Follow
Ahmad Samer Wazan
Title
Cited by
Cited by
Year
Improved identity management with verifiable credentials and fido
DW Chadwick, R Laborde, A Oglaza, R Venant, S Wazan, M Nijjar
IEEE Communications Standards Magazine 3 (4), 14-20, 2019
382019
A user-centric identity management framework based on the W3C verifiable credentials and the FIDO universal authentication framework
R Laborde, A Oglaza, S Wazan, F Barrere, A Benzekri, DW Chadwick, ...
2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC …, 2020
312020
Should we rush to implement password-less single factor FIDO2 based authentication?
F Alqubaisi, AS Wazan, L Ahmad, DW Chadwick
2020 12th annual undergraduate research conference on applied computing (URC …, 2020
212020
A formal model of trust for calculating the quality of X. 509 certificate
WA Samer, L Romain, B Francois, B AbdelMalek
Security and Communication Networks 4 (6), 651-665, 2011
202011
Trust management for public key infrastructures: Implementing the X. 509 trust broker
AS Wazan, R Laborde, DW Chadwick, F Barrere, A Benzekri, M Kaiiali, ...
Security and Communication Networks 2017, 2017
162017
The X. 509 trust model needs a technical and legal expert
AS Wazan, R Laborde, F Barrere, A Benzekri
2012 IEEE International Conference on Communications (ICC), 6895-6900, 2012
152012
Tls connection validation by web browsers: Why do web browsers still not agree?
AS Wazan, R Laborde, DW Chadwick, F Barrère, A Benzekri
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017
132017
A secure collaborative web-based environment for virtual organisations
R Laborde, M Kamel, S Wazan, F Barrere, A Benzekri
International Journal of Web Based Communities 5 (2), 273-292, 2009
132009
Validating X. 509 certificates based on their quality
AS Wazan, R Laborde, F Barrère, A Benzekri
2008 The 9th International Conference for Young Computer Scientists, 2055-2060, 2008
132008
On the Validation of Web X.509 Certificates by TLS interception products
AS Wazan, R Laborde, D Chadwick, R Venant, A Benzekri, E Billoir, ...
IEEE Transactions on Dependable and Secure Computing, 2020
122020
Which security requirements engineering methodology should I choose? Towards a requirements engineering-based evaluation approach
ST Bulusu, R Laborde, AS Wazan, F Barrère, A Benzekri
Proceedings of the 12th International Conference on Availability …, 2017
122017
PKI interoperability: still an issue? A solution in the X. 509 realm
AS Wazan, R Laborde, F Barrere, A Benzekri, DW Chadwick
Information Assurance and Security Education and Training: 8th IFIP WG 11.8 …, 2013
112013
Know Your Customer: Opening a new bank account online using UAAF
R Laborde, A Oglaza, S Wazan, F Barrère, A Benzekri, DW Chadwick, ...
2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC …, 2020
102020
A requirements engineering-based approach for evaluating security requirements engineering methodologies
ST Bulusu, R Laborde, AS Wazan, F Barrère, A Benzekri
Information Technology-New Generations: 15th International Conference on …, 2018
102018
A secure data outsourcing scheme based on AsmuthBloom secret sharing
YI Muhammad, M Kaiiali, A Habbal, AS Wazan, A Sani Ilyasu
Enterprise Information Systems 10 (9), 1001-1023, 2016
102016
A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context
R Laborde, ST Bulusu, AS Wazan, A Oglaza, A Benzekri
Special Issue "Cyber-Physical Security for Critical Infrastructures", 2021
92021
G-Cloud on Openstack: Adressing access control and regulation requirements
IY Omar, R Laborde, AS Wazan, F Barrère, A Benzekri
2015 International Symposium on Networks, Computers and Communications …, 2015
92015
Which web browsers process ssl certificates in a standardized way?
AS Wazan, R Laborde, DW Chadwick, F Barrere, AM Benzekri
IFIP International Information Security Conference, 432-442, 2009
92009
A situation-driven framework for dynamic security management
R Laborde, A Oglaza, AS Wazan, F Barrère, A Benzekri
Annals of Telecommunications 74, 185-196, 2019
82019
How can I trust an X. 509 certificate? An analysis of the existing trust approaches
AS Wazan, R Laborde, DW Chadwick, F Barrere, A Benzekri
2016 IEEE 41st Conference on Local Computer Networks (LCN), 531-534, 2016
72016
The system can't perform the operation now. Try again later.
Articles 1–20