Cesar Ghali

Orcid: 0000-0002-5312-7385

According to our database1, Cesar Ghali authored at least 35 papers between 2010 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
In Content We Trust: Network-Layer Trust in Content-Centric Networking.
IEEE/ACM Trans. Netw., 2019

Privacy-Aware Caching in Information-Centric Networking.
IEEE Trans. Dependable Secur. Comput., 2019

2018
Security and Privacy Analysis of National Science Foundation Future Internet Architectures.
IEEE Commun. Surv. Tutorials, 2018

2017
Mitigating On-Path Adversaries in Content-Centric Networks.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Closing the Floodgate with Stateless Content-Centric Networking.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

When encryption is not enough: privacy attacks in content-centric networking.
Proceedings of the 4th ACM Conference on Information-Centric Networking, 2017

2016
Security and Privacy Issues in Content-Centric Networking.
PhD thesis, 2016

Security and Privacy Analysis of NSF Future Internet Architectures.
CoRR, 2016

(The Futility of) Data Privacy in Content-Centric Networking.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

Practical accounting in content-centric networking.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

BEAD: Best effort autonomous deletion in content-centric networking.
Proceedings of the 2016 IFIP Networking Conference, 2016

Network Names in Content-Centric Networking.
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016

2015
Practical Accounting in Content-Centric Networking (extended version).
CoRR, 2015

Living in a PIT-less World: A Case Against Stateful Forwarding in Content-Centric Networking.
CoRR, 2015

Interest-Based Access Control for Content Centric Networks (extended version).
CoRR, 2015

To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking.
CoRR, 2015

G-Route: an energy-aware service routing protocol for green cloud computing.
Clust. Comput., 2015

Secure Fragmentation for Content-Centric Networks.
Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, 2015

Interest-Based Access Control for Content Centric Networks.
Proceedings of the 2nd International Conference on Information-Centric Networking, 2015

2014
ServBGP: BGP-inspired autonomic service routing for multi-provider collaborative architectures in the cloud.
Future Gener. Comput. Syst., 2014

Elements of Trust in Named-Data Networking.
CoRR, 2014

Secure Fragmentation for Content-Centric Networks.
CoRR, 2014

Network-Layer Trust in Named-Data Networking.
Comput. Commun. Rev., 2014

2013
Cache Privacy in Named-Data Networking.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Accountable energy monitoring for green service routing in the cloud.
Proceedings of the Third International Conference on Communications and Information Technology, 2013

2012
BGP-inspired autonomic service routing for the cloud.
Proceedings of the ACM Symposium on Applied Computing, 2012

Security analysis and solution for thwarting cache poisoning attacks in the Domain Name System.
Proceedings of the 19th International Conference on Telecommunications, 2012

2011
Matryoshka: Tunneled packets breaking the rules.
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011

Secure delay-tolerant communications in the presence of oppressive governments.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

CloudESE: Energy efficiency model for cloud computing environments.
Proceedings of the International Conference on Energy Aware Computing, 2011

Dynamic Cooperative Positioning.
Proceedings of the European Wireless 2011, April 27-29, 2011, Vienna, Austria., 2011

MAConf: Passive layer-2 detection mechanism for mobile wireless sensor networks.
Proceedings of the Distributed Computing in Sensor Systems, 2011

Accountable Reputation Ranking Schemes for Service Providers in Cloud Computing.
Proceedings of the CLOSER 2011, 2011

2010
SinPack: A Security Protocol for Preventing Pollution Attacks in Network-Coded Content Distribution Networks.
Proceedings of the Global Communications Conference, 2010

CATRAC: Context-Aware Trust- and Role-Based Access Control for Composite Web Services.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010


  Loading...