Follow
Ali Kassem
Ali Kassem
Verified email at polytechnique.edu
Title
Cited by
Cited by
Year
Decentralized voting platform based on ethereum blockchain
D Khoury, EF Kfoury, A Kassem, H Harb
2018 IEEE International Multidisciplinary Conference on Engineering …, 2018
552018
Efficient neural chaotic generator for image encryption
A Kassem, HAH Hassan, Y Harkouss, R Assaf
Digital Signal Processing 25, 266-274, 2014
332014
A framework for analyzing verifiability in traditional and electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini
International Conference on Information Security Practice and Experience …, 2015
242015
Formal analysis of e-cash protocols
J Dreier, A Kassem, P Lafourcade
2015 12th International Joint Conference on e-Business and …, 2015
232015
Formal analysis of electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini, PYA Ryan
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-12, 2014
192014
Monitoring electronic exams
A Kassem, Y Falcone, P Lafourcade
Runtime Verification, 118-135, 2015
122015
On the verifiability of (electronic) exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini
VERIMAG UMR 5104, Université Grenoble Alpes, France, 2015
82015
New chaotic image encryption technique
HAH Hassan, A Kassem, Y Harkouss, R Assaf, S El Assad
2012 Symposium on Broadband Networks and Fast Internet (RELABIRA), 103-108, 2012
82012
Formal analysis and offline monitoring of electronic exams
A Kassem, Y Falcone, P Lafourcade
Formal Methods in System Design 51 (1), 117-153, 2017
62017
BISM: bytecode-level instrumentation for software monitoring
C Soueidi, A Kassem, Y Falcone
International Conference on Runtime Verification, 323-335, 2020
42020
Differential inference testing: a practical approach to evaluate sanitizations of datasets
A Kassem, G Acs, C Castelluccia, C Palamidessi
2019 IEEE Security and Privacy Workshops (SPW), 72-79, 2019
42019
Formal security analysis of traditional and electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini, PYA Ryan
International Conference on E-Business and Telecommunications, 294-318, 2014
42014
Formal verification of e-reputation protocols
A Kassem, P Lafourcade, Y Lakhnech
International Symposium on Foundations and Practice of Security, 247-261, 2014
32014
Automated verification of e-cash protocols
J Dreier, A Kassem, P Lafourcade
International Conference on E-Business and Telecommunications, 223-244, 2015
22015
A more realistic model for verifying route validity in ad-hoc networks
A Kassem, P Lafourcade, Y Lakhnech
International Symposium on Foundations and Practice of Security, 306-322, 2013
22013
Multiple independent lazy intruders
A Kassem, P Lafourcade, Y Lakhnech, S Mödersheim
1st Workshop on Hot Issues in Security Principles and Trust (HotSpot 2013), 2013
22013
Efficient and Expressive Bytecode-Level Instrumentation for Java Programs
C Soueidi, M Monnier, A Kassem, Y Falcone
arXiv preprint arXiv:2106.01115, 2021
12021
Differential inference testing a practical approach to evaluate anonymized data
A Kassem, G Acs, C Castelluccia, C Palamidessi
INRIA, 2018
12018
Water Attachment onto Size-Selected Cationic Pyrene Clusters
S Zamith, A Kassem, JM L’Hermite, C Joblin
The Journal of Physical Chemistry A, 2022
2022
Detecting Fault Injection Attacks with Runtime Verification
A Kassem, Y Falcone
Proceedings of the 3rd ACM Workshop on Software Protection, 65-76, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20