Imad Aad

According to our database1, Imad Aad authored at least 36 papers between 2000 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Authentication and Trust in Service-Centric Networking.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

2015
BitWorker, a Decentralized Distributed Computing System Based on BitTorrent.
Proceedings of the Wired/Wireless Internet Communications - 13th International Conference, 2015

2014
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2014

2013
E-MAC: an elastic MAC layer for IEEE 802.11 networks.
Wirel. Commun. Mob. Comput., 2013

From big smartphone data to worldwide research: The Mobile Data Challenge.
Pervasive Mob. Comput., 2013

Privacy Panel: Usable and Quantifiable Mobile Privacy.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Big Brother Knows Your Friends: On Privacy of Social Communities in Pervasive Networks.
Proceedings of the Pervasive Computing - 10th International Conference, 2012

Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
Meetings through the cloud: Privacy-preserving scheduling on mobile devices.
J. Syst. Softw., 2011

Reclaiming Privacy for Smartphone Applications.
IACR Cryptol. ePrint Arch., 2011

Privacy-triggered communications in pervasive social networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Privacy in Mobile Computing for Location-Sharing-Based Services.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Privacy-preserving activity scheduling on mobile devices.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
On the side effects of packet detection sensitivity in IEEE 802.11 interference management.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

2009
Merx: Secure and Privacy Preserving Delegated Payments.
Proceedings of the Trusted Computing, 2009

Analyzing space/capacity tradeoffs of cooperative wireless networks using a probabilistic model of interference.
Proceedings of the 12th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2009

Rate-Per-Link Adaptation in Cooperative Wireless Networks with Multi-Rate Combining.
Proceedings of IEEE International Conference on Communications, 2009

2008
Impact of denial of service attacks on ad hoc networks.
IEEE/ACM Trans. Netw., 2008

Increasing the Capacity of IEEE 802.11 Wireless LAN through Cooperative Coded Retransmissions.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

Opportunistic relaying vs. selective cooperation: analyzing the occurrence-conditioned outage capacity.
Proceedings of the 11th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2008

Design and Evaluation of a Routing-Informed Cooperative MAC Protocol for Ad Hoc Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

2007
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks.
IEEE J. Sel. Areas Commun., 2007

E-MAC: Self-Organizing 802.11-Compatible MAC with Elastic Real-time Scheduling.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

2006
DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots.
IEEE Trans. Mob. Comput., 2006

Packet Coding for Strong Anonymity in Ad Hoc Networks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Lo~w-Comp-lexity Beamforming Techniques for Wireless Multihop Networks.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006

2005
Enhancing IEEE 802.11 MAC in congested environments.
Comput. Commun., 2005

On selfish behavior in CSMA/CA networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

2004
DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots.
Proceedings of the Second International Conference on Mobile Systems, 2004

Denial of service resilience in ad hoc networks.
Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, 2004

2003
Priorities in WLANs.
Comput. Networks, 2003

EnhancingIEEE 802.11 performance in congested environments.
Ann. des Télécommunications, 2003

Modeling and analysis of slow CW decrease IEEE 802.11 WLAN.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

2002
Quality of service in wireless local area networks. (Qualité de service dans les réseaux locaux sans-fil).
PhD thesis, 2002

2001
Differentiation Mechanisms for IEEE 802.11.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

2000
Introducing Service Differentiation into IEEE 802.11.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000


  Loading...