The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Abdelmadjid Bouabdallah: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Bettahar
    A New and Efficient Key Management Scheme for Content Access Control within Tree Hierarchies. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:551-556 [Conf]
  2. Sandeep K. S. Gupta, Abdelmadjid Bouabdallah, Pradip K. Srimani
    Self-Stabilizing Protocol for Shortest Path Tree for Multi-cast Routing in Mobile Networks (Research Note). [Citation Graph (0, 0)][DBLP]
    Euro-Par, 2000, pp:600-604 [Conf]
  3. Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah
    Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication. [Citation Graph (0, 0)][DBLP]
    HSNMC, 2004, pp:1056-1067 [Conf]
  4. Djamel Tandjaoui, Nadjib Badache, Abdelmadjid Bouabdallah
    Performance Analysis of Binding Update in Mobile IP during Handoff. [Citation Graph (0, 0)][DBLP]
    HSNMC, 2004, pp:503-511 [Conf]
  5. Hatem Bettahar, Abdelmadjid Bouabdallah
    QoS Routing Protocol for the Generalized Multicast Routing Problem (GMRP). [Citation Graph (0, 0)][DBLP]
    ICN (1), 2001, pp:630-639 [Conf]
  6. Imed Romdhani, Hatem Bettahar, Abdelmadjid Bouabdallah
    Transparent Handover for Mobile Multicast Sources. [Citation Graph (0, 0)][DBLP]
    ICN/ICONS/MCL, 2006, pp:145- [Conf]
  7. Hatem Bettahar, Abdelmadjid Bouabdallah
    A Scalable Multicast Protocol for Delay-Constrained Shared Multicast Tree Construction. [Citation Graph (0, 0)][DBLP]
    ISCC, 1999, pp:58-64 [Conf]
  8. Hatem Bettahar, Christophe Beaujean, Abdelmadjid Bouabdallah, Stéphane Cateloin
    A Simple Resource Reservation Protocol for Multicast Communications. [Citation Graph (0, 0)][DBLP]
    ISCC, 2001, pp:139-144 [Conf]
  9. Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah
    A2cast: an adaptive source authentication protocol for multicast streams. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:363-368 [Conf]
  10. Yoann Hinard, Hatem Bettahar, Yacine Challal, Abdelmadjid Bouabdallah
    Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:662-667 [Conf]
  11. Imed Romdhani, Jose Munoz, Hatem Bettahar, Abdelmadjid Bouabdallah
    Hierarchical Home Agent Architecture for Mobile IP Communications. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:136-141 [Conf]
  12. Hamida Seba, Nadjib Badache, Abdelmadjid Bouabdallah
    Solving the consensus problem in a dynamic group: an approach suitable for a mobile environment. [Citation Graph (0, 0)][DBLP]
    ISCC, 2002, pp:327-332 [Conf]
  13. Djamel Tandjaoui, Nadjib Badache, Hatem Bettahar, Abdelmadjid Bouabdallah, Hamida Seba
    Performance Enhancement of Smooth Handoff in Mobile IP by Reducing Packets Disorder. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:149-154 [Conf]
  14. Yacine Challal, Abdelmadjid Bouabdallah, Yoann Hinard
    Efficient Multicast Source Authentication using Layered Hash-Chaining Scheme. [Citation Graph (0, 0)][DBLP]
    LCN, 2004, pp:411-412 [Conf]
  15. Aaron Striegel, Abdelmadjid Bouabdallah, Hatem Bettahar, G. Manimaran
    EBM: A New Approach for Scalable DiffServ Multicasting. [Citation Graph (0, 0)][DBLP]
    Networked Group Communication, 2003, pp:131-142 [Conf]
  16. Abdelouahid Derhab, Nadjib Badache, Abdelmadjid Bouabdallah
    A Partition Prediction Algorithm for Service Replication in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    WONS, 2005, pp:236-245 [Conf]
  17. Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah
    A Scalable and Adaptive Key Management Protocol for Group Communication. [Citation Graph (0, 0)][DBLP]
    WWIC, 2004, pp:260-271 [Conf]
  18. Imed Romdhani, Mounir Kellil, Hong-Yon Lach, Abdelmadjid Bouabdallah, Hatem Bettahar
    Mobility-Aware Rendezvous Point for Mobile Multicast Sources. [Citation Graph (0, 0)][DBLP]
    WWIC, 2004, pp:62-73 [Conf]
  19. Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah
