Alia Fourati

Learn More
In this paper we propose an approach, combining the SET protocol with the TLS/WTLS protocols in order to enforce the security services over the WAP 1.X for the payment in the m-commerce. We propose to implement the additional services of the SET protocol as the confidentiality of the payment information between the buyer and the payment gateway and the data(More)
The strongest feature of ad hoc networks is its capability to be rapidly deployed anywhere and anytime without relying on a pre-existing infrastructure. From there, ad hoc networks offer the advantages to be auto-organized, ubiquitous, dynamic and completely autonomous. As a counter part, securing them becomes a more difficult task, especially because of(More)
The development of WLANs in general and of Wi-Fi (802.11b standard) in particular, emerged these two last years as a technology support of public access to the Internet. We think that the potential role of Wi-Fi hotspots, those wireless networks deployed in public environments such as airports, hotels and conference centres, is enormous and will give a new(More)
Ad hoc networks arouse imminently an important interest within industrial and research communities. Actually, their salient features, essentially the absence of infrastructure and auto-management, promise huge applications and possibilities for wireless communication. However, the tremendous boom of these networks depends incontestably on their reliability(More)
  • 1