The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ali Chehab: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab, Hassan Artail
    PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:205-216 [Conf]
  2. Ali Chehab, Rafic Z. Makki, Michael Spica, David Wu
    IDDT Test Methodologies for Very Deep Sub-micron CMOS Circuits. [Citation Graph (0, 0)][DBLP]
    DELTA, 2002, pp:403-407 [Conf]
  3. Najwa Aaraj, Anis Nazer, Ali Chehab, Ayman I. Kayssi
    Transient Current Testing of Dynamic CMOS Circuits. [Citation Graph (0, 0)][DBLP]
    DFT, 2004, pp:264-271 [Conf]
  4. Ghada Derbas, Ayman I. Kayssi, Hassan Artail, Ali Chehab
    TRUMMAR - A Trust Model for Mobile Agent Systems Based on Reputation. [Citation Graph (0, 0)][DBLP]
    ICPS, 2004, pp:113-120 [Conf]
  5. Mohamad Eid, Hassan Artail, Ayman I. Kayssi, Ali Chehab
    Trends in Mobile Agent Applications. [Citation Graph (0, 0)][DBLP]
    Journal of Research and Practice in Information Technology, 2005, v:37, n:4, pp:- [Journal]
  6. Camille Gaspard, Batoul Haidar, Ayman I. Kayssi, Ali Chehab
    SmartSSL: Efficient Policy-Based Web Security. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2007, pp:833-839 [Conf]
  7. Lara Srour, Ayman I. Kayssi, Ali Chehab
    Personalized Web Page Ranking Using Trust and Similarity. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2007, pp:454-457 [Conf]
  8. Wassim Itani, Ayman I. Kayssi, Ali Chehab
    An enterprise policy-based security protocol for protecting relational database network objects. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2006, pp:343-348 [Conf]
  9. Wassim Itani, Camille Gaspard, Ayman I. Kayssi, Ali Chehab
    PRIDE: Policy-Driven Web Security for Handheld Wireless Devices. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  10. Ali Chehab, Saurabh Patel, Rafic Z. Makki
    Scaling of iDDT Test Methods for Random Logic Circuits. [Citation Graph (0, 0)][DBLP]
    J. Electronic Testing, 2006, v:22, n:1, pp:11-22 [Journal]

  11. CATRAC: Context-Aware Trust- and Role-Based Access Control for Composite Web Services. [Citation Graph (, )][DBLP]


  12. A Privacy-Preserving Trust Model for VANETs. [Citation Graph (, )][DBLP]


  13. XPRIDE: Policy-Driven Web Services Security Based on XML Content. [Citation Graph (, )][DBLP]


  14. Mutual Authentication Scheme for EPC Tags-Readers in the Supply Chain. [Citation Graph (, )][DBLP]


  15. Fuzzy reputation-based trust model. [Citation Graph (, )][DBLP]


Search in 0.074secs, Finished in 0.075secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002