Abdelmadjid Bouabdallah

According to our database1, Abdelmadjid Bouabdallah
  • authored at least 123 papers between 1992 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Adaptive and dual data-communication trust scheme for clustered wireless sensor networks.
Telecommunication Systems, 2017

A survey of energy-efficient context recognition systems using wearable sensors for healthcare applications.
Pervasive and Mobile Computing, 2017

A trust-based approach for securing data communication in delay tolerant networks.
IJICS, 2017

Energy-efficient mechanisms in security of the internet of things: A survey.
Computer Networks, 2017

Immediate Attribute Revocation in Decentralized Attribute-Based Encryption Access Control.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Towards authenticated network coding for named data networking.
Proceedings of the 25th International Conference on Software, 2017

ABR: A new efficient attribute based revocation on access control system.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Providing Collision-Free and Conflict-Free Communication in General Synchronous Broadcast/Receive Networks.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Lightweight Sharing Scheme for Data Integrity Protection in WSNs.
Wireless Personal Communications, 2016

Game Theory Framework for MAC Parameter Optimization in Energy-Delay Constrained Sensor Networks.
TOSN, 2016

Lightweight identity-based authentication protocol for wireless sensor networks.
IJICS, 2016

Healing on the cloud: Secure cloud architecture for medical wireless sensor networks.
Future Generation Comp. Syst., 2016

M2M Security: Challenges and Solutions.
IEEE Communications Surveys and Tutorials, 2016

Reliable and energy aware query-driven routing protocol for wireless sensor networks.
Annales des Télécommunications, 2016

Efficient QoS-aware heterogeneous architecture for energy-delay constrained connected objects.
Proceedings of the 9th IFIP Wireless and Mobile Networking Conference, 2016

TAS-IoT: Trust-Based Adaptive Security in the IoT.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

2015
Joint Connectivity-Coverage Temperature-Aware Algorithms for Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2015

Key Pre-Distributions From Graph-Based Block Designs.
CoRR, 2015

Trusted Execution Environment: What It is, and What It is Not.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

ETTAF: Efficient Target Tracking and Filming with a Flying Ad Hoc Network.
Proceedings of the 1st International Workshop on Experiences with the Design and Implementation of Smart Objects, 2015

Temperature MAC plug-in for large scale WSN.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Towards Integrating Trusted Execution Environment into Embedded Autonomic Systems.
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015

Adaptive Data-Communication Trust Mechanism for Clustered Wireless Sensor Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Scalable Multi-group Key Management for Advanced Metering Infrastructure.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Synchronous contention-based MAC protocols for delay-sensitive wireless sensor networks: A review and taxonomy.
J. Network and Computer Applications, 2014

Efficient QoS provisioning at the MAC layer in heterogeneous wireless sensor networks.
Computer Communications, 2014

Energy efficiency in wireless sensor networks: A top-down survey.
Computer Networks, 2014

Energy-efficient architecture for wearable sensor networks.
Proceedings of the 2014 IFIP Wireless Days, 2014

MSR: Minimum-Stop Recharging Scheme for Wireless Rechargeable Sensor Networks.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

Context-aware energy-efficient wireless sensor architecture for body activity recognition.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

2013
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks.
IEEE Trans. Wireless Communications, 2013

Wireless sensor networks for rehabilitation applications: Challenges and opportunities.
J. Network and Computer Applications, 2013

Temperature-Aware Density Optimization for Low Power Wireless Sensor Networks.
IEEE Communications Letters, 2013

A new class of Hash-Chain based key pre-distribution schemes for WSN.
Computer Communications, 2013

Multi-hop wireless charging optimization in low-power networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

WSN lifetime optimization through controlled sink mobility and packet buffering.
Proceedings of the Global Information Infrastructure Symposium, 2013

A Systemic Approach for IoT Security.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013

Reliability for Emergency Applications in Internet of Things.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013

Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Braided Disjoint Branch Routing Protocol for WSNs.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

A Study of Wireless Sensor Networks for Urban Traffic Monitoring: Applications and Architectures.
Proceedings of the 4th International Conference on Ambient Systems, 2013

2012
A study of Wireless Sensor Network Architectures and Projects for Traffic Light Monitoring.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Adaptive Group Key Management Protocol for Wireless Communications.
J. UCS, 2012

Certification-based trust models in mobile ad hoc networks: A survey and taxonomy.
J. Network and Computer Applications, 2012

An efficient key management scheme for content access control for linear hierarchies.
Computer Networks, 2012

Fast Restoration of Connectivity for Wireless Sensor Networks.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networking, 2012

A new adaptive MAC protocol with QoS support for heterogeneous wireless sensor networks.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

Slotted contention-based energy-efficient MAC protocols in delay-sensitive wireless sensor networks.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

A new weighted shortest path tree for convergecast traffic routing in WSN.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

Secure and Scalable Cloud-Based Architecture for e-Health Wireless Sensor Networks.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

A New Scalable Key Pre-Distribution Scheme for WSN.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

2011
A new Application-Level Multicast technique for stable, robust and efficient overlay tree construction.
Computer Networks, 2011

Rehabilitation supervision using wireless sensor networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Toward a high-fidelity wireless sensor network for rehabilitation supervision.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

On QoS Provisioning in Context-Aware Wireless Sensor Networks for Healthcare.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

2010
A new worm propagation threat in BitTorrent: modeling and analysis.
Telecommunication Systems, 2010

Key management with host mobility in dynamic groups.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

HDMRP: An Efficient Fault-Tolerant Multipath Routing Protocol for Heterogeneous Wireless Sensor Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010

An efficient and highly resilient key management scheme for wireless sensor networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

A cross-layer reputation system for routing non-cooperation effects mitigation within hybrid ad-hoc networks.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

BiTIT: Throttling BitTorrent illegal traffic.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Enhancing resilience of probabilistic key pre-distribution schemes for WSNs through hash chaining.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
The Topology Change Attack: Threat and Impact.
J. UCS, 2009

TKS: a transition key management scheme for secure application level multicast.
IJSN, 2009

Reliable and fully distributed trust model for mobile ad hoc networks.
Computers & Security, 2009

BitTorrent Worm Sensor Network : P2P Worms Detection and Containment.
Proceedings of the 17th Euromicro International Conference on Parallel, 2009

2008
Adaptive clustering for scalable key management in dynamic group communications.
IJSN, 2008

Scalable Delay-constrained Multicast Group Key Management.
I. J. Network Security, 2008

On security issues in embedded systems: challenges and solutions.
IJICS, 2008

A new worm propagation threat in BitTorrent: Modeling and analysis.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008

HERO: Hierarchical kEy management pRotocol for heterOgeneous wireless sensor networks.
Proceedings of the Wireless Sensor and Actor Networks II, 2008

Impact of Cheating and Non-Cooperation on the Stability and the Performances of Application-Level Multicast Sessions.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Key management for content access control in a hierarchy.
Computer Networks, 2007

NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

A New and Efficient Key Management Scheme for Content Access Control within Tree Hierarchies.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Adaptive Multicast Membership Management for Mobile Multicast Receivers.
Proceedings of the 2006 IEEE International Conference on Wireless and Mobile Computing, 2006

S-DV: A new approach to Secure Distance Vector routing protocols.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

AAA based security architecture for multicast content distribution.
Proceedings of the International Symposium on Computer Networks, 2006

Hierarchical Home Agent Architecture for Mobile IP Communications.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

Transparent Handover for Mobile Multicast Sources.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Mobile Multicast Route Optimisation.
Proceedings of IEEE International Conference on Communications, 2006

2005
Leader election in oriented star graphs.
Networks, 2005

Multicast receiver and sender access control and its applicability to mobile IP environments: A survey.
IEEE Communications Surveys and Tutorials, 2005

H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming.
Computers & Security, 2005

RLH: receiver driven layered hash-chaining for multicast data origin authentication.
Computer Communications, 2005

