default search action
Hella Kaffel Ben Ayed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c30]Karim Houidi, Marwa Said, Akram Hakiri, Nédra Mellouli-Nauwynck, Hella Kaffel Ben Ayed:
Federated Learning Models for Real-Time IoT: A Survey. ISORC 2024: 1-6 - [c29]Marwa Said, Karim Houidi, Akram Hakiri, Nédra Mellouli-Nauwynck, Hella Kaffel Ben Ayed:
Performance Evaluation of LoRaWAN Propagation Models for Real-Time IoT Deployments. ISORC 2024: 1-6 - [i1]Marie Tcholakian, Karolina Gorna, Maryline Laurent, Hella Kaffel Ben Ayed, Montassar Naghmouchi:
Self-Sovereign Identity for Consented and Content-Based Access to Medical Records using Blockchain. CoRR abs/2407.21559 (2024) - 2023
- [c28]Ela Mannai, Hella Kaffel Ben Ayed, Ilhem Abdelhedi Abdelmoula, Bilel Zaghdoudi:
Toward Interoperability of NFT Marketplaces. IWCMC 2023: 1679-1683 - [c27]Khadija Rammeh Houerbi, Dorra Machfar, Hella Kaffel-Ben Ayed:
Blockchain for Ridesharing: A Systematic Literature Review. SmartNets 2023: 1-6 - 2022
- [c26]Aissa Trad, Hella Kaffel Ben Ayed, Narjes Doggaz:
Machine learning contributions on the field of security and privacy of android. IWCMC 2022: 1131-1135 - 2021
- [c25]Montassar Naghmouchi, Hella Kaffel Ben Ayed, Maryline Laurent:
An Automatized Identity and Access Management System for IoT Combining Self-Sovereign Identity and Smart Contracts. FPS 2021: 208-217 - [c24]Imen Riabi, Hella Kaffel Ben Ayed, Bilel Zaghdoudi, Laurent George:
Blockchain based OAuth for IoT. PEMWN 2021: 1-7
2010 – 2019
- 2019
- [c23]Imen Riabi, Hella Kaffel Ben Ayed, Leïla Azouz Saïdane:
A survey on Blockchain based access control for Internet of Things. IWCMC 2019: 502-507 - [c22]Zied El May, Hella Kaffel Ben Ayed, Dorra Machfar:
State of the art on Privacy Risk Estimation Related to Android Applications. IWCMC 2019: 889-894 - [c21]Imen Riabi, Yosr Dhif, Hella Kaffel Ben Ayed, Khaled Zaatouri:
A Blockchain based access control for IoT. IWCMC 2019: 2086-2091 - 2017
- [c20]Hajer Boujezza, Hella Kaffel-Ben Ayed, Leïla Azouz Saïdane:
Protection of IoT transaction using ID-KEM based on three-pass protocol countermeasure. IWCMC 2017: 423-428 - [c19]Hella Kaffel-Ben Ayed, Hajer Boujezza, Imen Riabi:
An IDMS approach towards privacy and new requirements in IoT. IWCMC 2017: 429-434 - [c18]Asma Hamed, Hella Kaffel-Ben Ayed, Dorra Machfar:
Assessment for Android apps permissions a proactive approach toward privacy risk. IWCMC 2017: 1465-1470 - [c17]Imen Riabi, Leïla Azouz Saïdane, Hella Kaffel-Ben Ayed:
A proposal of a distributed access control over Fog computing: The ITS use case. PEMWN 2017: 1-7 - 2016
- [j7]Hella Kaffel-Ben Ayed, Bilel Zaghdoudi:
A generic Kerberos-based access control system for the cloud. Ann. des Télécommunications 71(9-10): 555-567 (2016) - [j6]Bilel Zaghdoudi, Hella Kaffel-Ben Ayed:
A protocol for setting up ad hoc mobile clouds over spontaneous MANETs. Int. J. Wirel. Mob. Comput. 11(2): 137-150 (2016) - [c16]Asma Hamed, Hella Kaffel Ben Ayed:
Privacy risk assessment and users' awareness for mobile apps permissions. AICCSA 2016: 1-8 - [c15]Bilel Zaghdoudi, Hella Kaffel-Ben Ayed, Wafa Harizi:
Generic Access Control System for Ad Hoc MCC and Fog Computing. CANS 2016: 400-415 - [c14]Asma Hamed, Hella Kaffel Ben Ayed:
Privacy risk assessment for Web tracking: A user-oriented approach toward privacy risk assessment for Web tracking. CCECE 2016: 1-6 - [c13]Bilel Zaghdoudi, Hella Kaffel-Ben Ayed, Islem Gnichi:
A protocol for setting up ad hoc mobile clouds over spontaneous MANETs: A proof of concept. CIoT 2016: 1-6 - 2015
- [c12]Hajer Boujezza, Modher Al-mufti, Hella Kaffel Ben Ayed, Leïla Azouz Saïdane:
A taxonomy of identities management systems in IOT. AICCSA 2015: 1-8 - [c11]Bilel Zaghdoudi, Hella Kaffel-Ben Ayed, Imen Riabi:
Ad Hoc Cloud as a Service: A Protocol for Setting up an Ad hoc Cloud over MANETs. FNC/MobiSPC 2015: 573-579 - 2014
- [j5]Hella Kaffel Ben Ayed, Asma Hamed:
Toward Proactive Mobile Tracking Management. Int. J. Inf. Secur. Priv. 8(4): 26-43 (2014) - 2013
- [c10]Asma Hamed, Hella Kaffel-Ben Ayed, Mohamed Ali Kâafar, Ahmed Kharraz:
Evaluation of third party tracking on the web. ICITST 2013: 471-477 - 2012
- [j4]Hella Kaffel-Ben Ayed, Faouzi Jaïdi, Ines Doghri:
Fairness and Access Control for Mobile P2P Auctions over MANETs. J. Theor. Appl. Electron. Commer. Res. 7(3): 11-27 (2012)
2000 – 2009
- 2008
- [c9]Ines Doghri, Hella Kaffel-Ben Ayed:
Towards fair P2P auctions over MANETs. CIT 2008: 658-663 - [c8]Eymen Ben Bnina, Olivier Camp, Chung Tien Nguyen, Hella Kaffel Ben Ayed:
What Can Context Do for Trust in Manets? ICEIS (4) 2008: 133-141 - [c7]Ines Doghri, Hella Kaffel-Ben Ayed:
Performance Evaluation of a Protocol for Fair P2P Auctions over MANETs. Med-Hoc-Net 2008: 85-96 - 2007
- [j3]Alia Fourati, Khaldoun Al Agha, Hella Kaffel Ben Ayed:
Secure and fair auctions over ad hoc networks. Int. J. Electron. Bus. 5(3): 276-293 (2007) - [j2]Chokri El Anoun, Hichem Eleuch, Hella Kaffel Ben Ayed, Esma Aïmeur, Farouk Kamoun:
Analogy in Making Predictions. J. Decis. Syst. 16(3): 393-416 (2007) - 2005
- [c6]Ilhem Abdelhedi Abdelmoula, Hella Kaffel Ben Ayed, Farouk Kamoun:
A Hierarchical distributed communication architecture for real-time auctions. ICETE 2005: 5-15 - 2004
- [c5]Hella Kaffel Ben Ayed, Safa Kaabi Chihi, Farouk Kamoun:
A Communication Architecture for Real-Time Auctions. Net-Con 2004: 111-124 - [c4]Alia Fourati, Hella Kaffel Ben Ayed, Farouk Kamoun, Abdelmalek Benzekri:
Security issues of m-commerce over hotspot networks. WCNC 2004: 837-838 - 2002
- [c3]Alia Fourati, Hella Kaffel Ben Ayed, Farouk Kamoun, Abdelmalek Benzekri:
Wireless set: an approach for the deployment of set over WAP mobile networks. Net-Con 2002: 437-442 - [c2]Alia Fourati, Hella Kaffel Ben Ayed, Farouk Kamoun, Abdelmalek Benzekri:
A SET Based Approach to Secure the Payment in Mobile Commerce. LCN 2002: 136-137
1990 – 1999
- 1999
- [j1]Lamia Ben Azzouz, Hella Kaffel Ben Ayed, Farouk Kamoun:
An EDI User Agent over the Internet. Netw. Inf. Syst. J. 2(4): 483- (1999)
1980 – 1989
- 1986
- [c1]Farouk Kamoun, Mohamed Ben Sassi, Hella Kaffel Ben Ayed:
Messaging System for African Countries: Afrimail Project. ICCC 1986: 171-175
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-22 19:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint