|
Search the dblp DataBase
Mohamed Saleh:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
Java for Mobile Devices: A Security Study. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:235-244 [Conf]
- Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
Security Analysis of Mobile Java. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2005, pp:231-235 [Conf]
- Mourad Debbabi, Mohamed Saleh
Game Semantics Model for Security Protocols. [Citation Graph (0, 0)][DBLP] ICFEM, 2005, pp:125-140 [Conf]
- Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
Security Analysis of Wireless Java. [Citation Graph (0, 0)][DBLP] PST, 2005, pp:- [Conf]
- Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
Security Evaluation of J2ME CLDC Embedded Java Platform. [Citation Graph (0, 0)][DBLP] Journal of Object Technology, 2006, v:5, n:2, pp:125-154 [Journal]
Verifying Security Properties of Cryptoprotocols: A Novel Approach. [Citation Graph (, )][DBLP]
Modeling Security Protocols as Games. [Citation Graph (, )][DBLP]
Common Criteria Approach to J2ME CLDC Security Requirements. [Citation Graph (, )][DBLP]
Search in 0.019secs, Finished in 0.019secs
|