A Partition Prediction Algorithm for Service Replication in Mobile Ad Hoc Networks.
Proceedings of the 2nd International Conference on Wireless on Demand Network Systems and Service (WONS 2005), 2005

An Efficient Key Management Algorithm for Hierarchical Group Communication.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

2004
Distributed mutual exclusion algorithms in mobile ad hoc networks: an overview.
Operating Systems Review, 2004

A new approach to scalable and fault-tolerant group key management protocols.
J. High Speed Networks, 2004

IP Mobile multicast: Challenges and solutions.
IEEE Communications Surveys and Tutorials, 2004

A taxonomy of multicast data origin authentication: Issues and solutions.
IEEE Communications Surveys and Tutorials, 2004

SAKM: a scalable and adaptive key management approach for multicast communications.
Computer Communication Review, 2004

Mobility-Aware Rendezvous Point for Mobile Multicast Sources.
Proceedings of the Wired/Wireless Internet Communications, Second International Conference, 2004

A Scalable and Adaptive Key Management Protocol for Group Communication.
Proceedings of the Wired/Wireless Internet Communications, Second International Conference, 2004

Efficient Multicast Source Authentication using Layered Hash-Chaining Scheme.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

A2cast: an adaptive source authentication protocol for multicast streams.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

Performance Analysis of Binding Update in Mobile IP during Handoff.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

2003
Gestion de clés et sécurité multipoint: étude et perspectives.
Annales des Télécommunications, 2003

EBM: A New Approach for Scalable DiffServ Multicasting.
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003

Performance Enhancement of Smooth Handoff in Mobile IP by Reducing Packets Disorder.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Increasing the robustness of initial key agreement using failure detectors.
Proceedings of the Global Telecommunications Conference, 2003

2002
A new approach for delay-constrained routing.
Computer Communications, 2002

GMRP: problème généralisé de routage multipoint.
Annales des Télécommunications, 2002

Solving the consensus problem in a dynamic group: an approach suitable for a mobile environment.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

AKMP: an adaptive key management protocol for secure multicast.
Proceedings of the 11th International Conference on Computer Communications and Networks, 2002

2001
A Simple Resource Reservation Protocol for Multicast Communications.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

QoS Routing Protocol for the Generalized Multicast Routing Problem (GMRP).
Proceedings of the Networking, 2001

2000
A Distributed token/based Algorithm for the Dynamic Resource Allocation Problem.
Operating Systems Review, 2000

A simple resource reservation protocol for the Internet.
Proceedings of the Proceedings Ninth International Conference on Computer Communications and Networks, 2000

Self-Stabilizing Protocol for Shortest Path Tree for Multi-cast Routing in Mobile Networks (Research Note).
Proceedings of the Euro-Par 2000, Parallel Processing, 6th International Euro-Par Conference, Munich, Germany, August 29, 2000

1999
A Distributed Algorithm for Constructing an Eulerian Cycle in Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

A Scalable Multicast Protocol for Delay-Constrained Shared Multicast Tree Construction.
Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 1999

1998
Embedding Complete Binary Trees Into Star and Pancake Graphs.
Theory Comput. Syst., 1998

1997
A Distributed Algorithm for Finding an Eulerian Cycle in Networks.
Proceedings of the IASTED International Conference on Parallel and Distributed Systems, 1997

1995
Edge Deletion Preserving the Diameter of the Hypercube.
Discrete Applied Mathematics, 1995

1994
On Mutual Exclusion in Faulty Distributed Systems.
Operating Systems Review, 1994

Embedding Complete Binary Trees into Star Networks.
Proceedings of the Mathematical Foundations of Computer Science 1994, 1994

1993
An Improvement of the Maekawa's Mutual Exclusion Algorithm to Make it Fault-Tolerant.
Parallel Processing Letters, 1993

On the edge forwarding index problem for small graphs.
Networks, 1993

1992
An Improvement of Maekawa's Mutual Exclusion Algorithm to Make It Fault-Tolerant.
Parallel Processing Letters, 1992


  Loading...