Date


Research Areas

Download Available

59 results

3LS-authenticate: an e-commerce challenge-response mobile application.

Presentation / Conference
Molla, R., Romdhani, I., & Buchanan, B. (2016, November)
3LS-authenticate: an e-commerce challenge-response mobile application. Paper presented at 13th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2016, Agadir, Morocco
The rapid growth of e-commerce has been associated with a number of security concerns, which challenge its continual success. In view of this, an investigative study determini...

Weight Driven Cluster Head Rotation for Wireless Sensor Networks

Conference Proceeding
Eshaftri, M. A., Al-Dubai, A. Y., Romdhani, I., & Essa, A. (2016)
Weight Driven Cluster Head Rotation for Wireless Sensor Networks. In B. Abdulrazak, E. Pardede, M. Steinbauer, I. Khalil, & G. Anderst-Kotsis (Eds.), Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media MoMM'16, (327-331). https://doi.org/10.1145/3007120.3007170
Energy efficiency is one of the major issues in Wireless Sensor Networks (WSNs), due to the limited power and processing capabilities of the Sensor Nodes (SNs). The clustering...

Password Pattern and Vulnerability Analysis for Web and Mobile Applications

Journal Article
Li, S., Romdhani, I., & Buchanan, W. (2016)
Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, 32-36. https://doi.org/10.3969/j.issn.1673-5188.2016.S0.006
Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile ...

A new distributed MIKEY mode to secure e-health applications.

Conference Proceeding
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2016)
A new distributed MIKEY mode to secure e-health applications. In V. Chang, V. Méndez Muñoz, R. Walters, G. Wills, & M. Ramachandran (Eds.), Proceedings of the International Conference on Internet of Things and Big Data, (88-95). https://doi.org/10.5220/0005945300880095
Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing...

Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks

Conference Proceeding
Wadhaj, I., Kristof, I., Romdhani, I., & Al-Dubai, A. (2015)
Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks. In Proceedings of the 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), (1600-1605). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.241
Low-Power and Lossy-Network (LLN) are usually composed of static nodes, but the increase demand for mobility in mobile robotic and dynamic environment raises the question how ...

A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things

Conference Proceeding
Qasem, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015)
A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. In I. C. Society, & I. C. Society (Eds.), 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, (1118-1122). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.167
Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However...

Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable

Conference Proceeding
Krstie, D., Romdhani, I., Yassein, M. M. B., Minić, S., Petković, G., & Milacic, P. (2015)
Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, (1620-1625). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.244
In this paper, ratio of product of two k-μ random variables and Nakagami-m random variable is analyzed. Statistical characteristics of ratio of product of two k-μ random varia...

An Efficient Dynamic Load-balancing Aware Protocol for Wireless Sensor Networks

Conference Proceeding
Eshaftri, M. A., Al-Dubai, A. Y., Romdhani, I., & Yassein, M. B. (2015)
An Efficient Dynamic Load-balancing Aware Protocol for Wireless Sensor Networks. In G. Anderst-Kotsis, I. Khalil, M. Steinbaur, & L. Chen (Eds.), MoMM 2015 Proceedings of The 13th International Conference on Advances in Mobile Computing and Multimedia, (189-194). https://doi.org/10.1145/2837126.2837149
In Wireless Sensor Networks (WSNs), clustering techniques are among the effective solutions to reduce energy consumption and prolong the network lifetime. During the iterative...

A New Energy Efficient Cluster based Protocol for Wireless Sensor Networks

Conference Proceeding
Eshaftri, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015)
A New Energy Efficient Cluster based Protocol for Wireless Sensor Networks. In I. C. Society (Ed.), 2015 Federated Conference on Computer Science and Information Systems (FedCSIS), (1209-1214). https://doi.org/10.15439/2015F193
In Wireless Sensor Networks (WSNs), clustering techniques are usually used as a key effective solution to reduce energy consumption and prolong the network lifetime. Despite m...

An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation

Journal Article
Fang, D., Liu, X., Romdhani, I., Jamshidi, P., & Pahl, C. (2016)
An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation. Future Generation Computer Systems, 56, 11-26. https://doi.org/10.1016/j.future.2015.09.025
Cloud computing enables a revolutionary paradigm of consuming ICT services. However, due to the inadequately described service information, users often feel confused while try...

Date