Daouda Ahmat

According to our database1, Daouda Ahmat authored at least 18 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Technologies Behind the Humanitarian Demining: A Review.
Proceedings of the International Conference on Smart Applications, 2024

2023
Latest Generation Technologies for Network Coverage in Infrastructure-Less Areas.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

2022
Disjoint Routing Algorithms: A Systematic Literature Review.
Proceedings of the Towards new e-Infrastructure and e-Services for Developing Countries, 2022

Virtual Fences: A Systematic Literature Review.
Proceedings of the Towards new e-Infrastructure and e-Services for Developing Countries, 2022

2019
Multipath Key Exchange Scheme Based on the Diffie-Hellman Protocol and the Shamir Threshold.
Int. J. Netw. Secur., 2019

2018
A Survey on Secure and Resilient Session Schemes: Technical Comparison and Assessment.
EAI Endorsed Trans. Ubiquitous Environ., 2018

Secure, Transparent and Uniform Mobile Money for Internet-Underserved Areas Using Sporadically-Synchronized Blockchain.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2018

2017
Blockchain Consensus Protocols - Towards a Review of Practical Constraints for Implementation in Developing Countries.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2017

2016
SEMOS: A Middleware for Providing Secure and Mobility-Aware Sessions over a P2P Overlay Network.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2016

Mobile VPN Schemes: Technical Analysis and Experiments.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2016

2015
End-to-End Key Exchange through Disjoint Paths in P2P Networks.
EAI Endorsed Trans. Security Safety, 2015

Vulnerabilities of Government Websites in a Developing Country - the Case of Burkina Faso.
Proceedings of the e-Infrastructure and e-Services - 7th International Conference, 2015

2014
Évaluation de la fiabilité d'une table de hachage distribuée construite dans un plan hyperbolique.
Tech. Sci. Informatiques, 2014

Bootstrapping Software Engineering Training in Developing Countries - Return on Experience at the University of Ouagadougou.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2014

2013
Sustainable ICT4D in Africa: Where Do We Go from Here?
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2013

Towards Securing Communications in Infrastructure-Poor Areas.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2013

2012
MUSeS: Mobile User Secured Session.
Proceedings of the IFIP Wireless Days Conference 2012, Ireland, November 21-23, 2012, 2012

Reliable and Scalable Distributed Hash Tables Harnessing Hyperbolic Coordinates.
Proceedings of the 5th International Conference on New Technologies, 2012


  Loading...