El Mamoun Souidi -- Page personnelle

E. M. Souidi El Mamoun Souidi est enseignant chercheur au département d'informatique à la Faculté des Sciences de l' Université Mohammed V de Rabat et directeur du laboratoire de Mathématiques, Informatique, Application et Sécurité de l'information.

Domaines de recherche

Théorie des codes correcteurs d'erreurs et applications à la cryptographie et à la stéganographie, cryptographie post-quantique, Sécurité de l'information.

Coordonnateur du Master

Cryptographie et sécurité de l'Information.

Contact

Adresse Postale : Département d'informaique, Faculté des Sciences, BP 1014, Rabat 10 000
Email : emsouidi(at)gmail.com ; e(dot)souidi(at)um5r.ac.ma
Publications de 2015 à 2022

Livres édités

  1. Said El Hajji, Sihem Mesnager, El Mamoun Souidi (Eds), Proceeding of the 4th International Conference on Codes, Cryptology and Information Security - C2SI 2023, Rabat, Morocco, May 29-31, 2023., Lecture Notes in Computer Science 13874, Springer 2023, ISBN 978-3-031-33016-2
  2. Claude Carlet, Sylvain GUILLEY, Abderrahmane Nitaj and El Mamoun Souidi (Eds) Proceeding of the 3rd International Conference on Codes, Cryptology, and Information Security (C2SI--2019) Rabat, Morocco, April 21--24, 2019 Lecture Notes in Computer Science Volume 11445 , Springer Berlin 2019
  3. Said El Hajji, Abderrahmane Nitaj and El Mamoun Souidi (Eds) Proceeding of the 2nd International Conference on Codes, Cryptology, and Information Security (C2SI--2017) Rabat, Morocco, April 10--12, 2017 Lecture Notes in Computer Science Volume 10194, Springer Berlin 2017
  4. Said El Hajji, Abderrahmane Nitaj, Claude Carlet and El Mamoun Souidi (Eds) Proceeding of the 1st International Conference on Codes, Cryptology, and Information Security (C2SI--2015) Rabat, Morocco, May 26-28, 2015 Lecture Notes in Computer Science Volume 9084 Springer Berlin 2015

