Mahmoud T. El-Hadidi

According to our database1, Mahmoud T. El-Hadidi authored at least 21 papers between 1995 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Structured Design Approach for an Optimal Programmable Synchronous Security Processor.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

2012
GALS-based LPSP: Performance Analysis of a Novel Architecture for Low Power High Performance Security Processors.
Int. J. Netw. Comput., 2012

Fuzzy-based Adaptive Cross layer Routing Protocol for NET.
Proceedings of IEEE International Conference on Communications, 2012

2011
GALS-Based LPSP: Implementation of a Novel Architecture for Low Power High Performance Security Processors.
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011

Fuzzy-based adaptive cross layer routing protocol for mobile ad hoc networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

2010
Implementing Globally Asynchronous Locally Synchronous processor pipeline on commercial synchronous FPGAs.
Proceedings of the 17th International Conference on Telecommunications, 2010

2005
A Modified Secure Remote Password (SRP) Protocol for Key Initialization and Exchange in Bluetooth Systems.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

2004
Performance Evaluation of Resource Reservation Policies for Rate-Controlled Earliest-Deadline-First Scheduling in Multi-Service Packet Networks.
Telecommun. Syst., 2004

2002
Performance evaluation of resource reservation and call admission policies for deterministic services in PGPS-based packet networks.
Comput. Commun., 2002

A Detection Scheme for the SK Virus.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

2001
Resource Division Policies for EDF Scheduling in ATM Networks.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

2000
Performance Analysis and Estimation of Call Admission Control Parameters in Wireless Integrated Voice and Data Networks.
Eur. Trans. Telecommun., 2000

Performance Evaluation of Resource Division Policies for PGPS Scheduling in ATM Networks.
Proceedings of the NETWORKING 2000, 2000

1999
Local Resource Allocation for Providing End to End Delay Guarantees in ATM Networks Using PGPS Scheduling.
Proceedings of the MASCOTS 1999, 1999

Performance Evaluation of a New Hybrid Encryption Protocol for Authentication and Key Distribution.
Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 1999

Effect of User Mobility on the QoS Parameters for the Guard Channel Policy.
Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 1999

Performance analysis and estimation of call admission policy parameters for multiple traffic classes in wireless ATM networks.
Proceedings of the 1999 IEEE International Conference on Communications: Global Convergence Through Communications, 1999

1997
Structured approach for planning signalling system No.7 networks.
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997

Performance analysis of the Kerberos protocol in a distributed environment.
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997

1996
A new hybrid encryption scheme for computer networks.
Proceedings of the Information Systems Security, 1996

1995
Implementation of a hybrid encryption scheme for Ethernet.
Proceedings of the Proceedings IEEE Symposium on Computers and Communications, 1995


  Loading...