Suivre
Ali Kassem
Ali Kassem
Adresse e-mail validée de polytechnique.edu
Titre
Citée par
Citée par
Année
Decentralized voting platform based on ethereum blockchain
D Khoury, EF Kfoury, A Kassem, H Harb
2018 IEEE International Multidisciplinary Conference on Engineering …, 2018
1092018
Efficient neural chaotic generator for image encryption
A Kassem, HAH Hassan, Y Harkouss, R Assaf
Digital Signal Processing 25, 266-274, 2014
412014
A framework for analyzing verifiability in traditional and electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini
International Conference on Information Security Practice and Experience …, 2015
282015
Formal analysis of e-cash protocols
J Dreier, A Kassem, P Lafourcade
2015 12th International Joint Conference on e-Business and …, 2015
272015
Formal analysis of electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini, PYA Ryan
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-12, 2014
252014
Monitoring electronic exams
A Kassem, Y Falcone, P Lafourcade
Runtime Verification: 6th International Conference, RV 2015, Vienna, Austria …, 2015
162015
BISM: bytecode-level instrumentation for software monitoring
C Soueidi, A Kassem, Y Falcone
Runtime Verification: 20th International Conference, RV 2020, Los Angeles …, 2020
112020
Formal analysis and offline monitoring of electronic exams
A Kassem, Y Falcone, P Lafourcade
Formal Methods in System Design 51, 117-153, 2017
112017
Detecting fault injection attacks with runtime verification
A Kassem, Y Falcone
Proceedings of the 3rd ACM Workshop on Software Protection, 65-76, 2019
102019
Differential inference testing: A practical approach to evaluate sanitizations of datasets
A Kassem, G Acs, C Castelluccia, C Palamidessi
2019 IEEE Security and Privacy Workshops (SPW), 72-79, 2019
82019
On the verifiability of (electronic) exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini
VERIMAG UMR 5104, Université Grenoble Alpes, France, 2015
82015
New chaotic image encryption technique
HAH Hassan, A Kassem, Y Harkouss, R Assaf, S El Assad
2012 Symposium on Broadband Networks and Fast Internet (RELABIRA), 103-108, 2012
82012
Water attachment onto size-selected cationic pyrene clusters
S Zamith, A Kassem, JM L’Hermite, C Joblin
The Journal of Physical Chemistry A 126 (23), 3696-3707, 2022
72022
Efficient and expressive bytecode-level instrumentation for Java programs
C Soueidi, M Monnier, Y Falcone
International Journal on Software Tools for Technology Transfer 25 (4), 453-479, 2023
52023
Formal security analysis of traditional and electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini, PYA Ryan
International Conference on E-Business and Telecommunications, 294-318, 2014
52014
Formal verification of e-reputation protocols
A Kassem, P Lafourcade, Y Lakhnech
Foundations and Practice of Security: 7th International Symposium, FPS 2014 …, 2015
32015
Multiple independent lazy intruders
A Kassem, P Lafourcade, Y Lakhnech, S Mödersheim
1st Workshop on Hot Issues in Security Principles and Trust (HotSpot 2013), 2013
32013
Differential inference testing a practical approach to evaluate anonymized data
A Kassem, G Acs, C Castelluccia, C Palamidessi
INRIA, 2018
22018
Automated verification of e-cash protocols
J Dreier, A Kassem, P Lafourcade
International Conference on E-Business and Telecommunications, 223-244, 2015
22015
A more realistic model for verifying route validity in ad-hoc networks
A Kassem, P Lafourcade, Y Lakhnech
International Symposium on Foundations and Practice of Security, 306-322, 2013
22013
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20