    SAKM: a scalable and adaptive key management approach for multicast communications. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:2, pp:55-70 [Journal]
  20. Hatem Bettahar, Abdelmadjid Bouabdallah
    A new approach for delay-constrained routing. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:18, pp:1751-1764 [Journal]
  21. Yacine Challal, Abdelmadjid Bouabdallah, Yoann Hinard
    RLH: receiver driven layered hash-chaining for multicast data origin authentication. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2005, v:28, n:7, pp:726-740 [Journal]
  22. Yacine Challal, Abdelmadjid Bouabdallah, Hatem Bettahar
    H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:1, pp:57-68 [Journal]
  23. Abdelmadjid Bouabdallah, Charles Delorme, Selma Djelloul
    Edge Deletion Preserving the Diameter of the Hypercube. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 1995, v:63, n:1, pp:91-95 [Journal]
  24. Hamida Seba, Abdelmadjid Bouabdallah, Nadjib Badache
    A new approach to scalable and fault-tolerant group key management protocols. [Citation Graph (0, 0)][DBLP]
    J. High Speed Networks, 2004, v:13, n:4, pp:283-296 [Journal]
  25. Wei Shi, Abdelmadjid Bouabdallah, Pradip K. Srimani
    Leader election in oriented star graphs. [Citation Graph (0, 0)][DBLP]
    Networks, 2005, v:45, n:3, pp:169-179 [Journal]
  26. Abdelmadjid Bouabdallah, Jean-Claude König
    An Improvement of Maekawa's Mutual Exclusion Algorithm to Make It Fault-Tolerant. [Citation Graph (0, 0)][DBLP]
    Parallel Processing Letters, 1992, v:2, n:, pp:283-290 [Journal]
  27. Abdelmadjid Bouabdallah, Jean-Claude König
    An Improvement of the Maekawa's Mutual Exclusion Algorithm to Make it Fault-Tolerant. [Citation Graph (0, 0)][DBLP]
    Parallel Processing Letters, 1993, v:3, n:, pp:305- [Journal]
  28. Abdelmadjid Bouabdallah, Christian Laforest
    A Distributed token/based Algorithm for the Dynamic Resource Allocation Problem. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2000, v:34, n:3, pp:60-68 [Journal]
  29. Abdelmadjid Bouabdallah
    On Mutual Exclusion in Faulty Distributed Systems. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1994, v:28, n:1, pp:80-87 [Journal]
  30. M. Benchaïba, Abdelmadjid Bouabdallah, Nadjib Badache, Mohamed Ahmed-Nacer
    Distributed mutual exclusion algorithms in mobile ad hoc networks: an overview. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:1, pp:74-89 [Journal]
  31. H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Bettahar, Yacine Challal
    Key management for content access control in a hierarchy. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:11, pp:3197-3219 [Journal]

  32. BitTorrent Worm Sensor Network : P2P Worms Detection and Containment. [Citation Graph (, )][DBLP]


  33. A cross-layer reputation system for routing non-cooperation effects mitigation within hybrid ad-hoc networks. [Citation Graph (, )][DBLP]


  34. AAA based security architecture for multicast content distribution. [Citation Graph (, )][DBLP]


  35. Impact of Cheating and Non-Cooperation on the Stability and the Performances of Application-Level Multicast Sessions. [Citation Graph (, )][DBLP]


  36. A new worm propagation threat in BitTorrent: Modeling and analysis. [Citation Graph (, )][DBLP]


  37. Gestion de clés et sécurité multipoint: étude et perspectives. [Citation Graph (, )][DBLP]


  38. Reliable and fully distributed trust model for mobile ad hoc networks. [Citation Graph (, )][DBLP]


  39. Multicast receiver and sender access control and its applicability to mobile IP environments: A survey. [Citation Graph (, )][DBLP]


  40. A taxonomy of multicast data origin authentication: Issues and solutions. [Citation Graph (, )][DBLP]


  41. IP Mobile multicast: Challenges and solutions. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002