The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Donal O'Mahony: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hitesh Tewari, Maurice McCourt, Donal O'Mahony
    Advanced Electronic Commerce Security in a Workflow Environment. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce, 1994, pp:69-85 [Conf]
  2. Patroklos G. Argyroudis, Donal O'Mahony
    Securing Communications in the Smart Home. [Citation Graph (0, 0)][DBLP]
    EUC, 2004, pp:891-902 [Conf]
  3. Patroklos G. Argyroudis, Donal O'Mahony
    ÆTHER: an Authorization Management Architecture for Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:246-259 [Conf]
  4. Dónal Cunningham, Donal O'Mahony
    Secure Pay-Per-View Testbed. [Citation Graph (0, 0)][DBLP]
    ICMCS, 1995, pp:308-311 [Conf]
  5. Stephen Toner, Donal O'Mahony
    Self-Organising Node Address Management in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    PWC, 2003, pp:476-483 [Conf]
  6. Patroklos G. Argyroudis, Donal O'Mahony
    Towards Flexible Authorization Management. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:421-426 [Conf]
  7. Brian Lehane, Linda Doyle, Donal O'Mahony
    Ad Hoc Key Management Infrastructure. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:540-545 [Conf]
  8. Brian Lee, Donal O'Mahony
    Policy Based Charging in Multimedia Networks. [Citation Graph (0, 0)][DBLP]
    MMNS, 2005, pp:145-155 [Conf]
  9. Patroklos G. Argyroudis, Raja Verma, Hitesh Tewari, Donal O'Mahony
    Performance Analysis of Cryptographic Protocols on Handheld Devices. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:169-174 [Conf]
  10. Derek Greene, Donal O'Mahony
    Instant Messaging & Presence Management in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2004, pp:55-59 [Conf]
  11. Marco Ruffini, Donal O'Mahony, Linda Doyle
    A testbed demonstrating optical IP switching (OIS) in disaggregated network architectures. [Citation Graph (0, 0)][DBLP]
    TRIDENTCOM, 2006, pp:- [Conf]
  12. Donal O'Mahony, Neil Weldon
    X.500 Directory Services Support for Electronic Data Interchange (EDI). [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1995, v:27, n:5, pp:691-701 [Journal]
  13. Pavel Gladyshev, Ahmed Patel, Donal O'Mahony
    Cracking RC5 with Java applets. [Citation Graph (0, 0)][DBLP]
    Concurrency - Practice and Experience, 1998, v:10, n:11-13, pp:1165-1171 [Journal]
  14. Diego Doval, Donal O'Mahony
    Overlay Networks: A Scalable Alternative for P2P. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2003, v:7, n:4, pp:79-82 [Journal]
  15. Donal O'Mahony
    UMTS: The Fusion of Fixed and Mobile Networking. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:1, pp:49-56 [Journal]
  16. Donal O'Mahony, Michael Behringer
    The Global Internet: The Road to Ten-34. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1997, v:1, n:5, pp:82-83 [Journal]
  17. Marco Ruffini, Donal O'Mahony, Linda Doyle
    Optical IP Switching for Dynamic Traffic Engineering in Next-Generation Optical Networks. [Citation Graph (0, 0)][DBLP]
    ONDM, 2007, pp:309-318 [Conf]
  18. Patroklos G. Argyroudis, Timothy K. Forde, Linda Doyle, Donal O'Mahony
    A Policy-Driven Trading Framework for Market-Based Spectrum Assignment. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:246-250 [Conf]

  19. TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments. [Citation Graph (, )][DBLP]


  20. Analysing the Security Threats against Network Convergence Architectures. [Citation Graph (, )][DBLP]


  21. Secure routing for mobile ad hoc networks. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002