Abdallah M'hamed

According to our database1, Abdallah M'hamed authored at least 21 papers between 2003 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Sparse mobile crowdsensing: challenges and opportunities.
IEEE Commun. Mag., 2016

2014
Behavior and Capability Based Access Control Model for Personalized TeleHealthCare Assistance.
Mob. Networks Appl., 2014

2013
Trust-based authentication scheme with user rating for low-resource devices in smart environments.
Pers. Ubiquitous Comput., 2013

A user profile based access control model and architecture
CoRR, 2013

Towards a Context Aware Modeling of Trust and Access Control Based on the User Behavior and Capabilities.
Proceedings of the Inclusive Society: Health and Wellbeing in the Community, and Care at Home, 2013

2011
A Novel Trust-Based Authentication Scheme for Low-Resource Devices in Smart Environments.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

2010
Lightweight PKI for WSN uPKI.
Int. J. Netw. Secur., 2010

A Flexible Privacy and Trust Based Context-Aware Secure Framework.
Proceedings of the Aging Friendly Technology for Health and Independence, 2010

2009
Securing reactive routing protocols in MANETs using PKI (PKI-DSR).
Secur. Commun. Networks, 2009

An on-demand key establishment protocol for MANETs.
Int. J. Wirel. Mob. Comput., 2009

Secured and Trusted Service Provision in Pervasive Environment.
Proceedings of the 5th IEEE International Conference on Wireless and Mobile Computing, 2009

2008
Towards a new user Anonymity Preserving Protocol (APP) for MANETs.
Proceedings of the CRiSIS '08, 2008

Towards a robust privacy and anonymity preserving architecture for ubiquitous computing.
Proceedings of the CRiSIS '08, 2008

2007
Token-based solution to secure PARTY protocol for self - organized networks.
Proceedings of the 9th IFIP International Conference on Mobile Wireless Communications Networks, 2007

A trustworthy framework for impromptu service discovery with mobile devices.
Proceedings of the 4th International Conference on Mobile Technology, 2007

An Authentication Architecture Dedicated to Dependent People in Smart Environments.
Proceedings of the Pervasive Computing for Quality of Life Enhancement, 2007

Data Flow Attack Detection Mechanism for PARTY Protocol.
Proceedings of the Third International Conference on Networking and Services (ICNS 2007), 2007

A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

A Secure Authenticated Key Agreement Protocol For Wireless Security.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2004
Adaptive QoS Management for Regulation of Fairness Among Internet Applications.
Proceedings of the Telecommunications and Networking, 2004

2003
Simulated Internet Traffic Behavior under Different QoS Management Scenarios.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003


  Loading...