The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Khalil El-Khatib: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Khalil El-Khatib, N. Hadibi, Gregor von Bochmann
    Support for Personal and Service Mobility in Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    Euro-Par, 2003, pp:1046-1055 [Conf]
  2. Carl Tropper, Khalil El-Khatib
    On Metrics for the Dynamic Load Balancing of Optimistic Simulations. [Citation Graph (0, 0)][DBLP]
    HICSS, 1999, pp:- [Conf]
  3. Khalil El-Khatib, Larry Korba, Ronggong Song, George Yee
    Secure Dynamic Distributed Routing Algorithm for Ad Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2003, pp:359-366 [Conf]
  4. Khalil El-Khatib, Gregor von Bochmann, Yu Zhong
    Selecting the QoS Parameters for Multicast Applications Based on User Profile and Device Capability. [Citation Graph (0, 0)][DBLP]
    IDMS, 2001, pp:221-232 [Conf]
  5. Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba
    SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2004, pp:618-624 [Conf]
  6. Khalil El-Khatib, Gregor von Bochmann
    Agent Support for Context-Aware Services and Personal Mobility. [Citation Graph (0, 0)][DBLP]
    MATA, 2003, pp:89-98 [Conf]
  7. Azzedine Boukerche, Khalil El-Khatib, Tingxue Huang
    A performance comparison of dynamic channel and ressource allocation protocols for mobile cellular networks. [Citation Graph (0, 0)][DBLP]
    Mobility Management & Wireless Access Protocols, 2004, pp:27-34 [Conf]
  8. Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba
    A novel solution for achieving anonymity in wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    PE-WASUN, 2004, pp:30-38 [Conf]
  9. Khalil El-Khatib, Gregor von Bochmann, Abdulmotaleb El-Saddik
    A QoS-Based Framework for Distributed Content Adaptation. [Citation Graph (0, 0)][DBLP]
    QSHINE, 2004, pp:308-312 [Conf]
  10. Andrew S. Patrick, Janice Singer, Brian Corrie II, Sylvie Noël, Khalil El-Khatib, Bruno Emond, Todd Zimmerman, Stephen Marsh
    A QoE Sensitive Architecture for Advanced Collaborative Environments. [Citation Graph (0, 0)][DBLP]
    QSHINE, 2004, pp:319-322 [Conf]
  11. Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba
    An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2005, v:28, n:10, pp:1193-1203 [Journal]
  12. Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba
    Performance evaluation of an anonymity providing protocol for wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2006, v:63, n:11, pp:1094-1109 [Journal]
  13. Khalil El-Khatib, Zhen E. Zhang, N. Hadibi, Gregor von Bochmann
    Personal and service mobility in ubiquitous computing environments. [Citation Graph (0, 0)][DBLP]
    Wireless Communications and Mobile Computing, 2004, v:4, n:6, pp:595-607 [Journal]
  14. Azzedine Boukerche, Li Xu, Khalil El-Khatib
    Trust-based security for wireless ad hoc and sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2413-2427 [Journal]

  15. Analysis of Chinese Remainder Theorem Based Group Key Management Protocols. [Citation Graph (, )][DBLP]


  16. A QoS-based Service Composition for Content Adaptation. [Citation Graph (, )][DBLP]


  17. Protecting the privacy of user's QoS preferences for multimedia applications. [Citation Graph (, )][DBLP]


  18. The cost of protecting privacy in multimedia applications. [Citation Graph (, )][DBLP]


  19. Wireless networks security: Proof of chopchop attack. [Citation Graph (, )][DBLP]


  20. A privacy-enabled architecture for an RFID-based location monitoring system. [Citation Graph (, )][DBLP]


  21. A secure digital asset managment network for game development and education. [Citation Graph (, )][DBLP]


  22. Biometric Identification System Based on Electrocardiogram Data. [Citation Graph (, )][DBLP]


  23. Corrigendum to "Trust-based security for wireless ad hoc and sensor networks" [Computer Communications 30 (2007) 2413-2427]. [Citation Graph (, )][DBLP]


Search in 0.184secs, Finished in 0.185secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002