Mohamed Benmohammed

Learn More
— Radio Frequency Identification (RFID) and biometric technologies saw fast evolutions during the last years and which are used in several applications, such as access control. Among important characteristics in the RFID tags, we mention the limitation of resources (memory, energy, …). Our work focuses on the design of a RFID authentication protocol which(More)
Due to the fact that sensor nodes are untethered and unattended, energy management is a critical issue in communication mechanism of a wireless sensor network. In this paper, we address this problem and propose a novel solution based on media access control technique. Our protocol STDMA (for Sensor-Time Division Multiple Access) exploits the inherent(More)
Recent embedded systems and SOCs design is confronted with the problem of the so-called productivity gap. In order to cope with this problem, authors emphasize on using UML as a system level language, so higher level of abstraction is achieved. However UML in its current form has not yet achieved the maturity necessary to enable its efficient use within(More)
In this paper, the authors contribute to solve the simultaneous problems of detection and gender classification from any viewpoint. The authors use an invariant model for accurate face localization based on a combination of appearance and geometric. A probabilistic matching of visual traits allows to classify the gender of face even when pose changes. The(More)
In this paper, we would like to present a new UML-based methodology for embedded applications design. Our approach starts from a pure sequential object paradigm model from which a task level model is extracted. The latter allows designer to expose all parallelism forms such as task parallelism, data parallelism, pipelining, while making control and(More)
Among the embedded systems which were quickly developed during the last years and that were used in various domains (e.g. access control, health, ...) we can cite radio frequency identification (RFID). In this paper, we propose an improved mutual authentication protocol in RFID systems based on the randomized McEliece cryp-tosystem. The McEliece(More)
Parallelism has generated new concepts and approaches making it possible to conceive competitive systems and parallel architectural configurations. These two concepts are hard to bring altogether and require a precise definition of the structural elements of algorithm and their projection on suitable parallel architectures. The work described in this paper,(More)