Mohamed Mejri
Mohamed Mejri
Université Laval
No verified email
Cited by
Cited by
GDVAN: a new greedy behavior attack detection algorithm for VANETs
MN Mejri, J Ben-Othman
IEEE Transactions on Mobile Computing 16 (3), 759-771, 2016
A new logic for electronic commerce protocols
K Adi, M Debbabi, M Mejri
Theoretical Computer Science 291 (3), 223-283, 2003
Formal automatic verification of authentication cryptographic protocols
M Debbabi, M Mejri, N Tawbi, I Yahmadi
First IEEE International Conference on Formal Engineering Methods, 50-59, 1997
Detecting greedy behavior by linear regression and watchdog in vehicular ad hoc networks
MN Mejri, J Ben-Othman
2014 IEEE Global Communications Conference, 5032-5037, 2014
Risk analysis in access control systems
J Ma, K Adi, M Mejri, L Logrippo
2010 Eighth International Conference on Privacy, Security and Trust, 160-166, 2010
A new algorithm for the automatic verification of authentication protocols: From specifications to flaws and attack scenarios
M Debbabi, M Mejri, N Tawbi, I Yahmadi
DIMACS Workshop on Design and Formal Verifictaion of Security Protocols, 1997
Fast and effective clustering of spam emails based on structural similarity
M Sheikhalishahi, A Saracino, M Mejri, N Tawbi, F Martinelli
International Symposium on Foundations and Practice of Security, 195-211, 2015
A new security games based reaction algorithm against DOS attacks in VANETs
MN Mejri, N Achir, M Hamdi
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2016
Entropy as a new metric for denial of service attack detection in vehicular ad-hoc networks
MN Mejri, J Ben-Othman
Proceedings of the 17th ACM international conference on Modeling, analysis …, 2014
Practical and Universal Interpretation Functions for Secrecy.
H Houmani, M Mejri
SECRYPT, 157-164, 2007
Formal analysis of set and nsl protocols using the interpretation functions-based method
H Houmani, M Mejri
Journal of Computer Networks and Communications 2012, 2012
Formal enforcement of security policies on concurrent systems
M Langar, M Mejri, K Adi
Journal of Symbolic Computation 46 (9), 997-1016, 2011
Secrecy of cryptographic protocols under equational theory
H Houmani, M Mejri, H Fujita
Knowledge-Based Systems 22 (3), 160-173, 2009
Ensuring the Correctness of Cryptographic Protocols with Respect to Secrecy.
H Houmani, M Mejri
SECRYPT, 184-189, 2008
An environment for the specification and analysis of cryptoprotocols
M Debbabi, Y Legaré, M Mejri
Proceedings 14th Annual Computer Security Applications Conference (Cat. No …, 1998
Clustering spam emails into campaigns
MS Alishahi, M Mejri, N Tawbi
2015 International Conference on Information Systems Security and Privacy …, 2015
Security by typing
M Debbabi, N Durgin, M Mejri, JC Mitchell
International Journal on Software Tools for Technology Transfer 4 (4), 472-495, 2003
Using edit automata for rewriting-based security enforcement
H Ould-Slimane, M Mejri, K Adi
IFIP Annual Conference on Data and Applications Security and Privacy, 175-190, 2009
Specification of electronic voting protocol properties using adm logic: Foo case study
M Talbi, B Morin, VVT Tong, A Bouhoula, M Mejri
International Conference on Information and Communications Security, 403-418, 2008
A new group Diffie-Hellman key generation proposal for secure VANET communications
MN Mejri, N Achir, M Hamdi
2016 13th IEEE annual consumer communications & networking conference (CCNC …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20