and Ridha Bouallegue}, title = {Integration and formal security analysis of a quantum key distribution scheme within {CHAP} protocol}, booktitle = {12th {IEEE/ACS} International Conference of Computer Systems and Applications, {AICCSA} 2015, Marrakech, Morocco, November 17-20, 2015}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AICCSA.2015.7507129}, doi = {10.1109/AICCSA.2015.7507129}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aiccsa/GhilenAB15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/GhilenAB15, author = {Aymen Ghilen and Mostafa Azizi and Ridha Bouallegue}, editor = {Michael K. Reiter and David Naccache}, title = {Q-OpenVPN: {A} New Extension of OpenVPN Based on a Quantum Scheme for Authentication and Key Distribution}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {238--247}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_17}, doi = {10.1007/978-3-319-26823-1\_17}, timestamp = {Mon, 02 Jan 2023 08:05:35 +0100}, biburl = {https://dblp.org/rec/conf/cans/GhilenAB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/KoulaliSKA14, author = {Sara Koulali and Essaid Sabir and Abdellatif Kobbane and Mostafa Azizi}, editor = {Mario Gerla and Khaled Ben Letaief and George C. Hadjichristofi and Christian Callegari}, title = {Ferry-based architecture for Participatory Sensing}, booktitle = {International Wireless Communications and Mobile Computing Conference, {IWCMC} 2014, Nicosia, Cyprus, August 4-8, 2014}, pages = {845--849}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/IWCMC.2014.6906466}, doi = {10.1109/IWCMC.2014.6906466}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/KoulaliSKA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sita/EmharrafRSA14, author = {Mohamed Emharraf and Mohammed Rahmoun and Mohammed Saber and Mostafa Azizi}, title = {Mobile robot unknown indoor environment exploration using self-localization and grid map building}, booktitle = {9th International Conference on Intelligent Systems: Theories and Applications, {SITA} 2014, Rabat, Morocco, May 7-8, 2014}, pages = {1--5}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SITA.2014.6847303}, doi = {10.1109/SITA.2014.6847303}, timestamp = {Mon, 09 Aug 2021 14:54:04 +0200}, biburl = {https://dblp.org/rec/conf/sita/EmharrafRSA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/AziziA13, author = {Abdelmalek Azizi and Mostafa Azizi}, title = {Instances of Arabic Cryptography in Morocco {II}}, journal = {Cryptologia}, volume = {37}, number = {4}, pages = {328--337}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.797042}, doi = {10.1080/01611194.2013.797042}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/AziziA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs2/KoulaliKKA12, author = {Mohammed{-}Amine Koulali and Abdellatif Kobbane and Mohammed El Koutbi and Mostafa Azizi}, editor = {Mohamed Essaaidi and Youssef Zaz}, title = {{QDGRP} : {A} hybrid QoS Distributed Genetic routing protocol for Wireless Sensor Networks}, booktitle = {2012 International Conference on Multimedia Computing and Systems, {ICMCS} 2012, Tangiers, Morocco, May 10-12, 2012}, pages = {47--52}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICMCS.2012.6320271}, doi = {10.1109/ICMCS.2012.6320271}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/icmcs2/KoulaliKKA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs2/OuerdiZAA12, author = {Noura Ouerdi and M'hammed Ziane and Abdelmalek Azizi and Mostafa Azizi}, editor = {Mohamed Essaaidi and Youssef Zaz}, title = {Modeling Embedded Systems with SysML}, booktitle = {2012 International Conference on Multimedia Computing and Systems, {ICMCS} 2012, Tangiers, Morocco, May 10-12, 2012}, pages = {905--910}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICMCS.2012.6320272}, doi = {10.1109/ICMCS.2012.6320272}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmcs2/OuerdiZAA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs2/FarissiAM12, author = {Ilhame El Farissi and Mostafa Azizi and Mimoun Moussaoui}, editor = {Mohamed Essaaidi and Youssef Zaz}, title = {Detection of smart card attacks using neural networks}, booktitle = {2012 International Conference on Multimedia Computing and Systems, {ICMCS} 2012, Tangiers, Morocco, May 10-12, 2012}, pages = {949--954}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICMCS.2012.6320286}, doi = {10.1109/ICMCS.2012.6320286}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmcs2/FarissiAM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1201-3950, author = {Mohammed{-}Amine Koulali and Mohammed El Koutbi and Abdellatif Kobbane and Mostafa Azizi}, title = {{QGRP:} {A} Novel QoS-Geographic Routing Protocol for Multimedia Wireless Sensor Networks}, journal = {CoRR}, volume = {abs/1201.3950}, year = {2012}, url = {http://arxiv.org/abs/1201.3950}, eprinttype = {arXiv}, eprint = {1201.3950}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1201-3950.