Papers by Mohamed. Benmohammed
International Conference on Advanced Learning Technologies, 2010
We propose in this paper a new method to compute indicators based on models transformations. We u... more We propose in this paper a new method to compute indicators based on models transformations. We use the concept of modeled trace and trace-based system to design an indicator. We use traces transformations to build indicators model and to actually compute them. Effective implementation of the indicator is demonstrated through the transformations effected on a particular learning platform based on
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Communications in Computer and Information Science, 2013
ABSTRACT One of the most important challenges related to RFID systems is the verification of secu... more ABSTRACT One of the most important challenges related to RFID systems is the verification of security proprieties in RFID authentication protocols. Among the important attacks in RFID systems, we speak about the Algebraic Replay Attack on Authentication (ARA). Common characteristic between the verified protocols cannot resist algebraic replay attacks. Our work is articulated on the formal automatic verification of RFID protocols by two different tools, firstly, the Open-source Fixedpoint Model Checker (OFMC) tool, secondary, the Constraint Logic based Attack Searcher (CL-Atse) tool. These tools sufficient for detecting the attach of type ARA.
Bookmarks Related papers MentionsView impact
International Journal of Advanced Computer Science and Applications, 2012
Bookmarks Related papers MentionsView impact
2010 International Conference on Intelligent Systems, Modelling and Simulation, 2010
Bookmarks Related papers MentionsView impact
2012 IEEE International Conference on Complex Systems (ICCS), 2012
ABSTRACT The communication channel between the tag and the reader in radiofrequency identificatio... more ABSTRACT The communication channel between the tag and the reader in radiofrequency identification technology (RFID) is unsecured, which makes it opened to logical attacks on authentication protocol. In this paper, we analyze the security of two recently proposed RFID authentication protocols for mobile reader. Firstly, a protocol proposed by Wei et al. (2011) and the second proposed by Jialiang et al. (2012). Our work is focused on the automatic verification of secrecy and authentication properties of RFID protocols. For vulnerability analysis of these protocols, we will use AVISPA tools. The main cause of the detected attacks is the abuse of the xor-operator properties employed by the protocols.
Bookmarks Related papers MentionsView impact
ICM 2011 Proceeding, 2011
Bookmarks Related papers MentionsView impact
Journal of Multimedia, 2010
Bookmarks Related papers MentionsView impact
2009 Second International Conference on the Applications of Digital Information and Web Technologies, 2009
The increase in the levels integrations of the circuits and the request pressing for reduction ex... more The increase in the levels integrations of the circuits and the request pressing for reduction execution times of the applications led to the new methodologies of implementation. This implies the design a strongly architectures skeletal and reconfigurable. This article presents a study of the space of VLIW processor for a real time system of vision based-Adaboost, making it possible to
Bookmarks Related papers MentionsView impact
Uploads
Papers by Mohamed. Benmohammed