Author of the publication

Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions.

, , , , , and . IEEE Internet of Things Journal, 6 (3): 4556-4560 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Challal, Yacine
add a person with the name Challal, Yacine
 

Other publications of authors with the same name

On security issues in embedded systems: challenges and solutions., , , and . IJICS, 2 (2): 140-174 (2008)BitTorrent Worm Sensor Network : P2P Worms Detection and Containment., , and . PDP, page 293-300. IEEE Computer Society, (2009)Efficient CP-ABE Attribute/Key Management for IoT Applications., and . CIT/IUCC/DASC/PICom, page 343-350. IEEE, (2015)eSKAMI: Efficient and Scalable Multi-group Key Management for Advanced Metering Infrastructure in Smart Grid., and . TrustCom/BigDataSE/ISPA (1), page 782-789. IEEE, (2015)RLH: receiver driven layered hash-chaining for multicast data origin authentication., , and . Computer Communications, 28 (7): 726-740 (2005)A new class of Hash-Chain based key pre-distribution schemes for WSN., , and . Computer Communications, 36 (3): 243-255 (2013)HDMRP: An Efficient Fault-Tolerant Multipath Routing Protocol for Heterogeneous Wireless Sensor Networks., , and . QSHINE, volume 74 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 469-482. Springer, (2010)A Systemic Approach for IoT Security., , , , and . DCOSS, page 351-355. IEEE Computer Society, (2013)Efficient Multicast Source Authentication using Layered Hash-Chaining Scheme., , and . LCN, page 411-412. IEEE Computer Society, (2004)A new worm propagation threat in BitTorrent: Modeling and analysis., , and . IMCSIT, page 791-798. IEEE, (2008)