Decentralized voting platform based on ethereum blockchain D Khoury, EF Kfoury, A Kassem, H Harb 2018 IEEE International Multidisciplinary Conference on Engineering …, 2018 | 109 | 2018 |
Efficient neural chaotic generator for image encryption A Kassem, HAH Hassan, Y Harkouss, R Assaf Digital Signal Processing 25, 266-274, 2014 | 41 | 2014 |
A framework for analyzing verifiability in traditional and electronic exams J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini International Conference on Information Security Practice and Experience …, 2015 | 28 | 2015 |
Formal analysis of e-cash protocols J Dreier, A Kassem, P Lafourcade 2015 12th International Joint Conference on e-Business and …, 2015 | 27 | 2015 |
Formal analysis of electronic exams J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini, PYA Ryan 2014 11th International Conference on Security and Cryptography (SECRYPT), 1-12, 2014 | 25 | 2014 |
Monitoring electronic exams A Kassem, Y Falcone, P Lafourcade Runtime Verification: 6th International Conference, RV 2015, Vienna, Austria …, 2015 | 16 | 2015 |
BISM: bytecode-level instrumentation for software monitoring C Soueidi, A Kassem, Y Falcone Runtime Verification: 20th International Conference, RV 2020, Los Angeles …, 2020 | 11 | 2020 |
Formal analysis and offline monitoring of electronic exams A Kassem, Y Falcone, P Lafourcade Formal Methods in System Design 51, 117-153, 2017 | 11 | 2017 |
Detecting fault injection attacks with runtime verification A Kassem, Y Falcone Proceedings of the 3rd ACM Workshop on Software Protection, 65-76, 2019 | 10 | 2019 |
Differential inference testing: A practical approach to evaluate sanitizations of datasets A Kassem, G Acs, C Castelluccia, C Palamidessi 2019 IEEE Security and Privacy Workshops (SPW), 72-79, 2019 | 8 | 2019 |
On the verifiability of (electronic) exams J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini VERIMAG UMR 5104, Université Grenoble Alpes, France, 2015 | 8 | 2015 |
New chaotic image encryption technique HAH Hassan, A Kassem, Y Harkouss, R Assaf, S El Assad 2012 Symposium on Broadband Networks and Fast Internet (RELABIRA), 103-108, 2012 | 8 | 2012 |
Water attachment onto size-selected cationic pyrene clusters S Zamith, A Kassem, JM L’Hermite, C Joblin The Journal of Physical Chemistry A 126 (23), 3696-3707, 2022 | 7 | 2022 |
Efficient and expressive bytecode-level instrumentation for Java programs C Soueidi, M Monnier, Y Falcone International Journal on Software Tools for Technology Transfer 25 (4), 453-479, 2023 | 5 | 2023 |
Formal security analysis of traditional and electronic exams J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini, PYA Ryan International Conference on E-Business and Telecommunications, 294-318, 2014 | 5 | 2014 |
Formal verification of e-reputation protocols A Kassem, P Lafourcade, Y Lakhnech Foundations and Practice of Security: 7th International Symposium, FPS 2014 …, 2015 | 3 | 2015 |
Multiple independent lazy intruders A Kassem, P Lafourcade, Y Lakhnech, S Mödersheim 1st Workshop on Hot Issues in Security Principles and Trust (HotSpot 2013), 2013 | 3 | 2013 |
Differential inference testing a practical approach to evaluate anonymized data A Kassem, G Acs, C Castelluccia, C Palamidessi INRIA, 2018 | 2 | 2018 |
Automated verification of e-cash protocols J Dreier, A Kassem, P Lafourcade International Conference on E-Business and Telecommunications, 223-244, 2015 | 2 | 2015 |
A more realistic model for verifying route validity in ad-hoc networks A Kassem, P Lafourcade, Y Lakhnech International Symposium on Foundations and Practice of Security, 306-322, 2013 | 2 | 2013 |