default search action
Kamel Mohamed Faraoun
Person information
- affiliation: Djilalli Liabbes University, Computer Science Department, Sidi Bel Abbes, Algeria
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j21]Azeddine Attir, Farid Naït-Abdesselam, Kamel Mohamed Faraoun:
Lightweight anonymous and mutual authentication scheme for wireless body area networks. Comput. Networks 224: 109625 (2023) - [j20]Fethi Imad Benaribi, Mimoun Malki, Kamel Mohamed Faraoun, Samir Ouchani:
A SPARQL-based framework to preserve privacy of sensitive data on the semantic web. Serv. Oriented Comput. Appl. 17(3): 183-199 (2023) - 2019
- [j19]Kamel Mohamed Faraoun:
A novel verifiable and unconditionally secure (m, t, n)-threshold multi-secret sharing scheme using overdetermined systems of linear equations over finite Galois fields. Int. J. Inf. Comput. Secur. 11(1): 61-82 (2019) - 2018
- [j18]Amina Souyah, Kamel Mohamed Faraoun:
An efficient and secure chaotic cipher algorithm for image content preservation. Commun. Nonlinear Sci. Numer. Simul. 60: 12-32 (2018) - [j17]Rabab Beniani, Kamel Mohamed Faraoun:
A Mixed Chaotic-cellular Automata Based Encryption Scheme for Compressed Jpeg Images. J. Multim. Process. Technol. 9(3): 88-101 (2018) - 2017
- [j16]Kamel Mohamed Faraoun:
Design of a new efficient and secure multi-secret images sharing scheme. Multim. Tools Appl. 76(5): 6247-6261 (2017) - 2016
- [j15]Chaima Bensaid, Sofiane Boukli Hacene, Kamel Mohamed Faraoun:
Detection and Ignoring of Blackhole Attack in Vanets Networks. Int. J. Cloud Appl. Comput. 6(2): 1-10 (2016) - 2015
- [j14]Alaa Eddine Belfedhal, Kamel Mohamed Faraoun:
Building Secure and Fast Cryptographic Hash Functions Using Programmable Cellular Automata. J. Comput. Inf. Technol. 23(4): 317-328 (2015) - [j13]Souad Bekkouch, Kamel Mohamed Faraoun:
Robust and Reversible Image Watermarking Scheme Using Combined DCT-DWT-SVD Transforms. J. Inf. Process. Syst. 11(3): 406-420 (2015) - [j12]Mokhtar Ouamri, Kamel Mohamed Faraoun:
Designing A Novel Selective, Fast and Efficient Encryption Scheme For HEVC Video Sequences. J. Multim. Process. Technol. 6(1): 7-19 (2015) - [j11]Kamel Mohamed Faraoun:
On the semantic security of cellular automata based pseudo-random permutation using results from the Luby-Rackoff construction. Ann. UMCS Informatica 15(1): 21-31 (2015) - 2014
- [j10]Kamel Mohamed Faraoun:
Design of fast one-pass authenticated and randomized encryption schema using reversible cellular automata. Commun. Nonlinear Sci. Numer. Simul. 19(9): 3136-3148 (2014) - [j9]Kamel Mohamed Faraoun:
A genetic strategy to design cellular automata based block ciphers. Expert Syst. Appl. 41(17): 7958-7967 (2014) - [j8]Kamel Mohamed Faraoun:
A novel fast hybrid GCD computation algorithm. Int. J. Comput. Sci. Math. 5(1): 37-47 (2014) - [j7]Kamel Mohamed Faraoun:
A novel fast and provably secure (t, n)-threshold secret sharing construction for digital images. J. Inf. Secur. Appl. 19(6): 331-340 (2014) - [j6]Sid Ahmed Fezza, Mohamed-Chaker Larabi, Kamel Mohamed Faraoun:
Feature-Based Color Correction of Multiview Video for Coding and Rendering Enhancement. IEEE Trans. Circuits Syst. Video Technol. 24(9): 1486-1498 (2014) - 2013
- [j5]Ali Cherif Moussa, Kamel Mohamed Faraoun, Sofiane Boukli Hacene:
Link Quality and MAC-Overhead aware Predictive Preemptive Multipath Routing Protocol for Mobile Ad hoc Networks. Int. J. Commun. Networks Inf. Secur. 5(3) (2013) - 2010
- [j4]Kamel Faraoun:
Chaos-Based Key Stream Generator Based on Multiple Maps Combinations and its Application to Images Encryption. Int. Arab J. Inf. Technol. 7(3): 231-240 (2010) - 2007
- [j3]Kamel Faraoun, Aoued Boukelif:
Genetic Programming Approach for Multi-Category Pattern Classification Applied to Network Intrusions Detection. Int. Arab J. Inf. Technol. 4(3): 237-246 (2007) - 2006
- [j2]Kamel Faraoun, Aoued Boukelif:
Genetic Programming Approach for Multi-Category Pattern Classification Applied to Network Intrusions Detection. Int. J. Comput. Intell. Appl. 6(1): 77-99 (2006) - 2005
- [j1]Kamel Faraoun, Aoued Boukelif:
Speeding Up Fractal Image Compression by Genetic Algorithms. Multidimens. Syst. Signal Process. 16(2): 217-236 (2005)
Conference and Workshop Papers
- 2021
- [c7]Fethi Imad Benaribi, Mimoun Malki, Kamel Mohamed Faraoun:
Protecting Sensitive Data in Web of Data. MEDI Workshops 2021: 152-165 - 2016
- [c6]Samira Ouddane, Kamel Mohamed Faraoun, Sid Ahmed Fezza, Mohamed-Chaker Larabi:
Adaptive colorization-based compression for stereoscopic images. 3DTV-Conference 2016: 1-4 - 2014
- [c5]Sid Ahmed Fezza, Mohamed-Chaker Larabi, Kamel Mohamed Faraoun:
Asymmetric coding using Binocular Just Noticeable Difference and depth information for stereoscopic 3D. ICASSP 2014: 880-884 - [c4]Sid Ahmed Fezza, Mohamed-Chaker Larabi, Kamel Mohamed Faraoun:
Stereoscopic image quality metric based on local entropy and binocular just noticeable difference. ICIP 2014: 2002-2006 - [c3]Sid Ahmed Fezza, Mohamed-Chaker Larabi, Kamel Mohamed Faraoun:
Asymmetric coding of stereoscopic 3D based on perceptual significance. ICIP 2014: 5656-5660 - 2013
- [c2]Sid Ahmed Fezza, Mohamed-Chaker Larabi, Kamel Mohamed Faraoun:
Coding and rendering enhancement of multi-view video by color correction. EUVIP 2013: 166-171 - 2011
- [c1]Sid Ahmed Fezza, Kamel Mohamed Faraoun:
New Prediction Structure for Stereoscopic Video Coding Based on the H.264/AVC Standard. DICTAP (1) 2011: 762-769
Informal and Other Publications
- 2013
- [i1]Ali Cherif Moussa, Kamel Mohamed Faraoun:
Link Quality and MAC-Overhead aware Predictive Preemptive Routing Protocol for Mobile Ad hoc Network. CoRR abs/1312.7126 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint