The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ahmed Serhrouchni: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ahmad Fadlallah, Ahmed Serhrouchni
    PSAT: Proactive Signaling Architecture for IP Traceback. [Citation Graph (0, 0)][DBLP]
    CNSR, 2006, pp:293-299 [Conf]
  2. Stephan Block, Ken Chen, Philippe Godlewski, Ahmed Serhrouchni
    Some Design Issues of SRMTP, a Scalable Reliable Multicast Transport Protocol. [Citation Graph (0, 0)][DBLP]
    ECMAST, 1999, pp:423-440 [Conf]
  3. André Ribeiro Cardoso, Ahmed Serhrouchni, Joaquim Celestino Jr., Mikaël Salaün
    Convergence among Peer-to-Peer and Programmable Networks. [Citation Graph (0, 0)][DBLP]
    ECUMN, 2007, pp:45-51 [Conf]
  4. J. Queiroz, Ahmed Serhrouchni, P. Cunha, Elie Najm
    PIL: A Tool for Pre-implementation of LOTOS. [Citation Graph (0, 0)][DBLP]
    FORTE, 1990, pp:567-570 [Conf]
  5. Jacques Demerjian, Ibrahim Hajjeh, Ahmed Serhrouchni, Mohamad Badra
    Network Security using E-DHCP over NAT/IPSEC. [Citation Graph (0, 0)][DBLP]
    Web Technologies, Applications, and Services, 2005, pp:53-58 [Conf]
  6. Ibrahim Hajjeh, Ahmed Serhrouchni
    Integrating a Signature Module in SSL/TLS. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:305-310 [Conf]
  7. Jacques Demerjian, Ahmed Serhrouchni, Mohammed Achemlal
    Certificate-Based Access Control and Authentication for DHCP. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:99-106 [Conf]
  8. Ahmad Fadlallah, Ahmed Serhrouchni
    A signaling architecture against dos attacks. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:216-221 [Conf]
  9. Taghrid Asfour, Ahmed Serhrouchni
    The Coexistence of Multicast and Unicast over a GPS Capable Network. [Citation Graph (0, 0)][DBLP]
    ICN (1), 2001, pp:589-598 [Conf]
  10. Carole Bassil, Ahmed Serhrouchni, Nicolas Rouhana
    Critical Analysis and New Perspective for Securing Voice Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:810-818 [Conf]
  11. Carole Bassil, Ahmed Serhrouchni, Nicolas Rouhana
    Towards a new Security Architecture for Telephony. [Citation Graph (0, 0)][DBLP]
    ICN/ICONS/MCL, 2006, pp:3- [Conf]
  12. Ibrahim Hajjeh, Ahmed Serhrouchni, Frédérique Tastet
    New Key Management Protocol for SSL/TLS. [Citation Graph (0, 0)][DBLP]
    Net-Con, 2003, pp:251-262 [Conf]
  13. Rim Hammi, Prométhée Spathis, Dany Zebiane, Ken Chen, Ahmed Serhrouchni, Kim Loan Thai
    Deployment and Experimentation of an active network at a: large scale: AMARRAGE. [Citation Graph (0, 0)][DBLP]
    Net-Con, 2002, pp:141-152 [Conf]
  14. Ahmed Serhrouchni, Adil Andaloussi, Abdel Obaid
    A solution for improving TCP performance over wireless links. [Citation Graph (0, 0)][DBLP]
    Net-Con, 2002, pp:457-468 [Conf]
  15. Taghrid Asfour, Ahmed Serhrouchni
    Performance Evaluation of RMTP Using NS and RMTP Integration in Current Networks. [Citation Graph (0, 0)][DBLP]
    INTERWORKING, 2000, pp:147-159 [Conf]
  16. Taghrid Asfour-Block, Ahmed Serhrouchni
    Reliable Multicast over Satellite Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:698-703 [Conf]
  17. Taghrid Asfour, Stephan Block, Ahmed Serhrouchni, Samir Tohmé
    Contractual Group Membership CGM: A New Mechanism for Multicast Group Management. [Citation Graph (0, 0)][DBLP]
    ISCC, 2000, pp:666-671 [Conf]
  18. Taghrid Asfour, Ahmed Serhrouchni
    RMTP Performance in Heterogeneous Environments & a New QoS-Based Mechanism for Building RMTP Trees. [Citation Graph (0, 0)][DBLP]
    ISCC, 2001, pp:160-165 [Conf]
  19. Rima Kilany, Ahmed Serhrouchni
    Using distributed component model for active service deployment. [Citation Graph (0, 0)][DBLP]
    ISCC, 2002, pp:258-263 [Conf]
  20. André Ribeiro Cardoso, Ahmed Serhrouchni, Bertrand Mathieu, Mikaël Salaün
    Service Deployment in Active Networks Based on a P2P System. [Citation Graph (0, 0)][DBLP]
    MATA, 2005, pp:172-181 [Conf]
  21. Jacques Demerjian, Ahmed Serhrouchni
    DHCP Authentication Using Certificates. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:457-472 [Conf]
  22. Ines Feki, Xiaoli Zheng, Mohammed Achemlal, Ahmed Serhrouchni
    Internet Routing Security: An Approach to Detect and to React to Incorrect Advertisements. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:110-117 [Conf]
  23. Cédric Llorens, Ahmed Serhrouchni
    Mesurer la sécurité d'un réseau d'un opérateur de télécommunication. [Citation Graph (0, 0)][DBLP]
    Annales des Télécommunications, 2005, v:60, n:11-12, pp:1439-1465 [Journal]
  24. Mohamad Badra, Ahmed Serhrouchni, Pascal Urien
    A lightweight identity authentication protocol for wireless networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:17, pp:1738-1745 [Journal]
  25. Gerard J. Holzmann, Elie Najm, Ahmed Serhrouchni
    SPIN Model Checking: An Introduction. [Citation Graph (0, 0)][DBLP]
    STTT, 2000, v:2, n:4, pp:321-327 [Journal]
  26. Artur Hecker, Houda Labiod, Guy Pujolle, Hossam Afifi, Ahmed Serhrouchni, Pascal Urien
    A New Access Control Solution for a Multi-Provider Wireless Environment. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 2005, v:29, n:2, pp:131-152 [Journal]
  27. Sara Oueslati-Boulahia, Ahmed Serhrouchni, Samir Tohmé, S. Baier, Marouane Berrada
    TCP over satellite links: Problems and solutions. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 2000, v:13, n:2-4, pp:199-212 [Journal]
  28. Cédric Llorens, Ahmed Serhrouchni
    Security Verification of a Virtual Private Network over MPLS. [Citation Graph (0, 0)][DBLP]
    Net-Con, 2005, pp:339-353 [Conf]
  29. Carole Bassil, Ahmed Serhrouchni, Nicolas Rouhana
    Simple voice security protocol. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2006, pp:367-372 [Conf]

