Sardaouna Hamadou

According to our database1, Sardaouna Hamadou authored at least 21 papers between 2005 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Quantifying leakage in the presence of unreliable sources of information.
J. Comput. Syst. Sci., 2017

A Real-Time Concurrent Constraint Calculus for Analyzing Avionic Systems Embedded in the IMA Connected Through TTEthernet.
Proceedings of the Theoretical Information Reuse and Integration, 2016

An analysis of trust in anonymity networks in the presence of adaptive attackers.
Mathematical Structures in Computer Science, 2015

A Time-Triggered Constraint-Based Calculus for Avionic Systems.
Proceedings of the 2015 IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2015

Specifying Avionic Embedded Systems by Denotations of the Time-Triggered Constraint-Based Calculus.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

Behavioural equivalences and interference metrics for mobile ad-hoc networks.
Perform. Eval., 2014

An Extension for AADL to Model Mixed-Criticality Avionic Systems Deployed on IMA architectures with TTEthernet.
Proceedings of the First International Workshop on Architecture Centric Virtual Integration co-located with the 17th International Conference on Model Driven Engineering Languages and Systems, 2014

SMT-Based Cost Optimization Approach for the Integration of Avionic Functions in IMA and TTEthernet Architectures.
Proceedings of the 18th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2014

Interference-Sensitive Preorders for MANETs.
Proceedings of the Ninth International Conference on Quantitative Evaluation of Systems, 2012

A Game-Theoretic Analysis of Cooperation in Anonymity Networks.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

A framework for throughput and energy efficiency in mobile ad hoc networks.
Proceedings of the IFIP Wireless Days Conference 2011, 2011

A Probabilistic Energy-Aware Model for Mobile Ad-Hoc Networks.
Proceedings of the Analytical and Stochastic Modeling Techniques and Applications, 2011

Calibrating the power of schedulers for probabilistic polynomial-time calculus.
Journal of Computer Security, 2010

Trust in Crowds: Probabilistic Behaviour in Anonymity Protocols.
Proceedings of the Trustworthly Global Computing - 5th International Symposium, 2010

Reconciling Belief and Vulnerability in Information Flow.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Trust in Anonymity Networks.
Proceedings of the CONCUR 2010 - Concurrency Theory, 21th International Conference, 2010

Probable Innocence in the Presence of Independent Knowledge.
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009

A Probabilistic Scheduler for the Analysis of Cryptographic Protocols.
Electr. Notes Theor. Comput. Sci., 2007

A flaw in the electronic commerce protocol SET.
Inf. Process. Lett., 2006

Some Remarks on the Certificates Registration of the Electronic Commerce Protocol SET.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

Anonymous and Secure Electronic Transaction protocol.
Annales des Télécommunications, 2005