Follow
Mohamed BENMOHAMMED
Mohamed BENMOHAMMED
Department of Software Technologies and Information Systems Faculty of New Technologies of
Verified email at univ-constantine2.dz - Homepage
Title
Cited by
Cited by
Year
An adaptive clustering approach to dynamic load balancing and energy efficiency in wireless sensor networks
C Gherbi, Z Aliouat, M Benmohammed
Energy 114, 647-662, 2016
1102016
A survey on clustering routing protocols in wireless sensor networks
C Gherbi, Z Aliouat, M Benmohammed
Sensor Review 37 (1), 12-25, 2017
782017
UML2. 0 Profiles for Embedded Systems and Systems On a Chip (SOCs).
F Boutekkouk, M Benmohammed, S Bilavarn, M Auguin
J. Object Technol. 8 (1), 135-157, 2009
392009
Optimization of cat’s whiskers tea (orthosiphon stamineus) using supercritical carbon dioxide and selective chemotherapeutic potential against prostate cancer cells
FSR Al-Suede, MB Khadeer Ahamed, AS Abdul Majid, HM Baharetha, ...
Evidence-Based Complementary and Alternative Medicine 2014, 2014
382014
Using screen brightness to improve security in mobile social network access
M Guerar, M Migliardi, A Merlo, M Benmohammed, F Palmieri, ...
IEEE Transactions on Dependable and Secure Computing 15 (4), 621-632, 2016
372016
A novel load balancing scheduling algorithm for wireless sensor networks
C Gherbi, Z Aliouat, M Benmohammed
Journal of Network and Systems Management 27, 430-462, 2019
302019
A completely automatic public physical test to tell computers and humans apart: A way to enhance authentication schemes in mobile devices
M Guerar, M Migliardi, A Merlo, M Benmohammed, B Messabih
2015 International Conference on High Performance Computing & Simulation …, 2015
302015
Koetjapic acid, a natural triterpenoid, induces apoptosis in colon cancer cells
ZD Nassar, AFA Aisha, N Idris, MB Khadeer Ahamed, Z Ismail, ...
Oncology Reports 27 (3), 727-733, 2012
242012
Improved RFID authentication protocol based on randomized McEliece cryptosystem
N Chikouche, F Cherif, PL Cayrel, M Benmohammed
232015
An authentication protocol based on combined RFID-biometric system RFID-biometric system
N Chikouche, F Cherif, M Benmohammed
arXiv preprint arXiv:1207.5627, 2012
212012
RFID authentication protocols based on error-correcting codes: a survey
N Chikouche, F Cherif, PL Cayrel, M Benmohammed
Wireless Personal Communications 96, 509-527, 2017
172017
S-TDMA: A new MAC protocol for wireless sensor networks
S Boulfekhar, L Bouallouche, M Benmohammed
2012 IEEE/ACM 16th International Symposium on Distributed Simulation and …, 2012
162012
New mean-variance gamma method for automatic gamma correction
M Mahamdioua, M Benmohammed
International Journal of Image, Graphics and Signal Processing 9 (3), 41-54, 2017
152017
A secure code-based authentication scheme for RFID systems
N Chikouche, F Cherif, PL Cayrel, M Benmohammed
International Journal of Computer Network and Information Security 7 (9), 1-9, 2015
152015
Color wheel pin: Usable and resilient ATM authentication
M Guerar, M Benmohammed, V Alimi
Journal of High Speed Networks 22 (3), 231-240, 2016
142016
Weaknesses in two RFID authentication protocols
N Chikouche, F Cherif, PL Cayrel, M Benmohammed
Codes, Cryptology, and Information Security: First International Conference …, 2015
122015
Vulnerabilities of two recently RFID authentication protocols
N Chikouche, F Cherif, M Benmohammed
2012 IEEE International Conference on Complex Systems (ICCS), 1-6, 2012
122012
Automatic adaptation of SIFT for robust facial recognition in uncontrolled lighting conditions
M Mahamdioua, M Benmohammed
IET Computer Vision 12 (5), 623-633, 2018
112018
Age Invariant Face Recognition Based on DCT Feature Extraction and Kernel Fisher Analysis.
L Boussaad, M Benmohammed, R Benzid
J. Inf. Process. Syst. 12 (3), 392-409, 2016
112016
Algebraic replay attacks on authentication in RFID protocols
N Chikouche, F Cherif, M Benmohammed
Advances in Security of Information and Communication Networks: First …, 2013
112013
The system can't perform the operation now. Try again later.
Articles 1–20