The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hatem Bettahar: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Bettahar
    A New and Efficient Key Management Scheme for Content Access Control within Tree Hierarchies. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:551-556 [Conf]
  2. Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah
    Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication. [Citation Graph (0, 0)][DBLP]
    HSNMC, 2004, pp:1056-1067 [Conf]
  3. Hatem Bettahar, Abdelmadjid Bouabdallah
    QoS Routing Protocol for the Generalized Multicast Routing Problem (GMRP). [Citation Graph (0, 0)][DBLP]
    ICN (1), 2001, pp:630-639 [Conf]
  4. Imed Romdhani, Hatem Bettahar, Abdelmadjid Bouabdallah
    Transparent Handover for Mobile Multicast Sources. [Citation Graph (0, 0)][DBLP]
    ICN/ICONS/MCL, 2006, pp:145- [Conf]
  5. Hatem Bettahar, Abdelmadjid Bouabdallah
    A Scalable Multicast Protocol for Delay-Constrained Shared Multicast Tree Construction. [Citation Graph (0, 0)][DBLP]
    ISCC, 1999, pp:58-64 [Conf]
  6. Hatem Bettahar, Christophe Beaujean, Abdelmadjid Bouabdallah, Stéphane Cateloin
    A Simple Resource Reservation Protocol for Multicast Communications. [Citation Graph (0, 0)][DBLP]
    ISCC, 2001, pp:139-144 [Conf]
  7. Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah
    A2cast: an adaptive source authentication protocol for multicast streams. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:363-368 [Conf]
  8. Yoann Hinard, Hatem Bettahar, Yacine Challal, Abdelmadjid Bouabdallah
    Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:662-667 [Conf]
  9. Imed Romdhani, Jose Munoz, Hatem Bettahar, Abdelmadjid Bouabdallah
    Hierarchical Home Agent Architecture for Mobile IP Communications. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:136-141 [Conf]
  10. Djamel Tandjaoui, Nadjib Badache, Hatem Bettahar, Abdelmadjid Bouabdallah, Hamida Seba
    Performance Enhancement of Smooth Handoff in Mobile IP by Reducing Packets Disorder. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:149-154 [Conf]
  11. Aaron Striegel, Abdelmadjid Bouabdallah, Hatem Bettahar, G. Manimaran
    EBM: A New Approach for Scalable DiffServ Multicasting. [Citation Graph (0, 0)][DBLP]
    Networked Group Communication, 2003, pp:131-142 [Conf]
  12. Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah
    A Scalable and Adaptive Key Management Protocol for Group Communication. [Citation Graph (0, 0)][DBLP]
    WWIC, 2004, pp:260-271 [Conf]
  13. Imed Romdhani, Mounir Kellil, Hong-Yon Lach, Abdelmadjid Bouabdallah, Hatem Bettahar
    Mobility-Aware Rendezvous Point for Mobile Multicast Sources. [Citation Graph (0, 0)][DBLP]
    WWIC, 2004, pp:62-73 [Conf]
  14. Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah
    SAKM: a scalable and adaptive key management approach for multicast communications. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:2, pp:55-70 [Journal]
  15. Hatem Bettahar, Abdelmadjid Bouabdallah
    A new approach for delay-constrained routing. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:18, pp:1751-1764 [Journal]
  16. Yacine Challal, Abdelmadjid Bouabdallah, Hatem Bettahar
    H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:1, pp:57-68 [Journal]
  17. H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Bettahar, Yacine Challal
    Key management for content access control in a hierarchy. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:11, pp:3197-3219 [Journal]

  18. Efficient Key Management Scheme for Secure Application Level Multicast. [Citation Graph (, )][DBLP]


  19. AAA based security architecture for multicast content distribution. [Citation Graph (, )][DBLP]


  20. Impact of Cheating and Non-Cooperation on the Stability and the Performances of Application-Level Multicast Sessions. [Citation Graph (, )][DBLP]


  21. Gestion de clés et sécurité multipoint: étude et perspectives. [Citation Graph (, )][DBLP]


  22. Multicast receiver and sender access control and its applicability to mobile IP environments: A survey. [Citation Graph (, )][DBLP]


  23. A taxonomy of multicast data origin authentication: Issues and solutions. [Citation Graph (, )][DBLP]


  24. IP Mobile multicast: Challenges and solutions. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002