According to our database1, Sardaouna Hamadou authored at least 21 papers between 2005 and 2017.
Legend:Book In proceedings Article PhD thesis Other
Quantifying leakage in the presence of unreliable sources of information.
J. Comput. Syst. Sci., 2017
A Real-Time Concurrent Constraint Calculus for Analyzing Avionic Systems Embedded in the IMA Connected Through TTEthernet.
Proceedings of the Theoretical Information Reuse and Integration, 2016
An analysis of trust in anonymity networks in the presence of adaptive attackers.
Mathematical Structures in Computer Science, 2015
A Time-Triggered Constraint-Based Calculus for Avionic Systems.
Proceedings of the 2015 IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2015
Specifying Avionic Embedded Systems by Denotations of the Time-Triggered Constraint-Based Calculus.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015
Behavioural equivalences and interference metrics for mobile ad-hoc networks.
Perform. Eval., 2014
An Extension for AADL to Model Mixed-Criticality Avionic Systems Deployed on IMA architectures with TTEthernet.
Proceedings of the First International Workshop on Architecture Centric Virtual Integration co-located with the 17th International Conference on Model Driven Engineering Languages and Systems, 2014
SMT-Based Cost Optimization Approach for the Integration of Avionic Functions in IMA and TTEthernet Architectures.
Proceedings of the 18th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2014
Interference-Sensitive Preorders for MANETs.
Proceedings of the Ninth International Conference on Quantitative Evaluation of Systems, 2012
A Game-Theoretic Analysis of Cooperation in Anonymity Networks.
Proceedings of the Principles of Security and Trust - First International Conference, 2012
A framework for throughput and energy efficiency in mobile ad hoc networks.
Proceedings of the IFIP Wireless Days Conference 2011, 2011
A Probabilistic Energy-Aware Model for Mobile Ad-Hoc Networks.
Proceedings of the Analytical and Stochastic Modeling Techniques and Applications, 2011
Calibrating the power of schedulers for probabilistic polynomial-time calculus.
Journal of Computer Security, 2010
Trust in Crowds: Probabilistic Behaviour in Anonymity Protocols.
Proceedings of the Trustworthly Global Computing - 5th International Symposium, 2010
Reconciling Belief and Vulnerability in Information Flow.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Trust in Anonymity Networks.
Proceedings of the CONCUR 2010 - Concurrency Theory, 21th International Conference, 2010
Probable Innocence in the Presence of Independent Knowledge.
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009
A Probabilistic Scheduler for the Analysis of Cryptographic Protocols.
Electr. Notes Theor. Comput. Sci., 2007
A flaw in the electronic commerce protocol SET.
Inf. Process. Lett., 2006
Some Remarks on the Certificates Registration of the Electronic Commerce Protocol SET.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006
Anonymous and Secure Electronic Transaction protocol.
Annales des Télécommunications, 2005