The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mohamed Eltoweissy: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ashraf Wadaa, Stewart Shen, Mohamed Eltoweissy
    Poster on Electronic Circulation of Copyrighted Information in CSCW Environments. [Citation Graph (0, 0)][DBLP]
    CoopIS, 1997, pp:231- [Conf]
  2. Denis Gracanin, H. Lally Singh, Michael G. Hinchey, Mohamed Eltoweissy, Shawn A. Bohner
    A CSP-Based Agent Modeling Framework for the Cougaar Agent-Based Architecture. [Citation Graph (0, 0)][DBLP]
    ECBS, 2005, pp:255-262 [Conf]
  3. Mohamed Eltoweissy, Mohammad Hossain Heydari, Linda Morales, Ivan Hal Sudborough
    Towards Trusted Online Dissemination of Consumer Information. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  4. Linda Morales, Ivan Hal Sudborough, Mohamed Eltoweissy, Mohammad Hossain Heydari
    Combinatorial Optimization of Multicast Key Management. [Citation Graph (0, 0)][DBLP]
    HICSS, 2003, pp:332- [Conf]
  5. Mohamed F. Younis, Kemal Akkaya, Mohamed Eltoweissy, Ashraf Wadaa
    On Handling QoS Traffic in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  6. Mohammed A. Moharrum, Ravi Mukkamala, Mohamed Eltoweissy
    TKGS: Verifiable Threshold-Based Key Generation Scheme in Open Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCCN, 2004, pp:31-36 [Conf]
  7. Mohamed Eltoweissy, Hussein M. Abdel-Wahab, M. Abougabal, Nagwa M. El-Makky, Souheir A. Fouad
    Performance Analysis of Time-Stamp Ordering Algorithms in Database Systems: The Pure Restarts Case. [Citation Graph (0, 0)][DBLP]
    ICCI, 1993, pp:458-463 [Conf]
  8. Mohamed Eltoweissy, Nagwa M. El-Makky, M. Abougabal, Souheir A. Fouad
    The Mean Value Approach to Performance Evaluation of Time-Stamp Ordering Algorithms. [Citation Graph (0, 0)][DBLP]
    ICCI, 1991, pp:276-287 [Conf]
  9. Osman ZeinElDine, Mohamed Eltoweissy, Hussein M. Abdel-Wahab
    BUS: A Multicasting Protocol for Interconnected LANs. [Citation Graph (0, 0)][DBLP]
    ICCI, 1993, pp:140-144 [Conf]
  10. Osman ZeinElDine, Mohamed Eltoweissy, Ravi Mukkamala
    A Distributed Scheduling Algorithm for Heterogeneous Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    ICCI, 1991, pp:588-598 [Conf]
  11. Ashraf Wadaa, Stephan Olariu, Larry Wilson, Mohamed Eltoweissy
    Scalable Cryptographic Key Management in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2004, pp:796-802 [Conf]
  12. Mohammed A. Moharrum, Ravi Mukkamala, Mohamed Eltoweissy
    Efficient Secure Multicast with Well-Populated Multicast Key Trees. [Citation Graph (0, 0)][DBLP]
    ICPADS, 2004, pp:215-222 [Conf]
  13. Ashraf Wadaa, Stephan Olariu, Larry Wilson, Mohamed Eltoweissy, K. Jones
    On Providing Anonymity in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICPADS, 2004, pp:411-418 [Conf]
  14. Mohamed Eltoweissy, Ashraf Wadaa
    Message from the Co-Chairs. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2002, pp:3-4 [Conf]
  15. Oskar Scheikl, Jonathan Lane, Robert Boyer, Mohamed Eltoweissy
    Multi-level Secure Multicast: The Rethinking of Secure Locks. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2002, pp:17-24 [Conf]
  16. Denis Gracanin, Mohamed Eltoweissy, Stephan Olariu, Ashraf Wadaa
    On Modeling Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2004, pp:- [Conf]
  17. John D. Bansemer, Mohamed Eltoweissy
    On Performance Metrics for IP Multicast Routing. [Citation Graph (0, 0)][DBLP]
    ISPAN, 2000, pp:282-291 [Conf]
  18. M. Tamer Refaei, Vivek Srivastava, Luiz A. DaSilva, Mohamed Eltoweissy
    A Reputation-based Mechanism for Isolating Selfish Nodes in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2005, pp:3-11 [Conf]
  19. K. Jones, Ashraf Wadaa, Stephan Olariu, Larry Wilson, Mohamed Eltoweissy
    Towards a new paradigm for securing wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    NSPW, 2003, pp:115-121 [Conf]
  20. Mohammed A. Moharrum, Mohamed Eltoweissy
    A study of static versus dynamic keying schemes in sensor networks. [Citation Graph (0, 0)][DBLP]
    PE-WASUN, 2005, pp:122-129 [Conf]
  21. Ibrahim Matta, Mohamed Eltoweissy
    A Scalable QoS Routing Architecture for Real-Time CSCW Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Real Time Technology and Applications Symposium, 1998, pp:137-0 [Conf]
  22. Mohamed Eltoweissy, Ashraf Wadaa, Stephan Olariu, Larry Wilson
    Group key management scheme for large-scale sensor networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2005, v:3, n:5, pp:668-688 [Journal]
  23. Mohamed Eltoweissy, Mohamed F. Younis
    Dependable Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:2, pp:149-150 [Journal]
  24. Abdelmounaam Rezgui, Athman Bouguettaya, Mohamed Eltoweissy
    Privacy on the Web: Facts, Challenges, and Solutions. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:40-49 [Journal]
  25. Mohammed A. Moharrum, Ravi Mukkamala, Mohamed Eltoweissy
    A novel collusion-resilient architecture for secure group communication in wireless ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    J. High Speed Networks, 2006, v:15, n:1, pp:73-92 [Journal]
  26. Mohamed Eltoweissy, Mohammad Hossain Heydari, Linda Morales, Ivan Hal Sudborough
    Combinatorial Optimization of Group Key Management. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2004, v:12, n:1, pp:- [Journal]
  27. Abdelmounaam Rezgui, Athman Bouguettaya, Mohamed Eltoweissy
    SemWebDL: A privacy-preserving Semantic Web infrastructure for digital libraries. [Citation Graph (0, 0)][DBLP]
    Int. J. on Digital Libraries, 2004, v:4, n:3, pp:171-184 [Journal]
  28. Mohamed F. Younis, Waleed Youssef, Mohamed Eltoweissy, Stephan Olariu
    Safe Quality of Service Aware Management of Heterogeneous Sensor Networks. [Citation Graph (0, 0)][DBLP]
    Journal of Interconnection Networks, 2006, v:7, n:1, pp:179-193 [Journal]
  29. Stephan Olariu, Mohamed Eltoweissy, Mohamed Younis
    ANSWER: AutoNomouS netWorked sEnsoR system. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2007, v:67, n:1, pp:111-124 [Journal]
  30. Ashraf Wadaa, Stephan Olariu, Larry Wilson, Mohamed Eltoweissy, K. Jones
    Training a Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    MONET, 2005, v:10, n:1-2, pp:151-168 [Journal]
  31. Stephan Olariu, Ashraf Wadaa, Larry Wilson, Mohamed Eltoweissy
    Wireless sensor networks: leveraging the virtual infrastructure. [Citation Graph (0, 0)][DBLP]
    IEEE Network, 2004, v:18, n:4, pp:51-56 [Journal]
  32. Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Eltoweissy
    Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:8, pp:865-882 [Journal]
  33. Mohammed A. Moharrum, Mohamed Eltoweissy, Ravi Mukkamala
    Dynamic combinatorial key management scheme for sensor networks. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:1017-1035 [Journal]
  34. Michael Chorzempa, Jung Min Park, Mohamed Eltoweissy
    SECK: survivable and efficient clustered keying for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    IPCCC, 2005, pp:453-458 [Conf]
  35. Mohamed Younis, Kajaldeep Ghumman, Mohamed Eltoweissy
    Key management in wireless ad hoc networks: collusion analysis and prevention. [Citation Graph (0, 0)][DBLP]
    IPCCC, 2005, pp:199-203 [Conf]
  36. Ruiliang Chen, Michael Snow, Jung Min Park, M. Tamer Refaei, Mohamed Eltoweissy
    Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  37. Michael Chorzempa, Jung Min Park, Mohamed Eltoweissy
    Key management for long-lived sensor networks in hostile environments. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:9, pp:1964-1979 [Journal]
  38. Abdelmounaam Rezgui, Mohamed Eltoweissy
    Service-oriented sensor-actuator networks: Promises, challenges, and the road ahead. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:13, pp:2627-2648 [Journal]

