The SCEAS System
Navigation Menu

Search the dblp DataBase


Mohamed Al-Ibrahim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mohamed Al-Ibrahim, Anton Cerný
    Proxy and Threshold One-Time Signatures. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:123-136 [Conf]
  2. Mohamed Al-Ibrahim, Mehmet Savsar, Wael Adi
    A Security Analysis for Label Switching Routers. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2001, pp:526-530 [Conf]
  3. Mohamed Al-Ibrahim, Josef Pieprzyk
    Authentication of transit flows and k-siblings one-time signature. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:41-55 [Conf]
  4. Mohamed Al-Ibrahim, Josef Pieprzyk
    Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2001, pp:239-249 [Conf]
  5. Mohamed Al-Ibrahim, Hossein Ghodosi, Josef Pieprzyk
    Authentication of Concast Communication. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:185-198 [Conf]
  6. Mohamed Al-Ibrahim
    A Signcryption Scheme Based on Secret Sharing Technique. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:279-288 [Conf]
  7. Mohamed Al-Ibrahim, Anton Cerný
    Authentication of Anycast Communication. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:419-423 [Conf]

Search in 0.018secs, Finished in 0.018secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002