BibTeX records: Mostafa Azizi

download as .bib file

@article{DBLP:journals/access/KhanAAG22,
  author       = {M. Umar Khan and
                  Mostafa Azizi and
                  Ana Garc{\'{\i}}a Armada and
                  Jos{\'{e}} Joaqu{\'{\i}}n Escudero Garz{\'{a}}s},
  title        = {Unsupervised Clustering for 5G Network Planning Assisted by Real Data},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {39269--39281},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3165799},
  doi          = {10.1109/ACCESS.2022.3165799},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KhanAAG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijim/AziziAE22,
  author       = {Yassine Azizi and
                  Mostafa Azizi and
                  Mohamed Elboukhari},
  title        = {Log Data Integrity Solution based on Blockchain Technology and {IPFS}},
  journal      = {Int. J. Interact. Mob. Technol.},
  volume       = {16},
  number       = {15},
  pages        = {4--15},
  year         = {2022},
  url          = {https://doi.org/10.3991/ijim.v16i15.31713},
  doi          = {10.3991/IJIM.V16I15.31713},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijim/AziziAE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijris/HamzaouiBALB20,
  author       = {Khalil Ibrahim Hamzaoui and
                  Mohammed Berrajaa and
                  Mostafa Azizi and
                  Giuseppe Lipari and
                  Pierre Boulet},
  title        = {Measurement-based methodology for modelling the energy consumption
                  of mobile devices},
  journal      = {Int. J. Reason. based Intell. Syst.},
  volume       = {12},
  number       = {1},
  pages        = {4--16},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJRIS.2020.105007},
  doi          = {10.1504/IJRIS.2020.105007},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijris/HamzaouiBALB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scpe/MokhtariAG20,
  author       = {Anas Mokhtari and
                  Mostafa Azizi and
                  Mohammed Gabli},
  title        = {Scientific Applications in the Cloud: Resource Optimisation based
                  on Metaheuristics},
  journal      = {Scalable Comput. Pract. Exp.},
  volume       = {21},
  number       = {4},
  pages        = {649--660},
  year         = {2020},
  url          = {https://doi.org/10.12694/scpe.v21i4.1799},
  doi          = {10.12694/SCPE.V21I4.1799},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scpe/MokhtariAG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worldcist/KerzaziTBBA20,
  author       = {Noureddine Kerzazi and
                  Mariam Tajir and
                  Redouane Boulouiz and
                  Mohammed Bellaoui and
                  Mostafa Azizi},
  editor       = {{\'{A}}lvaro Rocha and
                  Hojjat Adeli and
                  Lu{\'{\i}}s Paulo Reis and
                  Sandra Costanzo and
                  Irena Orovic and
                  Fernando Moreira},
  title        = {Teaching Pedigree Analysis and Risk Calculation for Diagnosis Purposes
                  of Genetic Disease},
  booktitle    = {Trends and Innovations in Information Systems and Technologies - Volume
                  1, WorldCIST 2020, Budva, Montenegro, 7-10 April 2020},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1159},
  pages        = {472--485},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45688-7\_48},
  doi          = {10.1007/978-3-030-45688-7\_48},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/worldcist/KerzaziTBBA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijict/GhilenA19,
  author       = {Aymen Ghilen and
                  Mostafa Azizi},
  title        = {Integration of a quantum scheme for key distribution and authentication
                  within {EAP-TLS} protocol},
  journal      = {Int. J. Inf. Commun. Technol.},
  volume       = {14},
  number       = {3},
  pages        = {277--294},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICT.2019.099112},
  doi          = {10.1504/IJICT.2019.099112},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijict/GhilenA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijim/BeqqalA18,
  author       = {Mohamed El Beqqal and
                  Mostafa Azizi},
  title        = {Taxonomy on IoT Technologies for Designing Smart Systems},
  journal      = {Int. J. Interact. Mob. Technol.},
  volume       = {12},
  number       = {5},
  pages        = {182--191},
  year         = {2018},
  url          = {https://doi.org/10.3991/ijim.v12i5.8831},
  doi          = {10.3991/IJIM.V12I5.8831},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijim/BeqqalA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijim/BeqqalAL18,
  author       = {Mohamed El Beqqal and
