|
Search the dblp DataBase
Abdelilah Essiari:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Karlo Berket, Abdelilah Essiari, Artur Muratas
PKI-Based Security for Peer-to-Peer Information Sharing. [Citation Graph (0, 0)][DBLP] Peer-to-Peer Computing, 2004, pp:45-52 [Conf]
- Karlo Berket, Abdelilah Essiari, Mary R. Thompson
Securing Resources in Collaborative Environments: A Peer-to-Peer Approach. [Citation Graph (0, 0)][DBLP] IASTED PDCS, 2005, pp:588-593 [Conf]
- Emmanuel Bresson, Olivier Chevassut, Abdelilah Essiari, David Pointcheval
Mutual authentication and group key agreement for low-power mobile devices. [Citation Graph (0, 0)][DBLP] Computer Communications, 2004, v:27, n:17, pp:1730-1737 [Journal]
- Mary R. Thompson, Abdelilah Essiari, Katarzyna Keahey, Von Welch, S. Lang, B. Liu
Fine-Grained Authorization for Job and Resource Management Using Akenti and the Globus Toolkit [Citation Graph (0, 0)][DBLP] CoRR, 2003, v:0, n:, pp:- [Journal]
- Mary R. Thompson, Abdelilah Essiari, Srilekha Mudumbai
Certificate-based authorization policy in a PKI environment. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:4, pp:566-588 [Journal]
Search in 0.001secs, Finished in 0.001secs
|