dblp.uni-trier.dewww.uni-trier.de

Abdelmadjid Bouabdallah Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
38EESinan Hatahet, Yacine Challal, Abdelmadjid Bouabdallah: BitTorrent Worm Sensor Network : P2P Worms Detection and Containment. PDP 2009: 293-300
2008
37EEYacine Challal, Said Gharout, Abdelmadjid Bouabdallah, Hatem Bettahar: Adaptive clustering for scalable key management in dynamic group communications. IJSN 3(2): 133-146 (2008)
2007
36EEH. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Bettahar: A New and Efficient Key Management Scheme for Content Access Control within Tree Hierarchies. AINA Workshops (1) 2007: 551-556
35EEH. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Bettahar, Yacine Challal: Key management for content access control in a hierarchy. Computer Networks 51(11): 3197-3219 (2007)
2006
34EEImed Romdhani, Hatem Bettahar, Abdelmadjid Bouabdallah: Transparent Handover for Mobile Multicast Sources. ICN/ICONS/MCL 2006: 145
33EEImed Romdhani, Jose Munoz, Hatem Bettahar, Abdelmadjid Bouabdallah: Hierarchical Home Agent Architecture for Mobile IP Communications. ISCC 2006: 136-141
32EEYoann Hinard, Hatem Bettahar, Yacine Challal, Abdelmadjid Bouabdallah: Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks. ISCC 2006: 662-667
31EEYoann Hinard, Hatem Bettahar, Yacine Challal, Abdelmadjid Bouabdallah: AAA based security architecture for multicast content distribution. ISCN 2006: 85-90
2005
30EEAbdelouahid Derhab, Nadjib Badache, Abdelmadjid Bouabdallah: A Partition Prediction Algorithm for Service Replication in Mobile Ad Hoc Networks. WONS 2005: 236-245
29EEYacine Challal, Abdelmadjid Bouabdallah, Yoann Hinard: RLH: receiver driven layered hash-chaining for multicast data origin authentication. Computer Communications 28(7): 726-740 (2005)
28EEYacine Challal, Abdelmadjid Bouabdallah, Hatem Bettahar: H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming. Computers & Security 24(1): 57-68 (2005)
27EEMounir Kellil, Imed Romdhani, Hong-Yon Lach, Abdelmadjid Bouabdallah, Hatem Bettahar: Multicast receiver and sender access control and its applicability to mobile IP environments: A survey. IEEE Communications Surveys and Tutorials 7(1-4): 46-70 (2005)
26EEWei Shi, Abdelmadjid Bouabdallah, Pradip K. Srimani: Leader election in oriented star graphs. Networks 45(3): 169-179 (2005)
2004
25EEYacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah: Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication. HSNMC 2004: 1056-1067
24EEDjamel Tandjaoui, Nadjib Badache, Abdelmadjid Bouabdallah: Performance Analysis of Binding Update in Mobile IP during Handoff. HSNMC 2004: 503-511
23EEYacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah: A2cast: an adaptive source authentication protocol for multicast streams. ISCC 2004: 363-368
22EEYacine Challal, Abdelmadjid Bouabdallah, Yoann Hinard: Efficient Multicast Source Authentication using Layered Hash-Chaining Scheme. LCN 2004: 411-412
21EEYacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah: A Scalable and Adaptive Key Management Protocol for Group Communication. WWIC 2004: 260-271
20EEImed Romdhani, Mounir Kellil, Hong-Yon Lach, Abdelmadjid Bouabdallah, Hatem Bettahar: Mobility-Aware Rendezvous Point for Mobile Multicast Sources. WWIC 2004: 62-73
19EEYacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah: SAKM: a scalable and adaptive key management approach for multicast communications. Computer Communication Review 34(2): 55-70 (2004)
18EEImed Romdhani, Mounir Kellil, Hong-Yon Lach, Abdelmadjid Bouabdallah, Hatem Bettahar: IP Mobile multicast: Challenges and solutions. IEEE Communications Surveys and Tutorials 6(1-4): 18-41 (2004)
17EEYacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah: A taxonomy of multicast data origin authentication: Issues and solutions. IEEE Communications Surveys and Tutorials 6(1-4): 34-57 (2004)
16EEHamida Seba, Abdelmadjid Bouabdallah, Nadjib Badache: A new approach to scalable and fault-tolerant group key management protocols. J. High Speed Networks 13(4): 283-296 (2004)
15EEM. Benchaïba, Abdelmadjid Bouabdallah, Nadjib Badache, Mohamed Ahmed-Nacer: Distributed mutual exclusion algorithms in mobile ad hoc networks: an overview. Operating Systems Review 38(1): 74-89 (2004)
2003
14EEDjamel Tandjaoui, Nadjib Badache, Hatem Bettahar, Abdelmadjid Bouabdallah, Hamida Seba: Performance Enhancement of Smooth Handoff in Mobile IP by Reducing Packets Disorder. ISCC 2003: 149-154
13EEAaron Striegel, Abdelmadjid Bouabdallah, Hatem Bettahar, G. Manimaran: EBM: A New Approach for Scalable DiffServ Multicasting. Networked Group Communication 2003: 131-142
12EEHamida Seba, Abdelmadjid Bouabdallah, Nadjib Badache, Hatem Bettahar, Djamel Tandjaoui: Gestion de clés et sécurité multipoint: étude et perspectives. Annales des Télécommunications 58(7-8): 1090-1129 (2003)
2002
11EEHamida Seba, Nadjib Badache, Abdelmadjid Bouabdallah: Solving the consensus problem in a dynamic group: an approach suitable for a mobile environment. ISCC 2002: 327-332
10EEHatem Bettahar, Abdelmadjid Bouabdallah: A new approach for delay-constrained routing. Computer Communications 25(18): 1751-1764 (2002)
2001
9EEHatem Bettahar, Abdelmadjid Bouabdallah: QoS Routing Protocol for the Generalized Multicast Routing Problem (GMRP). ICN (1) 2001: 630-639
8EEHatem Bettahar, Christophe Beaujean, Abdelmadjid Bouabdallah, Stéphane Cateloin: A Simple Resource Reservation Protocol for Multicast Communications. ISCC 2001: 139-144
2000
7EESandeep K. S. Gupta, Abdelmadjid Bouabdallah, Pradip K. Srimani: Self-Stabilizing Protocol for Shortest Path Tree for Multi-cast Routing in Mobile Networks (Research Note). Euro-Par 2000: 600-604
6 Abdelmadjid Bouabdallah, Christian Laforest: A Distributed token/based Algorithm for the Dynamic Resource Allocation Problem. Operating Systems Review 34(3): 60-68 (2000)
1999
5EEHatem Bettahar, Abdelmadjid Bouabdallah: A Scalable Multicast Protocol for Delay-Constrained Shared Multicast Tree Construction. ISCC 1999: 58-64
1995
4EEAbdelmadjid Bouabdallah, Charles Delorme, Selma Djelloul: Edge Deletion Preserving the Diameter of the Hypercube. Discrete Applied Mathematics 63(1): 91-95 (1995)
1994
3 Abdelmadjid Bouabdallah: On Mutual Exclusion in Faulty Distributed Systems. Operating Systems Review 28(1): 80-87 (1994)
1993
2 Abdelmadjid Bouabdallah, Jean-Claude König: An Improvement of the Maekawa's Mutual Exclusion Algorithm to Make it Fault-Tolerant. Parallel Processing Letters 3: 305 (1993)
1992
1 Abdelmadjid Bouabdallah, Jean-Claude König: An Improvement of Maekawa's Mutual Exclusion Algorithm to Make It Fault-Tolerant. Parallel Processing Letters 2: 283-290 (1992)