                  Mostafa Azizi and
                  Jean{-}Louis Lanet},
  title        = {A Novel Approach for an Interoperable Biometric Verification},
  journal      = {Int. J. Interact. Mob. Technol.},
  volume       = {12},
  number       = {6},
  pages        = {124--132},
  year         = {2018},
  url          = {https://doi.org/10.3991/ijim.v12i6.9528},
  doi          = {10.3991/IJIM.V12I6.9528},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijim/BeqqalAL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/GhilenAB17,
  author       = {Aymen Ghilen and
                  Mostafa Azizi and
                  Ridha Bouallegue},
  title        = {Enhancing the Security of {IEEE} 802.11i Standard by Integrating a
                  Quantum Scheme for Authentication and Encryption Key Distribution},
  journal      = {Wirel. Pers. Commun.},
  volume       = {95},
  number       = {2},
  pages        = {1655--1675},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-016-3873-9},
  doi          = {10.1007/S11277-016-3873-9},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/GhilenAB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdca/AissaouiA17,
  author       = {Karima Aissaoui and
                  Mostafa Azizi},
  editor       = {Mohamed Lazaar and
                  Youness Tabii and
                  Mohamed Chrayah and
                  Mohammed Al Achhab},
  title        = {El-Security: E-learning Systems Security Checker Plug-in},
  booktitle    = {Proceedings of the 2nd international Conference on Big Data, Cloud
                  and Applications, {BDCA} 2017, Tetouan, Morocco, March 29-30, 2017},
  pages        = {96:1--96:6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3090354.3090452},
  doi          = {10.1145/3090354.3090452},
  timestamp    = {Tue, 06 Nov 2018 16:57:31 +0100},
  biburl       = {https://dblp.org/rec/conf/bdca/AissaouiA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/KoulaliSTA16,
  author       = {Sara Koulali and
                  Essaid Sabir and
                  Tarik Taleb and
                  Mostafa Azizi},
  title        = {A green strategic activity scheduling for {UAV} networks: {A} sub-modular
                  game perspective},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {54},
  number       = {5},
  pages        = {58--64},
  year         = {2016},
  url          = {https://doi.org/10.1109/MCOM.2016.7470936},
  doi          = {10.1109/MCOM.2016.7470936},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/KoulaliSTA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijet/AissaouiEA16,
  author       = {Karima Aissaoui and
                  El Hassane Ettifouri and
                  Mostafa Azizi},
  title        = {{EXPEL} Protocol Based Architecture for Cooperative E-Learning},
  journal      = {Int. J. Emerg. Technol. Learn.},
  volume       = {11},
  number       = {10},
  pages        = {59--64},
  year         = {2016},
  url          = {https://doi.org/10.3991/ijet.v11i10.5543},
  doi          = {10.3991/IJET.V11I10.5543},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijet/AissaouiEA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GhilenAB16,
  author       = {Aymen Ghilen and
                  Mostafa Azizi and
                  Ridha Bouall{\`{e}}gue},
  title        = {Upgrade of a quantum scheme for authentication and key distribution
                  along with a formal verification based on model checking technique},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {18},
  pages        = {4949--4956},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1666},
  doi          = {10.1002/SEC.1666},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/GhilenAB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/KoulaliSA16,
  author       = {Sara Koulali and
                  Essaid Sabir and
                  Mostafa Azizi},
  editor       = {Sema Oktug and
                  Mehmet Ulema and
                  Cicek Cavdar and
                  Lisandro Zambenedetti Granville and
                  Carlos Raniery Paula dos Santos},
  title        = {Energy optimization through duty cycling scheduling in mobile social
                  networks: {A} non-cooperative game theory approach},
  booktitle    = {2016 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS}
                  2016, Istanbul, Turkey, April 25-29, 2016},
  pages        = {772--775},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NOMS.2016.7502896},
  doi          = {10.1109/NOMS.2016.7502896},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/KoulaliSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/unet/KoulaliASK16,
  author       = {Sara Koulali and
                  Mostafa Azizi and
                  Essa{\"{\i}}d Sabir and
                  Rim Koulali},
