متابعة
Sardaouna Hamadou
Sardaouna Hamadou
INRIA Saclay, LIX École Polytechnique,
بريد إلكتروني تم التحقق منه على polymtl.ca
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Reconciling belief and vulnerability in information flow
S Hamadou, V Sassone, C Palamidessi
2010 IEEE Symposium on Security and Privacy, 79-92, 2010
382010
A flaw in the electronic commerce protocol SET
S Brlek, S Hamadou, J Mullins
Information Processing Letters 97 (3), 104-108, 2006
372006
SMT-based cost optimization approach for the integration of avionic functions in IMA and TTEthernet architectures
S Beji, S Hamadou, A Gherbi, J Mullins
2014 IEEE/ACM 18th International Symposium on Distributed Simulation and …, 2014
322014
A probabilistic energy-aware model for mobile ad-hoc networks
L Gallina, S Hamadou, A Marin, S Rossi
Analytical and Stochastic Modeling Techniques and Applications: 18th …, 2011
272011
Interference-sensitive preorders for manets
M Bugliesi, L Gallina, A Marin, S Rossi, S Hamadou
2012 Ninth International Conference on Quantitative Evaluation of Systems …, 2012
232012
Trust in anonymity networks
V Sassone, S Hamadou, M Yang
CONCUR 2010-Concurrency Theory: 21th International Conference, CONCUR 2010 …, 2010
192010
Behavioural equivalences and interference metrics for mobile ad-hoc networks
M Bugliesi, L Gallina, S Hamadou, A Marin, S Rossi
Performance Evaluation 73, 41-72, 2014
162014
Probable innocence in the presence of independent knowledge
S Hamadou, C Palamidessi, V Sassone, E ElSalamouny
Formal Aspects in Security and Trust: 6th International Workshop, FAST 2009 …, 2010
142010
Trust in Crowds: probabilistic behaviour in anonymity protocols
V Sassone, E ElSalamouny, S Hamadou
International Symposium on Trustworthy Global Computing, 88-102, 2010
102010
Amine El Kouhen, Abdelouahed Gherbi, Sardaouna Hamadou, John Mullins
T Robati
An Extension for AADL to Model Mixed-Criticality Avionic Systems Deployed on …, 2014
9*2014
Quantifying leakage in the presence of unreliable sources of information
S Hamadou, C Palamidessi, V Sassone
Journal of Computer and System Sciences 88, 27-52, 2017
82017
A game-theoretic analysis of cooperation in anonymity networks
M Yang, V Sassone, S Hamadou
Principles of Security and Trust: First International Conference, POST 2012 …, 2012
72012
A framework for throughput and energy efficiency in mobile ad hoc networks
L Gallina, S Hamadou, A Marin, S Rossi
2011 IFIP Wireless Days (WD), 1-6, 2011
62011
An analysis of trust in anonymity networks in the presence of adaptive attackers
S Hamadou, V Sassone, M Yang
Mathematical Structures in Computer Science 25 (2), 429-456, 2015
32015
A Time-Triggered Constraint-Based Calculus for Avionic Systems
S Hamadou, J Mullins, A Gherbi, S Beji
IEEE International Symposium on Object/Component/Service-Oriented Real-Time …, 2015
32015
A probabilistic scheduler for the analysis of cryptographic protocols
S Brlek, S Hamadou, J Mullins
Electronic Notes in Theoretical Computer Science 194 (1), 61-83, 2007
32007
Some remarks on the certificates registration of the electronic commerce protocol set
S Brlek, S Hamadou, J Mullins
Advanced Int'l Conference on Telecommunications and Int'l Conference on …, 2006
32006
Anonymous and secure electronic transaction protocol
S Brlek, S Hamadou, J Mullins
Annals of Telecommunications 5 (60), 530-557, 2005
32005
Iterative integration of TTEthernet network flows
S Beji, S Hamadou, J Mullins, A Gherbi
International Journal of Critical Computer-Based Systems 9 (3), 167-192, 2019
22019
Theoretical information reuse and integration
T Bouabana-Tebibel, SH Rubin
Springer International Publishing, 2016
22016
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20