|
Search the dblp DataBase
Mohamed Eltoweissy:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Ashraf Wadaa, Stewart Shen, Mohamed Eltoweissy
Poster on Electronic Circulation of Copyrighted Information in CSCW Environments. [Citation Graph (0, 0)][DBLP] CoopIS, 1997, pp:231- [Conf]
- Denis Gracanin, H. Lally Singh, Michael G. Hinchey, Mohamed Eltoweissy, Shawn A. Bohner
A CSP-Based Agent Modeling Framework for the Cougaar Agent-Based Architecture. [Citation Graph (0, 0)][DBLP] ECBS, 2005, pp:255-262 [Conf]
- Mohamed Eltoweissy, Mohammad Hossain Heydari, Linda Morales, Ivan Hal Sudborough
Towards Trusted Online Dissemination of Consumer Information. [Citation Graph (0, 0)][DBLP] HICSS, 2004, pp:- [Conf]
- Linda Morales, Ivan Hal Sudborough, Mohamed Eltoweissy, Mohammad Hossain Heydari
Combinatorial Optimization of Multicast Key Management. [Citation Graph (0, 0)][DBLP] HICSS, 2003, pp:332- [Conf]
- Mohamed F. Younis, Kemal Akkaya, Mohamed Eltoweissy, Ashraf Wadaa
On Handling QoS Traffic in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] HICSS, 2004, pp:- [Conf]
- Mohammed A. Moharrum, Ravi Mukkamala, Mohamed Eltoweissy
TKGS: Verifiable Threshold-Based Key Generation Scheme in Open Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] ICCCN, 2004, pp:31-36 [Conf]
- Mohamed Eltoweissy, Hussein M. Abdel-Wahab, M. Abougabal, Nagwa M. El-Makky, Souheir A. Fouad
Performance Analysis of Time-Stamp Ordering Algorithms in Database Systems: The Pure Restarts Case. [Citation Graph (0, 0)][DBLP] ICCI, 1993, pp:458-463 [Conf]
- Mohamed Eltoweissy, Nagwa M. El-Makky, M. Abougabal, Souheir A. Fouad
The Mean Value Approach to Performance Evaluation of Time-Stamp Ordering Algorithms. [Citation Graph (0, 0)][DBLP] ICCI, 1991, pp:276-287 [Conf]
- Osman ZeinElDine, Mohamed Eltoweissy, Hussein M. Abdel-Wahab
BUS: A Multicasting Protocol for Interconnected LANs. [Citation Graph (0, 0)][DBLP] ICCI, 1993, pp:140-144 [Conf]
- Osman ZeinElDine, Mohamed Eltoweissy, Ravi Mukkamala
A Distributed Scheduling Algorithm for Heterogeneous Real-Time Systems. [Citation Graph (0, 0)][DBLP] ICCI, 1991, pp:588-598 [Conf]
- Ashraf Wadaa, Stephan Olariu, Larry Wilson, Mohamed Eltoweissy
Scalable Cryptographic Key Management in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ICDCS Workshops, 2004, pp:796-802 [Conf]
- Mohammed A. Moharrum, Ravi Mukkamala, Mohamed Eltoweissy
Efficient Secure Multicast with Well-Populated Multicast Key Trees. [Citation Graph (0, 0)][DBLP] ICPADS, 2004, pp:215-222 [Conf]
- Ashraf Wadaa, Stephan Olariu, Larry Wilson, Mohamed Eltoweissy, K. Jones
On Providing Anonymity in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ICPADS, 2004, pp:411-418 [Conf]
- Mohamed Eltoweissy, Ashraf Wadaa
Message from the Co-Chairs. [Citation Graph (0, 0)][DBLP] ICPP Workshops, 2002, pp:3-4 [Conf]
- Oskar Scheikl, Jonathan Lane, Robert Boyer, Mohamed Eltoweissy
Multi-level Secure Multicast: The Rethinking of Secure Locks. [Citation Graph (0, 0)][DBLP] ICPP Workshops, 2002, pp:17-24 [Conf]
- Denis Gracanin, Mohamed Eltoweissy, Stephan Olariu, Ashraf Wadaa
On Modeling Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] IPDPS, 2004, pp:- [Conf]
- John D. Bansemer, Mohamed Eltoweissy
On Performance Metrics for IP Multicast Routing. [Citation Graph (0, 0)][DBLP] ISPAN, 2000, pp:282-291 [Conf]
- M. Tamer Refaei, Vivek Srivastava, Luiz A. DaSilva, Mohamed Eltoweissy
A Reputation-based Mechanism for Isolating Selfish Nodes in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] MobiQuitous, 2005, pp:3-11 [Conf]
- K. Jones, Ashraf Wadaa, Stephan Olariu, Larry Wilson, Mohamed Eltoweissy
Towards a new paradigm for securing wireless sensor networks. [Citation Graph (0, 0)][DBLP] NSPW, 2003, pp:115-121 [Conf]
- Mohammed A. Moharrum, Mohamed Eltoweissy
A study of static versus dynamic keying schemes in sensor networks. [Citation Graph (0, 0)][DBLP] PE-WASUN, 2005, pp:122-129 [Conf]
- Ibrahim Matta, Mohamed Eltoweissy
A Scalable QoS Routing Architecture for Real-Time CSCW Applications. [Citation Graph (0, 0)][DBLP] IEEE Real Time Technology and Applications Symposium, 1998, pp:137-0 [Conf]
- Mohamed Eltoweissy, Ashraf Wadaa, Stephan Olariu, Larry Wilson
Group key management scheme for large-scale sensor networks. [Citation Graph (0, 0)][DBLP] Ad Hoc Networks, 2005, v:3, n:5, pp:668-688 [Journal]
- Mohamed Eltoweissy, Mohamed F. Younis
Dependable Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:2, pp:149-150 [Journal]
- Abdelmounaam Rezgui, Athman Bouguettaya, Mohamed Eltoweissy
