The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mohamed Saleh: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
    Java for Mobile Devices: A Security Study. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:235-244 [Conf]
  2. Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
    Security Analysis of Mobile Java. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2005, pp:231-235 [Conf]
  3. Mourad Debbabi, Mohamed Saleh
    Game Semantics Model for Security Protocols. [Citation Graph (0, 0)][DBLP]
    ICFEM, 2005, pp:125-140 [Conf]
  4. Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
    Security Analysis of Wireless Java. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  5. Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
    Security Evaluation of J2ME CLDC Embedded Java Platform. [Citation Graph (0, 0)][DBLP]
    Journal of Object Technology, 2006, v:5, n:2, pp:125-154 [Journal]

  6. Verifying Security Properties of Cryptoprotocols: A Novel Approach. [Citation Graph (, )][DBLP]


  7. Modeling Security Protocols as Games. [Citation Graph (, )][DBLP]


  8. Common Criteria Approach to J2ME CLDC Security Requirements. [Citation Graph (, )][DBLP]


Search in 0.019secs, Finished in 0.019secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002