Aymen Ghilen

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
The expanded use of wireless networks has led to significant improvement in security approaches that aim to protect information. Providing secure communication for wireless local area network (WLAN) has become one of the prime concerns. The current standard for exchanging a secret key to authenticate users and ensure secure data transmission within EAP-TLS(More)
In a security context, to render a cryptosystem more resistant against man-in-the-middle and impersonation attacks, an authentication mechanism has to be considered. CHAP protocol (Challenge Handshake Authentication Protocol) is among the most widely spread authentication technique used within Local Area Networks. To offer greater robustness and privacy, we(More)
By relying upon the laws of quantum physics, quantum cryptography is reaching an extremely high level of security guarantee. It allows establishing a secret and perfectly random key material between two network nodes. It improves the contemporary cryptographic methods based only on computational security by integrating a quantum cryptographic solution.(More)
  • 1