The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Abdelilah Essiari: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Karlo Berket, Abdelilah Essiari, Artur Muratas
    PKI-Based Security for Peer-to-Peer Information Sharing. [Citation Graph (0, 0)][DBLP]
    Peer-to-Peer Computing, 2004, pp:45-52 [Conf]
  2. Karlo Berket, Abdelilah Essiari, Mary R. Thompson
    Securing Resources in Collaborative Environments: A Peer-to-Peer Approach. [Citation Graph (0, 0)][DBLP]
    IASTED PDCS, 2005, pp:588-593 [Conf]
  3. Emmanuel Bresson, Olivier Chevassut, Abdelilah Essiari, David Pointcheval
    Mutual authentication and group key agreement for low-power mobile devices. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:17, pp:1730-1737 [Journal]
  4. Mary R. Thompson, Abdelilah Essiari, Katarzyna Keahey, Von Welch, S. Lang, B. Liu
    Fine-Grained Authorization for Job and Resource Management Using Akenti and the Globus Toolkit [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  5. Mary R. Thompson, Abdelilah Essiari, Srilekha Mudumbai
    Certificate-based authorization policy in a PKI environment. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2003, v:6, n:4, pp:566-588 [Journal]

Search in 0.001secs, Finished in 0.001secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002