Coauthor Index

1Mohamed Ahmed-Nacer [15]
2Nadjib Badache [11] [12] [14] [15] [16] [24] [30]
3Christophe Beaujean [8]
4M. Benchaïba [15]
5Hatem Bettahar [5] [8] [9] [10] [12] [13] [14] [17] [18] [19] [20] [21] [23] [25] [27] [28] [31] [32] [33] [34] [35] [36] [37]
6Stéphane Cateloin [8]
7Yacine Challal [17] [19] [21] [22] [23] [25] [28] [29] [31] [32] [35] [37] [38]
8Charles Delorme [4]
9Abdelouahid Derhab [30]
10Selma Djelloul [4]
11Said Gharout [37]
12Sandeep K. S. Gupta [7]
13H. Ragab Hassen [35] [36]
14Sinan Hatahet [38]
15Yoann Hinard [22] [29] [31] [32]
16Mounir Kellil [18] [20] [27]
17Jean-Claude König [1] [2]
18Hong-Yon Lach [18] [20] [27]
19Christian Laforest [6]
20G. Manimaran (Govindarasu Manimaran) [13]
21Jose Munoz [33]
22Imed Romdhani [18] [20] [27] [33] [34]
23Hamida Seba [11] [12] [14] [16]
24Wei Shi [26]
25Pradip K. Srimani [7] [26]
26Aaron Striegel [13]
27Djamel Tandjaoui [12] [14] [24]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)