Decentralized voting platform based on ethereum blockchain D Khoury, EF Kfoury, A Kassem, H Harb 2018 IEEE International Multidisciplinary Conference on Engineering …, 2018 | 55 | 2018 |
Efficient neural chaotic generator for image encryption A Kassem, HAH Hassan, Y Harkouss, R Assaf Digital Signal Processing 25, 266-274, 2014 | 33 | 2014 |
A framework for analyzing verifiability in traditional and electronic exams J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini International Conference on Information Security Practice and Experience …, 2015 | 24 | 2015 |
Formal analysis of e-cash protocols J Dreier, A Kassem, P Lafourcade 2015 12th International Joint Conference on e-Business and …, 2015 | 23 | 2015 |
Formal analysis of electronic exams J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini, PYA Ryan 2014 11th International Conference on Security and Cryptography (SECRYPT), 1-12, 2014 | 19 | 2014 |
Monitoring electronic exams A Kassem, Y Falcone, P Lafourcade Runtime Verification, 118-135, 2015 | 12 | 2015 |
On the verifiability of (electronic) exams J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini VERIMAG UMR 5104, Université Grenoble Alpes, France, 2015 | 8 | 2015 |
New chaotic image encryption technique HAH Hassan, A Kassem, Y Harkouss, R Assaf, S El Assad 2012 Symposium on Broadband Networks and Fast Internet (RELABIRA), 103-108, 2012 | 8 | 2012 |
Formal analysis and offline monitoring of electronic exams A Kassem, Y Falcone, P Lafourcade Formal Methods in System Design 51 (1), 117-153, 2017 | 6 | 2017 |
BISM: bytecode-level instrumentation for software monitoring C Soueidi, A Kassem, Y Falcone International Conference on Runtime Verification, 323-335, 2020 | 4 | 2020 |
Differential inference testing: a practical approach to evaluate sanitizations of datasets A Kassem, G Acs, C Castelluccia, C Palamidessi 2019 IEEE Security and Privacy Workshops (SPW), 72-79, 2019 | 4 | 2019 |
Formal security analysis of traditional and electronic exams J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini, PYA Ryan International Conference on E-Business and Telecommunications, 294-318, 2014 | 4 | 2014 |
Formal verification of e-reputation protocols A Kassem, P Lafourcade, Y Lakhnech International Symposium on Foundations and Practice of Security, 247-261, 2014 | 3 | 2014 |
Automated verification of e-cash protocols J Dreier, A Kassem, P Lafourcade International Conference on E-Business and Telecommunications, 223-244, 2015 | 2 | 2015 |
A more realistic model for verifying route validity in ad-hoc networks A Kassem, P Lafourcade, Y Lakhnech International Symposium on Foundations and Practice of Security, 306-322, 2013 | 2 | 2013 |
Multiple independent lazy intruders A Kassem, P Lafourcade, Y Lakhnech, S Mödersheim 1st Workshop on Hot Issues in Security Principles and Trust (HotSpot 2013), 2013 | 2 | 2013 |
Efficient and Expressive Bytecode-Level Instrumentation for Java Programs C Soueidi, M Monnier, A Kassem, Y Falcone arXiv preprint arXiv:2106.01115, 2021 | 1 | 2021 |
Differential inference testing a practical approach to evaluate anonymized data A Kassem, G Acs, C Castelluccia, C Palamidessi INRIA, 2018 | 1 | 2018 |
Water Attachment onto Size-Selected Cationic Pyrene Clusters S Zamith, A Kassem, JM L’Hermite, C Joblin The Journal of Physical Chemistry A, 2022 | | 2022 |
Detecting Fault Injection Attacks with Runtime Verification A Kassem, Y Falcone Proceedings of the 3rd ACM Workshop on Software Protection, 65-76, 2019 | | 2019 |