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/AziziA11, author = {Abdelmalek Azizi and Mostafa Azizi}, title = {Instances of Arabic Cryptography in Morocco}, journal = {Cryptologia}, volume = {35}, number = {1}, pages = {47--57}, year = {2011}, url = {https://doi.org/10.1080/01611194.2010.509173}, doi = {10.1080/01611194.2010.509173}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/AziziA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/ElboukhariAA10, author = {Mohamed Elboukhari and Mostafa Azizi and Abdelmalek Azizi}, editor = {Mohammed Essaaidi and Michele Malgeri and Costin Badica}, title = {Improving the Security of {CHAP} Protocol by Quantum Cryptography}, booktitle = {Intelligent Distributed Computing {IV} - Proceedings of the 4th International Symposium on Intelligent Distributed Computing - {IDC} 2010, Tangier, Morocco, September 2010}, volume = {315}, pages = {241--245}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15211-5\_25}, doi = {10.1007/978-3-642-15211-5\_25}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idc/ElboukhariAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1005-4504, author = {Mohamed Elboukhari and Mostafa Azizi and Abdelmalek Azizi}, title = {Analysis of the Security of {BB84} by Model Checking}, journal = {CoRR}, volume = {abs/1005.4504}, year = {2010}, url = {http://arxiv.org/abs/1005.4504}, eprinttype = {arXiv}, eprint = {1005.4504}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1005-4504.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/BlejA09, author = {Mohammed Blej and Mostafa Azizi}, title = {Modeling and Analysis of a Real-Time System Using the Networks of Extended Petri}, journal = {J. Comput.}, volume = {4}, number = {7}, pages = {641--645}, year = {2009}, url = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=102\&\#38;id=1660}, doi = {10.4304/JCP.4.7.641-645}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/BlejA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/ElboukhariAA08, author = {Mohamed Elboukhari and Abdelmalek Azizi and Mostafa Azizi}, editor = {Akshai Aggarwal and Mohamad Badra and Fabio Massacci}, title = {Security Oriented Analysis of {B92} by Model Checking}, booktitle = {{NTMS} 2008, 2nd International Conference on New Technologies, Mobility and Security, November 5-7, 2008, Tangier, Morocco}, pages = {1--6}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/NTMS.2008.ECP.89}, doi = {10.1109/NTMS.2008.ECP.89}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ntms/ElboukhariAA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/parelec/Azizi02, author = {Mostafa Azizi}, title = {Concurrent Hardware/Software Coverification with Java Threads}, booktitle = {2002 International Conference on Parallel Computing in Electrical Engineering {(PARELEC} 2002), 22-25 September 2002, Warsaw, Poland}, pages = {95--98}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/PCEE.2002.1115211}, doi = {10.1109/PCEE.2002.1115211}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/parelec/Azizi02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/parelec/AziziAT00, author = {Mostafa Azizi and El Mostapha Aboulhamid and Sofi{\`{e}}ne Tahar}, title = {Sequential and Distributed Simulations Using Java Threads}, booktitle = {2000 International Conference on Parallel Computing in Electrical Engineering {(PARELEC} 2000), 27-30 August 2000, Quebec, Canada}, pages = {237--243}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/PCEE.2000.873636}, doi = {10.1109/PCEE.2000.873636}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/parelec/AziziAT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdpta/AziziAT99, author = {Mostafa Azizi and El Mostapha Aboulhamid and Sofi{\`{e}}ne Tahar}, editor = {Hamid R. Arabnia}, title = {Multithreading-based Coverification Technique of {HW/SW} Systems}, booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, {PDPTA} 1999, June 28 - Junlly 1, 1999, Las Vegas, Nevada, {USA}}, pages = {1999--2005}, publisher = {{CSREA} Press}, year = {1999}, timestamp = {Tue, 20 Apr 2004 14:47:51 +0200}, biburl = {https://dblp.org/rec/conf/pdpta/AziziAT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.