|
Search the dblp DataBase
Mohamed Al-Ibrahim:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Mohamed Al-Ibrahim, Anton Cerný
Proxy and Threshold One-Time Signatures. [Citation Graph (0, 0)][DBLP] ACNS, 2003, pp:123-136 [Conf]
- Mohamed Al-Ibrahim, Mehmet Savsar, Wael Adi
A Security Analysis for Label Switching Routers. [Citation Graph (0, 0)][DBLP] AICCSA, 2001, pp:526-530 [Conf]
- Mohamed Al-Ibrahim, Josef Pieprzyk
Authentication of transit flows and k-siblings one-time signature. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2002, pp:41-55 [Conf]
- Mohamed Al-Ibrahim, Josef Pieprzyk
Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques. [Citation Graph (0, 0)][DBLP] ICN (2), 2001, pp:239-249 [Conf]
- Mohamed Al-Ibrahim, Hossein Ghodosi, Josef Pieprzyk
Authentication of Concast Communication. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2002, pp:185-198 [Conf]
- Mohamed Al-Ibrahim
A Signcryption Scheme Based on Secret Sharing Technique. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2003, pp:279-288 [Conf]
- Mohamed Al-Ibrahim, Anton Cerný
Authentication of Anycast Communication. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2003, pp:419-423 [Conf]
Search in 0.001secs, Finished in 0.001secs
|