  30. An Infrastructure of Programmable Networks for Peer-to-Peer Applications. [Citation Graph (, )][DBLP]


  31. A collaborative peer-to-peer architecture to defend against DDoS attacks. [Citation Graph (, )][DBLP]


  32. CAP: A Context-Aware Peer-to-Peer System. [Citation Graph (, )][DBLP]


  33. Random Values, Nonce and Challenges: Semantic Meaning versus Opaque and Strings of Data. [Citation Graph (, )][DBLP]


  34. Towards a modular and interoperable SNMPv3. [Citation Graph (, )][DBLP]


  35. QOS metrics tool using management by delegation. [Citation Graph (, )][DBLP]


  36. A Service Oriented P2P architecture with semantic support. [Citation Graph (, )][DBLP]


  37. Conference knowledge modeling for conference-video-recordings querying & visualization. [Citation Graph (, )][DBLP]


  38. NETPOPPS: A Network Provider Oriented Peer-to-Peer System. [Citation Graph (, )][DBLP]


  39. Mutual Authentication for SIP: A Semantic Meaning for the SIP Opaque Values. [Citation Graph (, )][DBLP]


  40. Decentralized Alerts Correlation Approach for DDoS Intrusion Detection. [Citation Graph (, )][DBLP]


  41. hTracker: towards a Service Provider Oriented Peer-to-peer architecture. [Citation Graph (, )][DBLP]


Search in 0.035secs, Finished in 0.038secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002