Internet of Things: Security Vulnerabilities and Challenges, IEEE Symposium on Computers and Communication, pp.180-187, 2015. ,
Security attacks in IoT: A survey, IEEE International Conference on IoT in Social, pp.32-37, 2017. ,
Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues, IEEE Communications Surveys & Tutorials, vol.17, issue.3, pp.1294-1312, 2015. ,
Managing IoT devices using Blockchain platform. International Conference on Advanced Communication Technology, pp.464-467, 2017. ,
Bitcoin: A Peer-to-Peer Electronic Cash System -Bitcoin.org, pp.1-9, 2008. ,
Blockchain contract: Securing a blockchain applied to smart contracts, International Conference on Consumer Electronics, pp.467-468, 2016. ,
Towards blockchain-based intelligent transportation systems, ternational Conference on Intelligent Transportation Systems, pp.2663-2668, 2016. ,
Securing Smart Cities Using Blockchain Technology, International Conference High Performance Computing and Communications / Smart City / Data Science and Systems, pp.1392-1393, 2016. ,
The Random Neural Network with a Blockchain Configuration in Digital Documentation, International Symposium on Computer and Information Sciences, pp.196-210, 2018. ,
, Internet of Things. Telecommunication Services Evolution, vol.7768, pp.257-282, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01335108
Security of the Internet of Things: perspectives and challenges, Wireless Netw, vol.20, pp.2481-2501, 2014. ,
Securing the Internet of Things, IEEE Computer Society, pp.51-58, 2011. ,
Security, privacy and trust in Internet of Things: The road ahead, Computer Networks, vol.76, pp.146-164, 2015. ,
Multimedia Traffic Security Architecture for the Internet of Things, IEEE Network, pp.35-40, 2011. ,
Security for Internet of Things: The SerIoT Project, IEEE International Symposium on Networks, pp.1-5, 2018. ,
, European Cybersecurity Research and the SerIoT Project. International Symposium on Computer and Information Sciences, pp.66-173, 2018.
Neural Networks and their Cryptographic Applications. Livre des resumes Eurocode Institute for Research in Computer Science and Automation, pp.1-7, 1994. ,
Interacting Neural Networks and Cryptography Secure exchange of information by synchronization of neural networks. Advances in Solid State Physic, vol.42, pp.383-391, 2002. ,
, Analysis of Neural Cryptography. International Conference on the Theory and Application of Cryptology and Information Security, pp.288-298, 2002.
, Cryptography based on the Neural Network. European Conference on Modelling and Simulation, pp.1-6, 2012.
Neural Network based cryptography, International Journal on Neural and Mass -Parallel Computing and Information Systems, vol.24, issue.2, pp.177-192, 2014. ,
A review of applications of artificial neural networks in cryptosystems, World Automation Congress, pp.1-6, 2008. ,
Game theoretic study on blockchain based secure edge networks, IEEE International Conference on Communications in China, pp.1-5, 2017. ,
An ISO/IEC 15408-2 Compliant Security Auditing System with Blockchain Technology, IEEE Conference on Communications and Network Security, pp.1-2, 2018. ,
Blockchain-Enabled Reengineering of Cloud Datacenters, pp.21-25, 2018. ,
The applicability of blockchain in the Internet of Things, IEEE International Conference on Communication Systems & Networks, pp.561-564, 2018. ,
Continuous Security in IoT Using Blockchain, IEEE International Conference on Acoustics, Speech and Signal Processing, pp.6423-6427, 2018. ,
Random Neural Networks with Negative and Positive Signals and Product Form Solution, Neural Computation, vol.1, pp.502-510, 1989. ,
Learning in the Recurrent Random Neural Network, Neural Computation, vol.5, pp.154-164, 1993. ,
G-Networks with Triggered Customer Movement, Journal of Applied Probability, vol.30, pp.742-748, 1993. ,