Analysis of blockchain solutions for E-voting: A systematic literature review A Benabdallah, A Audras, L Coudert, N El Madhoun, M Badra IEEE Access 10, 70746-70759, 2022 | 41 | 2022 |
An online security protocol for NFC payment: Formally analyzed by the scyther tool N El Madhoun 2016 Second International Conference on Mobile and Secure Services …, 2016 | 32 | 2016 |
A Cloud-Based Secure Authentication Protocol for Contactless-NFC Payment N El Madhoun | 30 | 2015 |
Security enhancements in emv protocol for nfc mobile payment N El Madhoun, G Pujolle 2016 IEEE Trustcom/BigDataSE/ISPA, 1889-1895, 2016 | 25 | 2016 |
Graph neural networks for intrusion detection: A survey T Bilot, N El Madhoun, K Al Agha, A Zouaoui IEEE Access, 2023 | 19 | 2023 |
An overview of the emv protocol and its security vulnerabilities N El Madhoun, E Bertin, G Pujolle 2018 Fourth International Conference on Mobile and Secure Services …, 2018 | 16 | 2018 |
A decision tree for building IT applications: What to choose: blockchain or classical systems? N El Madhoun, J Hatin, E Bertin Annals of Telecommunications 76 (3), 131-144, 2021 | 14 | 2021 |
3BI-ECC: a decentralized identity framework based on blockchain technology and elliptic curve cryptography D Maldonado-Ruiz, J Torres, N El Madhoun 2020 2nd Conference on Blockchain Research & Applications for Innovative …, 2020 | 14 | 2020 |
An innovative and decentralized identity framework based on blockchain technology D Maldonado-Ruiz, J Torres, N El Madhoun, M Badra 2021 11th IFIP International Conference on New Technologies, Mobility and …, 2021 | 12 | 2021 |
Current trends in blockchain implementations on the paradigm of public key infrastructure: a survey D Maldonado-Ruiz, J Torres, N El Madhoun, M Badra IEEE Access 10, 17641-17655, 2022 | 11 | 2022 |
Going beyond the blockchain hype: In which cases are blockchains useful for it applications? N El Madhoun, J Hatin, E Bertin 2019 3rd Cyber Security in Networking Conference (CSNet), 21-27, 2019 | 11 | 2019 |
Towards more secure EMV purchase transactions: A new security protocol formally analyzed by the Scyther tool N El Madhoun, E Bertin, M Badra, G Pujolle Annals of Telecommunications 76, 203-222, 2021 | 10 | 2021 |
Magic always comes with a price: Utility versus security for bank cards N El Madhoun, E Bertin 2017 1st Cyber Security in Networking Conference (CSNet), 1-7, 2017 | 9 | 2017 |
An Innovative Cloud-based RFID Traceability Architecture and Service N El Madhoun The 5th International Conference On Network of the Future, 2014 | 9 | 2014 |
A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks P Faruki, R Bhan, V Jain, S Bhatia, N El Madhoun, R Pamula Information 14 (7), 374, 2023 | 8 | 2023 |
A secure cloud-based NFC payment architecture for small traders N El Madhoun, G Pujolle 2016 3rd Smart Cloud Networks & Systems (SCNS), 1-6, 2016 | 8 | 2016 |
The EMV Payment System: Is It Reliable? N El Madhoun, E Bertin, G Pujolle 2019 3rd Cyber Security in Networking Conference (CSNet), 80-85, 2019 | 7 | 2019 |
Security of NFC Banking Transactions: Overview on Attacks and Solutions S Chabbi, N El Madhoun, L Khamer The 6th Cyber Security in Networking Conference CSNet 2022, 2022 | 5 | 2022 |
Analysis of Blockchain Security: Classic attacks, Cybercrime and Penetration Testing S Kaushik, N El Madhoun 2023 Eighth International Conference On Mobile And Secure Services …, 2023 | 3 | 2023 |
A Survey on Malware Detection with Graph Representation Learning T Bilot, NE Madhoun, KA Agha, A Zouaoui arXiv preprint arXiv:2303.16004, 2023 | 3 | 2023 |