  editor       = {Rachid El Azouzi and
                  Daniel Sadoc Menasch{\'{e}} and
                  Essaid Sabir and
                  Francesco De Pellegrini and
                  Mustapha Benjillali},
  title        = {Optimal Beaconing Policy for Tactical Unmanned Aerial Vehicles},
  booktitle    = {Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16,
                  Casablanca, Morocco, May 30 - June 1, 2016},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {397},
  pages        = {659--667},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-981-10-1627-1\_52},
  doi          = {10.1007/978-981-10-1627-1\_52},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/unet/KoulaliASK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/OuerdiEAA15,
  author       = {Noura Ouerdi and
                  Ilhame El Farissi and
                  Abdelmalek Azizi and
                  Mostafa Azizi},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Artificial neural network-based methodology for vulnerabilities detection
                  in {EMV} cards},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {85--90},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492750},
  doi          = {10.1109/ISIAS.2015.7492750},
  timestamp    = {Thu, 22 Feb 2024 09:42:25 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/OuerdiEAA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/KasmiAL15,
  author       = {Mohammed Amine Kasmi and
                  Mostafa Azizi and
                  Jean{-}Louis Lanet},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Side channel analysis techniques towards a methodology for reverse
                  engineering of Java Card byte-code},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {104--110},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492753},
  doi          = {10.1109/ISIAS.2015.7492753},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/KasmiAL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/GhilenAB15,
  author       = {Aymen Ghilen and
                  Mostafa Azizi and
                  Ridha Bouallegue},
  title        = {Integration of a quantum protocol for mutual authentication and secret
                  key distribution within 802.11i standard},
  booktitle    = {12th {IEEE/ACS} International Conference of Computer Systems and Applications,
                  {AICCSA} 2015, Marrakech, Morocco, November 17-20, 2015},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AICCSA.2015.7507110},
  doi          = {10.1109/AICCSA.2015.7507110},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aiccsa/GhilenAB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/GhilenAB15a,
  author       = {Aymen Ghilen and
                  Mostafa Azizi and
                  Ridha Bouallegue},
  title        = {Integration of a quantum authenticated key distribution scheme in
                  the {EAP-TLS} protocol},
  booktitle    = {12th {IEEE/ACS} International Conference of Computer Systems and Applications,
                  {AICCSA} 2015, Marrakech, Morocco, November 17-20, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AICCSA.2015.7507125},
  doi          = {10.1109/AICCSA.2015.7507125},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aiccsa/GhilenAB15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/GhilenAB15b,
  author       = {Aymen Ghilen and
                  Mostafa Azizi and
                  Ridha Bouallegue},
  title        = {Integration and formal security analysis of a quantum key distribution
                  scheme within {CHAP} protocol},
  booktitle    = {12th {IEEE/ACS} International Conference of Computer Systems and Applications,
                  {AICCSA} 2015, Marrakech, Morocco, November 17-20, 2015},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AICCSA.2015.7507129},
  doi          = {10.1109/AICCSA.2015.7507129},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aiccsa/GhilenAB15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/GhilenAB15,
  author       = {Aymen Ghilen and
                  Mostafa Azizi and
                  Ridha Bouallegue},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {Q-OpenVPN: {A} New Extension of OpenVPN Based on a Quantum Scheme
                  for Authentication and Key Distribution},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {238--247},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_17},
  doi          = {10.1007/978-3-319-26823-1\_17},
  timestamp    = {Mon, 02 Jan 2023 08:05:35 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/GhilenAB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/KoulaliSKA14,
  author       = {Sara Koulali and
                  Essaid Sabir and
                  Abdellatif Kobbane and
                  Mostafa Azizi},