Privacy on the Web: Facts, Challenges, and Solutions. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2003, v:1, n:6, pp:40-49 [Journal]
- Mohammed A. Moharrum, Ravi Mukkamala, Mohamed Eltoweissy
A novel collusion-resilient architecture for secure group communication in wireless ad-hoc networks. [Citation Graph (0, 0)][DBLP] J. High Speed Networks, 2006, v:15, n:1, pp:73-92 [Journal]
- Mohamed Eltoweissy, Mohammad Hossain Heydari, Linda Morales, Ivan Hal Sudborough
Combinatorial Optimization of Group Key Management. [Citation Graph (0, 0)][DBLP] J. Network Syst. Manage., 2004, v:12, n:1, pp:- [Journal]
- Abdelmounaam Rezgui, Athman Bouguettaya, Mohamed Eltoweissy
SemWebDL: A privacy-preserving Semantic Web infrastructure for digital libraries. [Citation Graph (0, 0)][DBLP] Int. J. on Digital Libraries, 2004, v:4, n:3, pp:171-184 [Journal]
- Mohamed F. Younis, Waleed Youssef, Mohamed Eltoweissy, Stephan Olariu
Safe Quality of Service Aware Management of Heterogeneous Sensor Networks. [Citation Graph (0, 0)][DBLP] Journal of Interconnection Networks, 2006, v:7, n:1, pp:179-193 [Journal]
- Stephan Olariu, Mohamed Eltoweissy, Mohamed Younis
ANSWER: AutoNomouS netWorked sEnsoR system. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 2007, v:67, n:1, pp:111-124 [Journal]
- Ashraf Wadaa, Stephan Olariu, Larry Wilson, Mohamed Eltoweissy, K. Jones
Training a Wireless Sensor Network. [Citation Graph (0, 0)][DBLP] MONET, 2005, v:10, n:1-2, pp:151-168 [Journal]
- Stephan Olariu, Ashraf Wadaa, Larry Wilson, Mohamed Eltoweissy
Wireless sensor networks: leveraging the virtual infrastructure. [Citation Graph (0, 0)][DBLP] IEEE Network, 2004, v:18, n:4, pp:51-56 [Journal]
- Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Eltoweissy
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:8, pp:865-882 [Journal]
- Mohammed A. Moharrum, Mohamed Eltoweissy, Ravi Mukkamala
Dynamic combinatorial key management scheme for sensor networks. [Citation Graph (0, 0)][DBLP] , 2006, v:, n:, pp:1017-1035 [Journal]
- Michael Chorzempa, Jung Min Park, Mohamed Eltoweissy
SECK: survivable and efficient clustered keying for wireless sensor networks. [Citation Graph (0, 0)][DBLP] IPCCC, 2005, pp:453-458 [Conf]
- Mohamed Younis, Kajaldeep Ghumman, Mohamed Eltoweissy
Key management in wireless ad hoc networks: collusion analysis and prevention. [Citation Graph (0, 0)][DBLP] IPCCC, 2005, pp:199-203 [Conf]
- Ruiliang Chen, Michael Snow, Jung Min Park, M. Tamer Refaei, Mohamed Eltoweissy
Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] GLOBECOM, 2006, pp:- [Conf]
- Michael Chorzempa, Jung Min Park, Mohamed Eltoweissy
Key management for long-lived sensor networks in hostile environments. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:9, pp:1964-1979 [Journal]
- Abdelmounaam Rezgui, Mohamed Eltoweissy
Service-oriented sensor-actuator networks: Promises, challenges, and the road ahead. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:13, pp:2627-2648 [Journal]
Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements. [Citation Graph (, )][DBLP]
Dynamic adaptive redundancy for quality-of-service control in wireless sensor networks. [Citation Graph (, )][DBLP]
Safety and QoS-Aware Management of Heterogeneous Sensor Networks. [Citation Graph (, )][DBLP]
CARP: A context-aware routing protocol for delay-constrained traffic in sensor networks. [Citation Graph (, )][DBLP]
IMAPS: Imbricated authentication protocol suite for mobile users and groups. [Citation Graph (, )][DBLP]
Authentication protocols for ad hoc networks: taxonomy and research issues. [Citation Graph (, )][DBLP]
ANSWER: autonomous wireless sensor network. [Citation Graph (, )][DBLP]
Towards a Framework for Evolvable Network Design. [Citation Graph (, )][DBLP]
Two-level signature delegation for mobile first responder authentication. [Citation Graph (, )][DBLP]
Safe base-station repositioning in wireless sensor networks. [Citation Graph (, )][DBLP]
Data replication in collaborative sensor network systems. [Citation Graph (, )][DBLP]
Goal-Oriented Software Security Engineering: The Electronic Smart Card Case Study. [Citation Graph (, )][DBLP]
Location-Aware Affinity Propagation Clustering in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Group Authentication Protocol for Mobile Networks. [Citation Graph (, )][DBLP]
Hidden Anchor: Providing Physical Layer Location Privacy in Hybrid Wireless Sensor Networks. [Citation Graph (, )][DBLP]
CellNet: A Bottom-Up Approach to Network Design. [Citation Graph (, )][DBLP]
Search in 0.044secs, Finished in 0.046secs
|