  39. Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements. [Citation Graph (, )][DBLP]


  40. Dynamic adaptive redundancy for quality-of-service control in wireless sensor networks. [Citation Graph (, )][DBLP]


  41. Safety and QoS-Aware Management of Heterogeneous Sensor Networks. [Citation Graph (, )][DBLP]


  42. CARP: A context-aware routing protocol for delay-constrained traffic in sensor networks. [Citation Graph (, )][DBLP]


  43. IMAPS: Imbricated authentication protocol suite for mobile users and groups. [Citation Graph (, )][DBLP]


  44. Authentication protocols for ad hoc networks: taxonomy and research issues. [Citation Graph (, )][DBLP]


  45. ANSWER: autonomous wireless sensor network. [Citation Graph (, )][DBLP]


  46. Towards a Framework for Evolvable Network Design. [Citation Graph (, )][DBLP]


  47. Two-level signature delegation for mobile first responder authentication. [Citation Graph (, )][DBLP]


  48. Safe base-station repositioning in wireless sensor networks. [Citation Graph (, )][DBLP]


  49. Data replication in collaborative sensor network systems. [Citation Graph (, )][DBLP]


  50. Goal-Oriented Software Security Engineering: The Electronic Smart Card Case Study. [Citation Graph (, )][DBLP]


  51. Location-Aware Affinity Propagation Clustering in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  52. Group Authentication Protocol for Mobile Networks. [Citation Graph (, )][DBLP]


  53. Hidden Anchor: Providing Physical Layer Location Privacy in Hybrid Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  54. CellNet: A Bottom-Up Approach to Network Design. [Citation Graph (, )][DBLP]


Search in 0.042secs, Finished in 0.044secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002