The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mohamed Ali Kâafar: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mohamed Ali Kâafar, Cyrine Mrabet, Thierry Turletti
    A Topology-Aware Overlay Multicast Approach for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AINTEC, 2006, pp:31-47 [Conf]
  2. Mohamed Ali Kâafar, Lamia Benazzouz, Farouk Kamoun, Davor Males
    A Kerberos-Based Authentication Architecture for Wireless LANs. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2004, pp:1344-1353 [Conf]
  3. Mohamed Ali Kâafar, Laurent Mathy, Kavé Salamatian, Chadi Barakat, Thierry Turletti, Walid Dabbous
    Securing Internet Coordinate Systems. [Citation Graph (0, 0)][DBLP]
    AINTEC, 2007, pp:167-168 [Conf]
  4. Mohamed Ali Kâafar, Thierry Turletti, Walid Dabbous
    A Locating-First Approach for Scalable Overlay Multicast. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  5. Mohamed Ali Kâafar, Laurent Mathy, Chadi Barakat, Kavé Salamatian, Thierry Turletti, Walid Dabbous
    Securing internet coordinate embedding systems. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2007, pp:61-72 [Conf]
  6. Mohamed Ali Kâafar, Thierry Turletti, Walid Dabbous
    A Locating-First Approach for Scalable Overlay Multicast [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  7. Geolocalization of proxied services and its application to fast-flux hidden servers. [Citation Graph (, )][DBLP]


  8. A Locating-First Approach for Scalable Overlay Multicast. [Citation Graph (, )][DBLP]


  9. Towards a Two-Tier Internet Coordinate System to Mitigate the Impact of Triangle Inequality Violations. [Citation Graph (, )][DBLP]


  10. Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning. [Citation Graph (, )][DBLP]


  11. Owner-Centric Networking (OCN): Toward a Data Pollution-Free Internet. [Citation Graph (, )][DBLP]


  12. A Self-Organized Clustering Scheme for Overlay Networks. [Citation Graph (, )][DBLP]


  13. Virtual networks under attack: disrupting internet coordinate systems. [Citation Graph (, )][DBLP]


  14. Wireless alternative best effort service: a case study of ALM. [Citation Graph (, )][DBLP]


  15. Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent [Citation Graph (, )][DBLP]


  16. De-anonymizing BitTorrent Users on Tor [Citation Graph (, )][DBLP]


  17. Compromising Tor Anonymity Exploiting P2P Information Leakage [Citation Graph (, )][DBLP]


Search in 0.027secs, Finished in 0.028secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002