|
Search the dblp DataBase
Mohamed Ali Kâafar:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Mohamed Ali Kâafar, Cyrine Mrabet, Thierry Turletti
A Topology-Aware Overlay Multicast Approach for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP] AINTEC, 2006, pp:31-47 [Conf]
- Mohamed Ali Kâafar, Lamia Benazzouz, Farouk Kamoun, Davor Males
A Kerberos-Based Authentication Architecture for Wireless LANs. [Citation Graph (0, 0)][DBLP] NETWORKING, 2004, pp:1344-1353 [Conf]
- Mohamed Ali Kâafar, Laurent Mathy, Kavé Salamatian, Chadi Barakat, Thierry Turletti, Walid Dabbous
Securing Internet Coordinate Systems. [Citation Graph (0, 0)][DBLP] AINTEC, 2007, pp:167-168 [Conf]
- Mohamed Ali Kâafar, Thierry Turletti, Walid Dabbous
A Locating-First Approach for Scalable Overlay Multicast. [Citation Graph (0, 0)][DBLP] INFOCOM, 2006, pp:- [Conf]
- Mohamed Ali Kâafar, Laurent Mathy, Chadi Barakat, Kavé Salamatian, Thierry Turletti, Walid Dabbous
Securing internet coordinate embedding systems. [Citation Graph (0, 0)][DBLP] SIGCOMM, 2007, pp:61-72 [Conf]
- Mohamed Ali Kâafar, Thierry Turletti, Walid Dabbous
A Locating-First Approach for Scalable Overlay Multicast [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
Geolocalization of proxied services and its application to fast-flux hidden servers. [Citation Graph (, )][DBLP]
A Locating-First Approach for Scalable Overlay Multicast. [Citation Graph (, )][DBLP]
Towards a Two-Tier Internet Coordinate System to Mitigate the Impact of Triangle Inequality Violations. [Citation Graph (, )][DBLP]
Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning. [Citation Graph (, )][DBLP]
Owner-Centric Networking (OCN): Toward a Data Pollution-Free Internet. [Citation Graph (, )][DBLP]
A Self-Organized Clustering Scheme for Overlay Networks. [Citation Graph (, )][DBLP]
Virtual networks under attack: disrupting internet coordinate systems. [Citation Graph (, )][DBLP]
Wireless alternative best effort service: a case study of ALM. [Citation Graph (, )][DBLP]
Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent [Citation Graph (, )][DBLP]
De-anonymizing BitTorrent Users on Tor [Citation Graph (, )][DBLP]
Compromising Tor Anonymity Exploiting P2P Information Leakage [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|