Papiers indexés

  1. Mohamed Amine Belhamra, El Mamoun Souidi:, Leveraging Linear Network Error Correction for steganographic network codes. Journal of the Franklin Institute 361 (2024) 107010, , Doi : https://doi.org/10.1016/j.jfranklin.2024.107010
  2. EL Mehdi Fdil and EL Mamoun Souidi:, Sybil Attack Detection in VANETs Using CatBoost Classifier, in Lecture Notes in Networks and Systems 1019, Kohei Arai Editor, Intelligent Computing Proceedings of the 2024 Computing Conference, Volume 4. pp 428–437., , Doi : https://doi.org/10.1007/978-3-031-62273-1 27
  3. Nadir Sahllal, El Mamoun Souidi:, A Comparative Analysis of Sampling Techniques for Click-Through Rate Prediction in Native Advertising. IEEE Access 11: 24511-24526 (2023), , Doi : 10.1109/ACCESS.2023.3255983
  4. Nadir Sahllal, El Mamoun Souidi:, Forecasting Click Fraud via Machine Learning Algorithms. C2SI 2023: Lecture Notes in Computer Science Volume 13874, 278-289, Springer 2023, Doi : 10.1007/978-3-031-33017-9 18
  5. Nadir Sahllal, El Mamoun Souidi:, Click Fraud Prediction by Stacking Algorithm, Accepted in Intelligenza Artificiale 17(1): 131-141 (2023), Doi : 10.3233/IA-221069
  6. Nadir Sahllal, El Mamoun Souidi: Click Fraud Prediction by Stacking Algorithm, Accepted in Intelligenza Artificiale
  7. Edoukou Berenger Ayebie, El Mamoun Souidi: New Code Based Cryptographic Accumulator and Fully Dynamic Group Signature, Des. Codes Cryptogr. 90(12): 2861-2891 (2022), Doi : 10.1007/s10623-022-01007-5
  8. Yassine LEMMOU, Jean-Louis LANET and El Mamoun SOUIDI: In-depth Analysis of Ransom Note FilesComputers 2021, 10(11), 145; Doi :https://doi.org/10.3390/computers10110145
  9. Mohamed Amine Belhamra, El Mamoun Souidi: Error Correcting Network CodesComputer Networks 197 (2021) 108277 Doi : 10.1016/j.comnet.2021.108277
  10. Mohamed Amine Belhamra, El Mamoun Souidi: An Information Hiding Scheme for Live P2P Video Streaming Based on the $R^2$ ProtocolJournal of Information Hiding and Multimedia Signal Processing, Vol. 12, No. 2, pp. 102-115 (2021) Doi :
  11. Lemmou, Y., Lanet, J.-L. and Souidi, E.M. (2021), A behavioural in-depth analysis of ransomware infection. IET Inf. Secur, 15: 38-58.doi.org/10.1049/ise2.12004
  12. Mohamed Amine Belhamra, El Mamoun Souidi: Steganography over Redundant Residue Number System Codes. J. Inf. Secur. Appl. 51: 102434 (2020) Doi : 10.1016/j.jisa.2019.102434
  13. Edoukou Berenger Ayebie, El Mamoun Souidi: Rank-metric code-based mutual authentication protocol for RFID. J. Inf. Secur. Appl. 55: 102598 (2020) Doi : 10.1016/j.jisa.2020.102598
  14. Hafsa Assidi, El Mamoun Souidi: Strong Designated Verifier Signature Based on the Rank Metric. International Conference WISTP, Lecture Notes in Computer Science Volume 12024, 85-102, 2019 Doi : 10.1007/978-3-030-41702-4_6
  15. Mohamed Amine Belhamra, El Mamoun Souidi: Steganogaphy Using Mac-Independent Opportunistic Routing and Encoding (MORE) Protocol Based Communications. Communications in Computer and Information Science, Vol. 1118 pp 66 - 86, (2019).DOI: 10.1007/978-3-030-34866-3_4
  16. Hafsa Assidi, Edoukou Berenger Ayebie, El Mamoun Souidi: An efficient code-based threshold ring signature scheme. J. Inf. Sec. Appl. 45: 52-60 (2019)
  17. Soukaina Belabssir, Edoukou Berenger Ayebie, El Mamoun Souidi: Perfect, Hamming and Simplex Linear Error-Block Codes with Minimum $\pi$-distance 3. C2SI 2019. Lecture Notes in Computer Science Volume 11445 pp: 288-306
  18. Yassine Lemmou and El Mamoun Souidi Overinfection In Ransomware Proceeding of the The Sixth International Symposium on Security in Computing and Communications (SSCC'18) Bangalore - India in Communications in Computer and Information Science 969, Springer 2019, pp 504-519
  19. Yassine Lemou and El Mamoun Souidi, Inside GandCrab Ransomware, 17th International Conference on Cryptology And Network Security (CANS 2018) Naples - Italy September 30 - October 3, 2018 Lecture Notes in Computer Science Volume 11124, Springer, Berlin, pp 154-174 doi : 10.1007/978-3-030-00434-7_8.
  20. Yassine Lemmou and El Mamoun Souidi Infection, Self-reproduction and Overinfection in Ransomware: The Case of TeslaCrypt Proceeding of the International Conference on Cyber Security 11--12 june, 2018 Glasgow, Scotland, UK doi : 10.1007/978-981-13-5826-5_39