  editor       = {Mario Gerla and
                  Khaled Ben Letaief and
                  George C. Hadjichristofi and
                  Christian Callegari},
  title        = {Ferry-based architecture for Participatory Sensing},
  booktitle    = {International Wireless Communications and Mobile Computing Conference,
                  {IWCMC} 2014, Nicosia, Cyprus, August 4-8, 2014},
  pages        = {845--849},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/IWCMC.2014.6906466},
  doi          = {10.1109/IWCMC.2014.6906466},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/KoulaliSKA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sita/EmharrafRSA14,
  author       = {Mohamed Emharraf and
                  Mohammed Rahmoun and
                  Mohammed Saber and
                  Mostafa Azizi},
  title        = {Mobile robot unknown indoor environment exploration using self-localization
                  and grid map building},
  booktitle    = {9th International Conference on Intelligent Systems: Theories and
                  Applications, {SITA} 2014, Rabat, Morocco, May 7-8, 2014},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SITA.2014.6847303},
  doi          = {10.1109/SITA.2014.6847303},
  timestamp    = {Mon, 09 Aug 2021 14:54:04 +0200},
  biburl       = {https://dblp.org/rec/conf/sita/EmharrafRSA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/AziziA13,
  author       = {Abdelmalek Azizi and
                  Mostafa Azizi},
  title        = {Instances of Arabic Cryptography in Morocco {II}},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {4},
  pages        = {328--337},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.797042},
  doi          = {10.1080/01611194.2013.797042},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AziziA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs2/KoulaliKKA12,
  author       = {Mohammed{-}Amine Koulali and
                  Abdellatif Kobbane and
                  Mohammed El Koutbi and
                  Mostafa Azizi},
  editor       = {Mohamed Essaaidi and
                  Youssef Zaz},
  title        = {{QDGRP} : {A} hybrid QoS Distributed Genetic routing protocol for
                  Wireless Sensor Networks},
  booktitle    = {2012 International Conference on Multimedia Computing and Systems,
                  {ICMCS} 2012, Tangiers, Morocco, May 10-12, 2012},
  pages        = {47--52},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICMCS.2012.6320271},
  doi          = {10.1109/ICMCS.2012.6320271},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcs2/KoulaliKKA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs2/OuerdiZAA12,
  author       = {Noura Ouerdi and
                  M'hammed Ziane and
                  Abdelmalek Azizi and
                  Mostafa Azizi},
  editor       = {Mohamed Essaaidi and
                  Youssef Zaz},
  title        = {Modeling Embedded Systems with SysML},
  booktitle    = {2012 International Conference on Multimedia Computing and Systems,
                  {ICMCS} 2012, Tangiers, Morocco, May 10-12, 2012},
  pages        = {905--910},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICMCS.2012.6320272},
  doi          = {10.1109/ICMCS.2012.6320272},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcs2/OuerdiZAA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs2/FarissiAM12,
  author       = {Ilhame El Farissi and
                  Mostafa Azizi and
                  Mimoun Moussaoui},
  editor       = {Mohamed Essaaidi and
                  Youssef Zaz},
  title        = {Detection of smart card attacks using neural networks},
  booktitle    = {2012 International Conference on Multimedia Computing and Systems,
                  {ICMCS} 2012, Tangiers, Morocco, May 10-12, 2012},
  pages        = {949--954},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICMCS.2012.6320286},
  doi          = {10.1109/ICMCS.2012.6320286},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcs2/FarissiAM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1201-3950,
  author       = {Mohammed{-}Amine Koulali and
                  Mohammed El Koutbi and
                  Abdellatif Kobbane and
                  Mostafa Azizi},
  title        = {{QGRP:} {A} Novel QoS-Geographic Routing Protocol for Multimedia Wireless
                  Sensor Networks},
  journal      = {CoRR},
  volume       = {abs/1201.3950},
  year         = {2012},
  url          = {http://arxiv.org/abs/1201.3950},
  eprinttype    = {arXiv},
  eprint       = {1201.3950},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1201-3950.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/AziziA11,
  author       = {Abdelmalek Azizi and
                  Mostafa Azizi},
