Basel Alomair
Orcid: 0000-0002-0494-2586
According to our database1,
Basel Alomair
authored at least 51 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the Computer Security - ESORICS 2024, 2024
2019
IEEE Trans. Autom. Control., 2019
2018
IEEE Trans. Control. Netw. Syst., 2018
IEEE Trans. Control. Netw. Syst., 2018
2017
IEEE Wirel. Commun., 2017
Toward Synchronization in Networks With Nonlinear Dynamics: A Submodular Optimization Framework.
IEEE Trans. Autom. Control., 2017
Input Selection for Performance and Controllability of Structured Linear Descriptor Systems.
SIAM J. Control. Optim., 2017
2016
The Diversity-Multiplexing Tradeoff of Secret-Key Agreement Over Multiple Antenna Channels.
IEEE Trans. Wirel. Commun., 2016
Achievable Rates of Secure Transmission in Gaussian MISO Channel With Imperfect Main Channel Estimation.
IEEE Trans. Wirel. Commun., 2016
On the Ergodic Secret-Key Agreement Over Spatially Correlated Multiple-Antenna Channels With Public Discussion.
IEEE Trans. Signal Process., 2016
Secur. Commun. Networks, 2016
IEEE Commun. Lett., 2016
The MISO Wiretap Channel with Noisy Main Channel Estimation in the High Power Regime.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016
Distributed adaptive patching strategies against malware propagation: A passivity approach.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016
2015
Proceedings of the 13th International Symposium on Modeling and Optimization in Mobile, 2015
Secret-key agreement over spatially correlated fast-fading multiple-antenna channels with public discussion.
Proceedings of the IEEE International Symposium on Information Theory, 2015
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015
Secret-key agreement over spatially correlated multiple-antenna channels in the low-SNR regime.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 54th IEEE Conference on Decision and Control, 2015
Proceedings of the 54th IEEE Conference on Decision and Control, 2015
Proceedings of the American Control Conference, 2015
2014
IEEE Trans. Mob. Comput., 2014
IEEE Trans. Computers, 2014
Minimizing Convergence Error in Multi-Agent Systems Via Leader Selection: A Supermodular Optimization Approach.
IEEE Trans. Autom. Control., 2014
Global Practical Node and Edge Synchronization in Kuramoto Networks: A Submodular Optimization Framework.
CoRR, 2014
Proceedings of the 12th International Symposium on Modeling and Optimization in Mobile, 2014
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014
On the secrecy capacity of the MISO wiretap channel under imperfect channel estimation.
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
2013
IEEE Trans. Mob. Comput., 2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
2012
Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification.
IEEE Trans. Parallel Distributed Syst., 2012
Optimized flow allocation for anonymous communication in multipath wireless networks.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
Proceedings of the 51th IEEE Conference on Decision and Control, 2012
Proceedings of the 50th Annual Allerton Conference on Communication, 2012
2011
J. Comput. Secur., 2011
2010
The power of primes: security of authentication based on a universal hash-function family.
J. Math. Cryptol., 2010
Comput. Commun., 2010
$\mathcal{E}$ -MACs: Towards More Secure and More Efficient Constructions of Secure Channels.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Proceedings of the Global Communications Conference, 2010
2009
J. Univers. Comput. Sci., 2009
Unconditionally Secure Authenticated Encryption with Shorter Keys.
Proceedings of the Security in Information Systems, 2009
2008
Proceedings of the NTMS 2008, 2008
Proceedings of the Public Key Infrastructure, 2008
2007
Proceedings of the Information Security and Cryptology, 2007