  21. Mohamed Amine Belhamra and El Mamoun Souidi A Steganogaphic Scheme for MAC-Independent Opportunistic Routing & Encoding (MORE) Protocol Proceeding of the 15th International Conference on Security and Cryptography (SECRYPT 2018) on 26-28 July 2018 Porto, Portugal
  22. Hind Idrissi, Mohammed Ennahbaoui, Said El Hajji and El Mamoun Souidi (2017) A Secure Cloud-Based IDPS Using Cryptographic Traces and Revocation Protocol In: Said El Hajji, Abderrahmane Nitaj, El Mamoun Souidi (Eds) Second International Conference on Codes, Cryptology and Information Security (C2SI-2017), Rabat, Morocco, April 10--12, 2017, LNCS 10194, Springer, Berlin, pp 365--382
  23. Berenger Edoukou Ayebie, Hafsa Assidi and El Mamoun Souidi (2017) A New Dynamic Code-Based Group Signature Scheme In: Said El Hajji, Abderrahmane Nitaj, El Mamoun Souidi (Eds) Second International Conference on Codes, Cryptology and Information Security (C2SI-2017) Rabat, Morocco, April 10--12, 2017, LNCS 10194, Springer, Berlin, pp 346--364
  24. Yassine Lemmou and El Mamoun Souidi (2017) An Overview on Spora Ransomware Proceeding of the Fifth International Symposium on Security in Computing and Communications (SSCC-17), September 13-16,, Manipal, India. Communications in Computer and Information Science, vol 74, Springer, Singapore, pp 259--275 Doi : 10.1007/978-981-10-6898-0_22.
  25. Yassine Lemmou and El Mamoun Souidi (2017) PrincessLocker analysis Proceedings International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2017, London, United Kingdom, June 19-20, 2017, pp 1--10 Doi : 10.1109/CyberSecPODS.2017.8074854.
  26. Hafsa Assidi and Edoukou Berenger Ayebie and El Mamoun Souidi (2017) Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs for RFID Systems 20th International Conference on Information Security and Cryptology (ICISC 2017), Seoul, South Korea, November 29 - December 1, 2017. LNCS 10779, Springer, pp 267--283
  27. Hafsa Assidi and Edoukou Berenger Ayebie and El Mamoun Souidi (2016) A Code-based Group Signature Scheme with Shorter Public Key Length 13th International Conference on Security and Cryptography SECRYPT 2016" ICETE 2016 Volume 4: SECRYPT, Lisbon, Portugal, 26-28 July 2016
  28. Hind Idrissi and El Mamoun Souidi and Arnaud Revel (2015) Security of Mobile Agent Platforms Using Access Control and Cryptography, Agent and Multi-Agent Systems: Technologies and Applications, 9th KES International Conference, KES-AMSTA, 2015 Sorrento, Italy, June 17-19, 2015 Proceedings Série Smart Innovation, Systems and Technologies, volume 38, Springer pp 27--39
  29. H. Idrissi, M. Ennahbaoui, E. M. Souidi and S. E. Hajji Mobile Agents with Cryptographic Traces For Intrusion Detection in the Cloud Computing Procedia Computer Science 73, (2015) pp. 179-186
  30. H. Idrissi, E. M. Souidi, and A. Revel Mobile Agent Security Using ID-Based Agreement Protocol and Binary Serialization International Journal of Security and Its Application 9(5), (2015) pp. 19-30
  31. Idrissi H., Ennahbaoui M., Souidi E.M., Hajji S.E., Revel A, (2015) Secure and Flexible RBAC Scheme Using Mobile Agents Proceedings of the Mediterranean Conference on Information & Communication Technologies 2015 in Lecture Notes in Electrical Engineering, vol 381. Springer, pp 447-455
  32. Idrissi H., Ennahbaoui M., Souidi E.M., Hajji S.E., Revel A (2015) Secure and Flexible RBAC Scheme Using Mobile Agents, Proceedings of the Mediterranean Conference on Information & Communication Technologies 2015 in Lecture Notes in Electrical Engineering, vol 381." Springer pp 447-455

Responsabilités

  1. Coordonnateur du master Cryptographie et sécurité de l'information depuis 2022. Ce master est en double diplomation avec le master CRYPTIS de Limoges
  2. Coordonnateur de la licence professionnelle Administration et sécurité des systèmes d'information et des réseaux de 2022 à 2025

Cours enseignés au niveau de licence

  1. Algorithmique et Python
  2. Programmation en langage C
  3. Programmation orientée objet en langage Java
  4. HTML , CSS , JavaScript , TD1 , TD2 , TD3 , TD4 et PHP
  5. Algèbre en DEUG
  6. Analyse en DEUG
  7. Probabilités en DEUG

Cours enseignés au niveau de master

  1. Théorie des codes correcteurs d'erreurs : ici
  2. Théorie des codes correcteurs d'erreurs avancée
  3. Cryptographie ici
  4. Sécurité informatique
  5. Programmation orientée objet en Python
  6. Technologies de XML ici