# Ahmed A. Zewail

According to our database

Collaborative distances:

^{1}, Ahmed A. Zewail authored at least 34 papers between 2013 and 2020.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### On csauthors.net:

## Bibliography

2020

IEEE Trans. Commun., 2020

2019

IEEE Trans. Commun., 2019

Proceedings of the 20th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2019

Secure Caching and Delivery for Combination Networks with Asymmetric Connectivity.

Proceedings of the 2019 IEEE Information Theory Workshop, 2019

Proceedings of the IEEE International Symposium on Information Theory, 2019

Proceedings of the 2019 IEEE International Conference on Communications, 2019

An Optimization Framework for Secure Delivery in Heterogeneous Coded Caching Systems.

Proceedings of the 53rd Asilomar Conference on Signals, Systems, and Computers, 2019

2018

Combination Networks With or Without Secrecy Constraints: The Impact of Caching Relays.

IEEE J. Sel. Areas Commun., 2018

CoRR, 2018

Proceedings of the 2018 Information Theory and Applications Workshop, 2018

Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Proceedings of the 2018 IEEE International Conference on Communications, 2018

Proceedings of the 52nd Annual Conference on Information Sciences and Systems, 2018

Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018

2017

Multi-Terminal Two-Hop Untrusted-Relay Networks With Hierarchical Security Guarantees.

IEEE Trans. Inf. Forensics Secur., 2017

Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Proceedings of the IEEE International Conference on Communications, 2017

2016

Using network coding to achieve the capacity of deterministic relay networks with relay messages.

Wirel. Commun. Mob. Comput., 2016

IEEE J. Sel. Areas Commun., 2016

Two-Hop Untrusted Relay Channel with an External Eavesdropper under Layered Secrecy Constraints.

Proceedings of the 2016 IEEE Global Communications Conference, 2016

Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Proceedings of the 50th Asilomar Conference on Signals, Systems and Computers, 2016

2015

Using Social Sensors for Influence Propagation in Networks With Positive and Negative Relationships.

IEEE J. Sel. Top. Signal Process., 2015

Proceedings of the 2015 IEEE Information Theory Workshop, 2015

Proceedings of the 49th Asilomar Conference on Signals, Systems and Computers, 2015

2014

Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Proceedings of the IEEE International Conference on Communications, 2014

Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

2013

CoRR, 2013

Proceedings of the 2013 IEEE Information Theory Workshop, 2013

Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013