BibTeX records: Wafa Ben Jaballah

download as .bib file

@article{DBLP:journals/popets/MansouriOJC23,
  author       = {Mohamad Mansouri and
                  Melek {\"{O}}nen and
                  Wafa Ben Jaballah and
                  Mauro Conti},
  title        = {SoK: Secure Aggregation Based on Cryptographic Schemes for Federated
                  Learning},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2023},
  number       = {1},
  pages        = {140--157},
  year         = {2023},
  url          = {https://doi.org/10.56553/popets-2023-0009},
  doi          = {10.56553/POPETS-2023-0009},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/MansouriOJC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/BouchouiaLJMJPZ23,
  author       = {Mohammed Lamine Bouchouia and
                  Houda Labiod and
                  Ons Jelassi and
                  Jean{-}Philippe Monteuuis and
                  Wafa Ben Jaballah and
                  Jonathan Petit and
                  Zonghua Zhang},
  title        = {A survey on misbehavior detection for connected and autonomous vehicles},
  journal      = {Veh. Commun.},
  volume       = {41},
  pages        = {100586},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.vehcom.2023.100586},
  doi          = {10.1016/J.VEHCOM.2023.100586},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vcomm/BouchouiaLJMJPZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MansouriOJ22,
  author       = {Mohamad Mansouri and
                  Melek {\"{O}}nen and
                  Wafa Ben Jaballah},
  title        = {Learning from Failures: Secure and Fault-Tolerant Aggregation for
                  Federated Learning},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {146--158},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3568135},
  doi          = {10.1145/3564625.3568135},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MansouriOJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rcis/BouchouiaMJLJP21,
  author       = {Mohammed Lamine Bouchouia and
                  Jean{-}Philippe Monteuuis and
                  Ons Jelassi and
                  Houda Labiod and
                  Wafa Ben Jaballah and
                  Jonathan Petit},
  editor       = {Samira Si{-}Said Cherfi and
                  Anna Perini and
                  Selmin Nurcan},
  title        = {Spatial and Temporal Cross-Validation Approach for Misbehavior Detection
                  in {C-ITS}},
  booktitle    = {Research Challenges in Information Science - 15th International Conference,
                  {RCIS} 2021, Limassol, Cyprus, May 11-14, 2021, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {415},
  pages        = {452--468},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75018-3\_30},
  doi          = {10.1007/978-3-030-75018-3\_30},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rcis/BouchouiaMJLJP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MansouriJORC21,
  author       = {Mohamad Mansouri and
                  Wafa Ben Jaballah and
                  Melek {\"{O}}nen and
                  Md Masoom Rabbani and
                  Mauro Conti},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {{FADIA:} fairness-driven collaborative remote attestation},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {60--71},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468284},
  doi          = {10.1145/3448300.3468284},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MansouriJORC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/JaballahCL20,
  author       = {Wafa Ben Jaballah and
                  Mauro Conti and
                  Chhagan Lal},
  title        = {Security and design requirements for software-defined VANETs},
  journal      = {Comput. Networks},
  volume       = {169},
  pages        = {107099},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comnet.2020.107099},
  doi          = {10.1016/J.COMNET.2020.107099},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/JaballahCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KaliyarJCL20,
  author       = {Pallavi Kaliyar and
                  Wafa Ben Jaballah and
                  Mauro Conti and
                  Chhagan Lal},
  title        = {LiDL: Localization with early detection of sybil and wormhole attacks
                  in IoT Networks},
  journal      = {Comput. Secur.},
  volume       = {94},
  pages        = {101849},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101849},
  doi          = {10.1016/J.COSE.2020.101849},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KaliyarJCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-04577,
  author       = {Wafa Ben Jaballah and
                  Mauro Conti and
                  Chhagan Lal},
  title        = {A Survey on Software-Defined VANETs: Benefits, Challenges, and Future