  title        = {Instances of Arabic Cryptography in Morocco},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {1},
  pages        = {47--57},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2010.509173},
  doi          = {10.1080/01611194.2010.509173},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AziziA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/ElboukhariAA10,
  author       = {Mohamed Elboukhari and
                  Mostafa Azizi and
                  Abdelmalek Azizi},
  editor       = {Mohammed Essaaidi and
                  Michele Malgeri and
                  Costin Badica},
  title        = {Improving the Security of {CHAP} Protocol by Quantum Cryptography},
  booktitle    = {Intelligent Distributed Computing {IV} - Proceedings of the 4th International
                  Symposium on Intelligent Distributed Computing - {IDC} 2010, Tangier,
                  Morocco, September 2010},
  volume       = {315},
  pages        = {241--245},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15211-5\_25},
  doi          = {10.1007/978-3-642-15211-5\_25},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idc/ElboukhariAA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1005-4504,
  author       = {Mohamed Elboukhari and
                  Mostafa Azizi and
                  Abdelmalek Azizi},
  title        = {Analysis of the Security of {BB84} by Model Checking},
  journal      = {CoRR},
  volume       = {abs/1005.4504},
  year         = {2010},
  url          = {http://arxiv.org/abs/1005.4504},
  eprinttype    = {arXiv},
  eprint       = {1005.4504},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1005-4504.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcp/BlejA09,
  author       = {Mohammed Blej and
                  Mostafa Azizi},
  title        = {Modeling and Analysis of a Real-Time System Using the Networks of
                  Extended Petri},
  journal      = {J. Comput.},
  volume       = {4},
  number       = {7},
  pages        = {641--645},
  year         = {2009},
  url          = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=102\&\#38;id=1660},
  doi          = {10.4304/JCP.4.7.641-645},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcp/BlejA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/ElboukhariAA08,
  author       = {Mohamed Elboukhari and
                  Abdelmalek Azizi and
                  Mostafa Azizi},
  editor       = {Akshai Aggarwal and
                  Mohamad Badra and
                  Fabio Massacci},
  title        = {Security Oriented Analysis of {B92} by Model Checking},
  booktitle    = {{NTMS} 2008, 2nd International Conference on New Technologies, Mobility
                  and Security, November 5-7, 2008, Tangier, Morocco},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/NTMS.2008.ECP.89},
  doi          = {10.1109/NTMS.2008.ECP.89},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/ElboukhariAA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/parelec/Azizi02,
  author       = {Mostafa Azizi},
  title        = {Concurrent Hardware/Software Coverification with Java Threads},
  booktitle    = {2002 International Conference on Parallel Computing in Electrical
                  Engineering {(PARELEC} 2002), 22-25 September 2002, Warsaw, Poland},
  pages        = {95--98},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/PCEE.2002.1115211},
  doi          = {10.1109/PCEE.2002.1115211},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/parelec/Azizi02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/parelec/AziziAT00,
  author       = {Mostafa Azizi and
                  El Mostapha Aboulhamid and
                  Sofi{\`{e}}ne Tahar},
  title        = {Sequential and Distributed Simulations Using Java Threads},
  booktitle    = {2000 International Conference on Parallel Computing in Electrical
                  Engineering {(PARELEC} 2000), 27-30 August 2000, Quebec, Canada},
  pages        = {237--243},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/PCEE.2000.873636},
  doi          = {10.1109/PCEE.2000.873636},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/parelec/AziziAT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/AziziAT99,
  author       = {Mostafa Azizi and
                  El Mostapha Aboulhamid and
                  Sofi{\`{e}}ne Tahar},
  editor       = {Hamid R. Arabnia},
  title        = {Multithreading-based Coverification Technique of {HW/SW} Systems},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} 1999, June 28 - Junlly
                  1, 1999, Las Vegas, Nevada, {USA}},
  pages        = {1999--2005},
  publisher    = {{CSREA} Press},
  year         = {1999},
  timestamp    = {Tue, 20 Apr 2004 14:47:51 +0200},
  biburl       = {https://dblp.org/rec/conf/pdpta/AziziAT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics