Noureddine Chikouche
Noureddine Chikouche
Professor, University of M'sila
Verified email at - Homepage
Cited by
Cited by
An improved approach for lsb-based image steganography using AES algorithm
SL Chikouche, N Chikouche
2017 5th International Conference on Electrical Engineering-Boumerdes (ICEE …, 2017
A novel image encryption algorithm based on hybrid chaotic maps using a key image
S Benaissi, N Chikouche, R Hamza
Optik 272, 170316, 2023
A privacy-preserving code-based authentication protocol for Internet of Things
N Chikouche, PL Cayrel, EHM Mboup, BO Boidje
The Journal of Supercomputing 75 (12), 8231-8261, 2019
Authentication schemes for healthcare applications using wireless medical sensor networks: A survey
AN Bahache, N Chikouche, F Mezrag
SN Computer Science 3 (5), 382, 2022
Improved RFID authentication protocol based on randomized McEliece cryptosystem
N Chikouche, F Cherif, PL Cayrel, M Benmohammed
Privacy preservation in healthcare systems
BR Louassef, N Chikouche
2021 International Conference on Artificial Intelligence for Cyber Security …, 2021
An authentication protocol based on combined RFID-biometric system RFID-biometric system
N Chikouche, F Cherif, M Benmohammed
arXiv preprint arXiv:1207.5627, 2012
RFID authentication protocols based on error-correcting codes: a survey
N Chikouche, F Cherif, PL Cayrel, M Benmohammed
Wireless Personal Communications 96, 509-527, 2017
Performance evaluation of post-quantum public-key cryptography in smart mobile devices
N Chikouche, A Ghadbane
Conference on e-Business, e-Services and e-Society, 67-80, 2018
A secure code-based authentication scheme for RFID systems
N Chikouche, F Cherif, PL Cayrel, M Benmohammed
International Journal of Computer Network and Information Security 7 (9), 1-9, 2015
Eap-sres: An enhanced authentication protocol for secure remote education systems using nfc technology
N Chikouche, F Cherif
International Journal of Computing and Digital Systems 9 (03), 2020
Weaknesses in two RFID authentication protocols
N Chikouche, F Cherif, PL Cayrel, M Benmohammed
Codes, Cryptology, and Information Security: First International Conference …, 2015
Performance evaluation and analysis of encryption schemes for wireless sensor networks
AA Ghehioueche, N Chikouche, F Mezrag
2019 International Conference on Digitization (ICD), 187-191, 2019
Implementation of Public-Key cryptographic systems on embedded devices (case: Computation speed)
W Tayoub, S Lakehali, C Noureddine
Vulnerabilities of two recently RFID authentication protocols
N Chikouche, F Cherif, M Benmohammed
2012 IEEE International Conference on Complex Systems (ICCS), 1-6, 2012
An efficient privacy scheme for C-ITS stations
B Moussaoui, N Chikouche, H Fouchal
Computers and Electrical Engineering 107, 108613, 2023
Formal analysis of a novel RFID authentication protocol
N Chikouche
2017 8th International Conference on Computing, Communication and Networking …, 2017
Algebraic replay attacks on authentication in RFID protocols
N Chikouche, F Cherif, M Benmohammed
International Conference on Security of Information and Communication …, 2013
Vérification automatique des protocoles d’authentification des systèmes RFID
N Chikouche, M Benmohammed
Proc. of STIC’09, 2009
Securing Cloud-based Healthcare Applications with a Quantum-resistant Authentication and Key Agreement Framework
AN Bahache, N Chikouche, S Akleylek
Internet of Things 26, 101200, 2024
The system can't perform the operation now. Try again later.
Articles 1–20