                  Directions},
  journal      = {CoRR},
  volume       = {abs/1904.04577},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.04577},
  eprinttype    = {arXiv},
  eprint       = {1904.04577},
  timestamp    = {Thu, 25 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-04577.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/JaballahCFMZ18,
  author       = {Wafa Ben Jaballah and
                  Mauro Conti and
                  Gilberto Fil{\'{e}} and
                  Mohamed Mosbah and
                  Akka Zemmari},
  title        = {Whac-A-Mole: Smart node positioning in clone attack in wireless sensor
                  networks},
  journal      = {Comput. Commun.},
  volume       = {119},
  pages        = {66--82},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comcom.2018.01.010},
  doi          = {10.1016/J.COMCOM.2018.01.010},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/JaballahCFMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/JaballahCP18,
  author       = {Wafa Ben Jaballah and
                  Mauro Conti and
                  Claudio E. Palazzi},
  title        = {The position cheating attack on inter-vehicular online gaming},
  booktitle    = {15th {IEEE} Annual Consumer Communications {\&} Networking Conference,
                  {CCNC} 2018, Las Vegas, NV, USA, January 12-15, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CCNC.2018.8319160},
  doi          = {10.1109/CCNC.2018.8319160},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/JaballahCP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BhandariJJLZGMC17,
  author       = {Shweta Bhandari and
                  Wafa Ben Jaballah and
                  Vineeta Jain and
                  Vijay Laxmi and
                  Akka Zemmari and
                  Manoj Singh Gaur and
                  Mohamed Mosbah and
                  Mauro Conti},
  title        = {Android inter-app communication threats and detection techniques},
  journal      = {Comput. Secur.},
  volume       = {70},
  pages        = {392--421},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2017.07.002},
  doi          = {10.1016/J.COSE.2017.07.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BhandariJJLZGMC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/MbarekMJM17,
  author       = {Bacem Mbarek and
                  Aref Meddeb and
                  Wafa Ben Jaballah and
                  Mohamed Mosbah},
  title        = {A secure electric energy management in smart home},
  journal      = {Int. J. Commun. Syst.},
  volume       = {30},
  number       = {17},
  year         = {2017},
  url          = {https://doi.org/10.1002/dac.3347},
  doi          = {10.1002/DAC.3347},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/MbarekMJM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ant/MbarekMJM17,
  author       = {Bacem Mbarek and
                  Aref Meddeb and
                  Wafa Ben Jaballah and
                  Mohamed Mosbah},
  editor       = {Elhadi M. Shakshuki},
  title        = {An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks},
  booktitle    = {The 8th International Conference on Ambient Systems, Networks and
                  Technologies {(ANT} 2017) / The 7th International Conference on Sustainable
                  Energy Information Technology {(SEIT} 2017), 16-19 May 2017, Madeira,
                  Portugal},
  series       = {Procedia Computer Science},
  volume       = {109},
  pages        = {553--559},
  publisher    = {Elsevier},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.procs.2017.05.340},
  doi          = {10.1016/J.PROCS.2017.05.340},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ant/MbarekMJM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/JaballahCMP16,
  author       = {Wafa Ben Jaballah and
                  Mauro Conti and
                  Mohamed Mosbah and
                  Claudio E. Palazzi},
  title        = {The impact of malicious nodes positioning on vehicular alert messaging
                  system},
  journal      = {Ad Hoc Networks},
  volume       = {52},
  pages        = {3--16},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.adhoc.2016.08.008},
  doi          = {10.1016/J.ADHOC.2016.08.008},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/JaballahCMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/MbarekMJM16,
  author       = {Bacem Mbarek and
                  Aref Meddeb and
                  Wafa Ben Jaballah and
                  Mohamed Mosbah},
  title        = {A broadcast authentication scheme in IoT environments},
  booktitle    = {13th {IEEE/ACS} International Conference of Computer Systems and Applications,
                  {AICCSA} 2016, Agadir, Morocco, November 29 - December 2, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AICCSA.2016.7945807},
  doi          = {10.1109/AICCSA.2016.7945807},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aiccsa/MbarekMJM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JaballahK16,
  author       = {Wafa Ben Jaballah and
                  Nizar Kheir},
  editor       = {Ilsun You and
                  Elisa Bertino},
  title        = {A Grey-Box Approach for Detecting Malicious User Interactions in Web
                  Applications},
  booktitle    = {Proceedings of the 8th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October
                  28, 2016},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2995966},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JaballahK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BhandariJJLZGC16,
  author       = {Shweta Bhandari and
                  Wafa Ben Jaballah and
                  Vineeta Jain and
                  Vijay Laxmi and
                  Akka Zemmari and
                  Manoj Singh Gaur and
                  Mauro Conti},
  title        = {Android App Collusion Threat and Mitigation Techniques},
  journal      = {CoRR},
  volume       = {abs/1611.10076},
  year         = {2016},
  url          = {http://arxiv.org/abs/1611.10076},
  eprinttype    = {arXiv},
  eprint       = {1611.10076},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BhandariJJLZGC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijssc/JaballahMYZ15,
  author       = {Wafa Ben Jaballah and
                  Mohamed Mosbah and
                  Habib Youssef and
                  Akka Zemmari},
  title        = {Lightweight secure group communications for resource constrained devices},
  journal      = {Int. J. Space Based Situated Comput.},
  volume       = {5},
  number       = {4},
  pages        = {187--200},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSSC.2015.073696},
  doi          = {10.1504/IJSSC.2015.073696},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijssc/JaballahMYZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/MbarekMJM15,
  author       = {Bacem Mbarek and
                  Aref Meddeb and
                  Wafa Ben Jaballah and
                  Mohamed Mosbah},
  title        = {A secure authentication mechanism for resource constrained devices},
  booktitle    = {12th {IEEE/ACS} International Conference of Computer Systems and Applications,
                  {AICCSA} 2015, Marrakech, Morocco, November 17-20, 2015},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AICCSA.2015.7507270},
  doi          = {10.1109/AICCSA.2015.7507270},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aiccsa/MbarekMJM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/JaballahCMP15,
  author       = {Wafa Ben Jaballah and
                  Mauro Conti and
                  Mohamed Mosbah and
                  Claudio E. Palazzi},
  title        = {Impact of security threats in vehicular alert messaging systems},
  booktitle    = {{IEEE} International Conference on Communication, {ICC} 2015, London,
                  United Kingdom, June 8-12, 2015, Workshop Proceedings},
  pages        = {2627--2632},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICCW.2015.7247575},
  doi          = {10.1109/ICCW.2015.7247575},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/JaballahCMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/notere/MbarekMJM15,
  author       = {Bacem Mbarek and
                  Aref Meddeb and
                  Wafa Ben Jaballah and
                  Mohamed Mosbah},
  title        = {Enhanced {LEAP} authentication delay for higher immunity against DoS
                  attack},
  booktitle    = {International Conference on Protocol Engineering, {ICPE} 2015, and
                  International Conference on New Technologies of Distributed Systems,
                  {NTDS} 2015 {[CFIP} (Colloque francophone sur l'ing{\'{e}}nierie
                  des protocoles) / {NOTERE} (Nouvelles Technologies de la R{\'{e}}partition)],
                  Paris, France, July 22-24, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/NOTERE.2015.7293497},
  doi          = {10.1109/NOTERE.2015.7293497},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/notere/MbarekMJM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/BenJaballah14,
  author       = {Wafa Ben Jaballah},
  title        = {Securing wireless sensor and vehicular networks. (S{\'{e}}curit{\'{e}}
                  des r{\'{e}}seaux de capteurs et des communications v{\'{e}}hiculaires)},
  school       = {University of Bordeaux, France},
  year         = {2014},
  url          = {https://tel.archives-ouvertes.fr/tel-01199395},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/BenJaballah14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/JaballahCMP14,
  author       = {Wafa Ben Jaballah and
                  Mauro Conti and
                  Mohamed Mosbah and
                  Claudio E. Palazzi},
  title        = {A secure alert messaging system for safe driving},
  journal      = {Comput. Commun.},
  volume       = {46},
  pages        = {29--42},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.comcom.2014.03.010},
  doi          = {10.1016/J.COMCOM.2014.03.010},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/JaballahCMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/JaballahCMP14,
  author       = {Wafa Ben Jaballah and
                  Mauro Conti and
                  Mohamed Mosbah and
                  Claudio E. Palazzi},
  title        = {Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {15},
  number       = {1},
  pages        = {433--450},
  year         = {2014},
  url          = {https://doi.org/10.1109/TITS.2013.2277890},
  doi          = {10.1109/TITS.2013.2277890},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/JaballahCMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/JaballahMYZ13,
  author       = {Wafa Ben Jaballah and
                  Mohamed Mosbah and
                  Habib Youssef and
                  Akka Zemmari},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Makoto Takizawa and
                  Tomoya Enokido and
                  Hui{-}Huang Hsu},
  title        = {Lightweight Source Authentication Mechanisms for Group Communications
                  in Wireless Sensor Networks},
  booktitle    = {27th {IEEE} International Conference on Advanced Information Networking
                  and Applications, {AINA} 2013, Barcelona, Spain, March 25-28, 2013},
  pages        = {598--605},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/AINA.2013.56},
  doi          = {10.1109/AINA.2013.56},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/JaballahMYZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/JaballahCPMV13,
  author       = {Wafa Ben Jaballah and
                  Mauro Conti and
                  Roberto Di Pietro and
                  Mohamed Mosbah and
                  Nino Vincenzo Verde},
  editor       = {Bruno Crispo and
                  Ravi S. Sandhu and
                  Nora Cuppens{-}Boulahia and
                  Mauro Conti and
                  Jean{-}Louis Lanet},
  title        = {{MASS:} An efficient and secure broadcast authentication scheme for
                  resource constrained devices},
  booktitle    = {2013 International Conference on Risks and Security of Internet and
                  Systems (CRiSIS), La Rochelle, France, October 23-25, 2013},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CRiSIS.2013.6766350},
  doi          = {10.1109/CRISIS.2013.6766350},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/JaballahCPMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/JaballahCMP13,
  author       = {Wafa Ben Jaballah and
                  Mauro Conti and
                  Mohamed Mosbah and
                  Claudio E. Palazzi},
  title        = {Secure Verification of Location Claims on a Vehicular Safety Application},
  booktitle    = {22nd International Conference on Computer Communication and Networks,
                  {ICCCN} 2013, Nassau, Bahamas, July 30 - Aug. 2, 2013},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICCCN.2013.6614193},
  doi          = {10.1109/ICCCN.2013.6614193},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/JaballahCMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/JaballahMY13,
  author       = {Wafa Ben Jaballah and
                  Mohamed Mosbah and
                  Habib Youssef},
  title        = {Performance evaluation of key disclosure delay-based schemes in wireless
                  sensor networks},
  booktitle    = {2013 {IEEE} International Conference on Pervasive Computing and Communications
                  Workshops, {PERCOM} 2013 Workshops, San Diego, CA, USA, March 18-22,
                  2013},
  pages        = {566--571},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/PerComW.2013.6529560},
  doi          = {10.1109/PERCOMW.2013.6529560},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/JaballahMY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/JaballahMY10,
  author       = {Wafa Ben Jaballah and
                  Aref Meddeb and
                  Habib Youssef},
  title        = {An efficient source authentication scheme in wireless sensor networks},
  booktitle    = {The 8th {ACS/IEEE} International Conference on Computer Systems and
                  Applications, {AICCSA} 2010, Hammamet, Tunisia, May 16-19, 2010},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/AICCSA.2010.5586993},
  doi          = {10.1109/AICCSA.2010.5586993},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aiccsa/JaballahMY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}