default search action
Bacem Mbarek
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j8]Bacem Mbarek, Tomás Pitner:
Secure and Efficient Blockchain Scheme for the Internet of Bikes. Comput. Informatics 41(2): 424-442 (2022) - [j7]Bacem Mbarek, Mouzhi Ge, Tomás Pitner:
An adaptive anti-jamming system in HyperLedger-based wireless sensor networks. Wirel. Networks 28(2): 691-703 (2022) - 2021
- [j6]Bacem Mbarek, Mouzhi Ge, Tomás Pitner:
Proactive trust classification for detection of replication attacks in 6LoWPAN-based IoT. Internet Things 16: 100442 (2021) - [j5]Bacem Mbarek, Nafaâ Jabeur, Tomás Pitner, Ansar-Ul-Haque Yasar:
MBS: Multilevel Blockchain System for IoT. Pers. Ubiquitous Comput. 25(1): 247-254 (2021) - [j4]Bacem Mbarek, Mouzhi Ge, Tomás Pitner:
Trust-Based Authentication for Smart Home Systems. Wirel. Pers. Commun. 117(3): 2157-2172 (2021) - 2020
- [j3]Bacem Mbarek, Mouzhi Ge, Tomás Pitner:
An Efficient Mutual Authentication Scheme for Internet of Things. Internet Things 9: 100160 (2020) - 2019
- [j2]Bacem Mbarek, Nafaâ Jabeur, Ansar-Ul-Haque Yasar:
ECASS: an encryption compression aggregation security scheme for secure data transmission in ambient assisted living systems. Pers. Ubiquitous Comput. 23(5-6): 793-799 (2019) - 2017
- [j1]Bacem Mbarek, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
A secure electric energy management in smart home. Int. J. Commun. Syst. 30(17) (2017)
Conference and Workshop Papers
- 2023
- [c20]Meriem Soula, Bacem Mbarek, Aref Meddeb, Tomás Pitner:
A Survey of Intrusion Detection-Based Trust Management Approaches in IoT Networks. AINA (3) 2023: 504-517 - [c19]Václav Oujezský, Bacem Mbarek, Frantisek Kasl, Tomás Pitner:
Selected Software and Tools for Smart Grid Simulation in Research. ICUMT 2023: 102-106 - [c18]Bacem Mbarek, Meriem Soula, Tomás Pitner, Aref Meddeb:
An Effective Replica Node Detection Scheme in Internet of Things Networks. IWCMC 2023: 608-613 - 2022
- [c17]Thomas Lavigne, Bacem Mbarek, Tomás Pitner:
Blockchain-Based Real Time Healthcare Emergency. DiCES-N 2022: 81-98 - [c16]Thomas Lavigne, Bacem Mbarek, Tomás Pitner:
An intelligent blockchain application for emergency medical services. SAC 2022: 1983-1986 - [c15]Bacem Mbarek, Mouzhi Ge, Tomás Pitner:
Precisional Detection Strategy for 6LoWPAN Networks in IoT. SMC 2022: 1006-1011 - 2021
- [c14]Thomas Lavigne, Bacem Mbarek, Tomás Pitner:
A Real time Healthcare Tracking System based on Blockchain Application. AICCSA 2021: 1-8 - [c13]Bacem Mbarek, Mouzhi Ge, Tomás Pitner:
Trust-Based Detection Strategy Against Replication Attacks in IoT. AINA (2) 2021: 646-656 - 2020
- [c12]Bacem Mbarek, Nafaâ Jabeur, Tomás Pitner:
Toward Enforcing Security in Smart Homes Using a Trust-Based Scheme. AINA Workshops 2020: 149-158 - [c11]Bacem Mbarek, Stanislav Chren, Bruno Rossi, Tomás Pitner:
An Enhanced Blockchain-Based Data Management Scheme for Microgrids. AINA Workshops 2020: 766-775 - [c10]Bacem Mbarek, Mouzhi Ge, Tomás Pitner:
Blockchain-Based Access Control for IoT in Smart Home Systems. DEXA (2) 2020: 17-32 - [c9]Bacem Mbarek, Mouzhi Ge, Tomás Pitner:
Enhanced network intrusion detection system protocol for internet of things. SAC 2020: 1156-1163 - 2019
- [c8]Bacem Mbarek, Mouzhi Ge, Tomás Pitner:
Self-adaptive RFID Authentication for Internet of Things. AINA 2019: 1094-1105 - [c7]Bacem Mbarek, Barbora Buhnova, Tomás Pitner:
SeMLAS: An Efficient Secure Multi-Level Authentication Scheme for IoT-Based Smart Home Systems. IWCMC 2019: 1373-1378 - 2018
- [c6]Bacem Mbarek, Nabil Sahli, Nafaâ Jabeur:
BFAN: A Bloom Filter-Based Authentication in Wireless Sensor Networks. IWCMC 2018: 304-309 - 2017
- [c5]Bacem Mbarek, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks. ANT/SEIT 2017: 553-559 - 2016
- [c4]Bacem Mbarek, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
A broadcast authentication scheme in IoT environments. AICCSA 2016: 1-6 - [c3]Bacem Mbarek, Aref Meddeb:
Energy efficient security protocols for wireless sensor networks : SPINS vs TinySec. ISNCC 2016: 1-4 - 2015
- [c2]Bacem Mbarek, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
A secure authentication mechanism for resource constrained devices. AICCSA 2015: 1-7 - [c1]Bacem Mbarek, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
Enhanced LEAP authentication delay for higher immunity against DoS attack. CFIP/NOTERE 2015: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint