DSpace Repository

Browsing by Author "Queudet, Audrey"

Browsing by Author "Queudet, Audrey"

Sort by: Order: Results:

  • Abutaha, Mohammed; El Assad, Safwan; Farajallah, Mousa; Queudet, Audrey; Deforge, Olivier (2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), 2015-12-14)
    Based on some important properties of chaos, such as ergodicity, quasi-randomness, and high sensitivity to the secret key, chaos is a hot research field in secured communication, and recently a variety of chaos-based ...
  • Abutaha, Mohammed; El Assad, Safwan; Farajallah, Mousa; Queudet, Audrey; Deforge, Olivier (IEEE, 2015)
    Based on some important properties of chaos, such as ergodicity, quasi-randomness, and high sensitivity to the secret key, chaos is a hot research field in secured communication, and recently a variety of chaos-based ...
  • Jallouli, Ons; Abutaha, Mohammed; El Assad, Safwan; Chetto, Maryline; Queudet, Audrey; Déforges, Olivier (IEEE, 2016)
    The extremely rapid development of the Internet of Things brings growing attention to the information security issue. Realization of cryptographically strong pseudo random number generators (PRNGs), is crucial in securing ...
  • Abutaha, Mohammed; El Assad, Safwan; Queudet, Audrey; Deforges, Olivier (inderscience, 2017-02-08)
    We designed and implemented a stream cipher cryptosystem based on an efficient chaotic generator of finite computing precision (N = 32). The proposed structure of the chaotic generator is formed by a Key-setup, an IVsetup, ...
  • Abutaha, Mohammed; Assad, Safwan El; Queudet, Audrey; Deforges, Olivier (Inderscience Publishers (IEL), 2017)
    We designed and implemented a stream cipher cryptosystem based on an efficient chaotic generator of finite computing precision (N = 32). The proposed structure of the chaotic generator is formed by a Key-setup, an IVsetup, ...
  • Abutaha, Mohammed; El Assad, Safwan; Jallouli, Ons; Queudet, Audrey; Deforges, Olivier (IEEE, 2016)
    Generating random numbers is essential in many cryptographic applications like key generation, protocols, nonce and also in Internet for choosing TCP sequence numbers for example. We need generators which are able to ...
  • Hammoudi, Karim; Abutaha, Mohammed; Benhabiles, Halim; Melkemi, Mahmoud; Windal, Feryal; El Assad, Safwan; Queudet, Audrey (Springer, Singapore, 2020)
    Nowadays, urban and vehicular surveillance systems are collecting large amounts of image data for feeding recognition systems, for example, toward proposing localization or navigation services. In many cases, these image data ...

Search DSpace

Browse

My Account