Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Mohamed Salah Bouassida"'
Autor:
Mohamed Salah Bouassida, M. Shawky
Publikováno v:
EURASIP Journal on Wireless Communications and Networking, Vol 2010 (2010)
The main objective of congestion control is to best exploit the available network resources while preventing sustained overloads of network nodes and links. Appropriate congestion control mechanisms are essential to provide effcient operation of a ne
Externí odkaz:
https://doaj.org/article/7f48b95f429d4f51abb2e07f632062ae
Publikováno v:
Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::91b0341736378f802d1da21b848a9631
https://doi.org/10.1002/9780470611883.ch14
https://doi.org/10.1002/9780470611883.ch14
Autor:
Isabelle Chrisment, Laurent Vigneron, S. Mota, P. de Saqui-Sannes, Mohamed Salah Bouassida, Benjamin Fontan, Najah Chridi, Thierry Villemur
Publikováno v:
Innovations in Systems and Software Engineering
Innovations in Systems and Software Engineering, Springer Verlag, 2010, Special Issue ICFEM'09, 6 (1-2), pp.125-133. ⟨10.1007/s11334-010-0122-3⟩
Innovations in Systems and Software Engineering, 2010, Special Issue ICFEM'09, 6 (1-2), pp.125-133. ⟨10.1007/s11334-010-0122-3⟩
Innovations in Systems and Software Engineering, Springer Verlag, 2010, Special Issue ICFEM'09, 6 (1-2), pp.125-133. ⟨10.1007/s11334-010-0122-3⟩
Innovations in Systems and Software Engineering, 2010, Special Issue ICFEM'09, 6 (1-2), pp.125-133. ⟨10.1007/s11334-010-0122-3⟩
International audience; The paper discusses an experience in using Unified Modelling Language and two complementary verification tools in the framework of SAFECAST, a project on secured group communication systems design. AVISPA enabled detecting and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6f2e68665ef3563ed4a0768b42890899
https://hal.inria.fr/inria-00594387
https://hal.inria.fr/inria-00594387
Publikováno v:
ITS-T: International Conference on ITS Telecommunications
ITS-T: International Conference on ITS Telecommunications, 2009, France
ITS-T: International Conference on ITS Telecommunications, 2009, France
Appropriate congestion control mechanisms are essential to maintain the efficient operation of a network. Ensuring congestion control within vehicular ad hoc networks address special challenges, due to the characteristic and specificities of such env
Publikováno v:
Vehicular Networks: Techniques, Standards, and Applications
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1a9d4a97d45b0039f8d0b9019aad24b0
https://doi.org/10.1201/9781420085723.ch8
https://doi.org/10.1201/9781420085723.ch8
Publikováno v:
PM2HW2N: ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks (MSWIM)
PM2HW2N: ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks
PM2HW2N: ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, 2009, Spain
PM2HW2N@MSWiM
PM2HW2N: ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks
PM2HW2N: ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, 2009, Spain
PM2HW2N@MSWiM
The basic objective of congestion control is to best exploit the available network resources while preventing sustained overloads of network nodes and links. Ensuring congestion control within vehicular ad hoc networks address special challenges, due
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8d770cdd0f12d240a713cfcfc68bc8a4
https://hal.archives-ouvertes.fr/hal-00447660
https://hal.archives-ouvertes.fr/hal-00447660
Publikováno v:
International journal of network security
International journal of network security, Femto Technology, 2008, Volume 6 (Numéro 1), pp. 67-79
HAL
International journal of network security, 2008, Volume 6 (Numéro 1), pp. 67-79
International journal of network security, Femto Technology, 2008, Volume 6 (Numéro 1), pp. 67-79
HAL
International journal of network security, 2008, Volume 6 (Numéro 1), pp. 67-79
International audience; Specific applications like military or public emergency ones require secure group communication in ad hoc environments. The most suitable solution to provide the expected level of security to these services is the provision of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::10eedbcdf6970feb9cf945b5fd02455e
https://hal.inria.fr/inria-00167843
https://hal.inria.fr/inria-00167843
Publikováno v:
Annals of Telecommunications-annales des télécommunications
Annals of Telecommunications-annales des télécommunications, Springer, 2007, 62 (11-12), pp.1365-1387
Annals of Telecommunications-annales des télécommunications, 2007, 62 (11-12), pp.1365-1387. ⟨10.1007/BF03253324⟩
HAL
Annals of Telecommunications-annales des télécommunications, Springer, 2007, 62 (11-12), pp.1365-1387
Annals of Telecommunications-annales des télécommunications, 2007, 62 (11-12), pp.1365-1387. ⟨10.1007/BF03253324⟩
HAL
International audience; Emerging applications require secure group communications involving hierarchical architecture protocols. Designing such secure hierarchical protocols is not straightforward, and their verification becomes a major issue in orde
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fc8a7cb45513edd3747fee5798e1d934
https://hal.inria.fr/inria-00594389
https://hal.inria.fr/inria-00594389
Publikováno v:
La sécurité dans les réseaux sans fil et mobiles
Hermes science. La sécurité dans les réseaux sans fil et mobiles, volume 3, Lavoisier, pp.139-181, 2007, Réseaux et Télécoms IC2, 978-2-7462-1699-0
HAL
Hermes science. La sécurité dans les réseaux sans fil et mobiles, volume 3, Lavoisier, pp.139-181, 2007, Réseaux et Télécoms IC2, 978-2-7462-1699-0
HAL
International audience; Les réseaux ad hoc constituent un pilier de l'informatique ambiante ou ubiquitaire qui peut être définie comme une informatique mobile et embarquée offrant des ressources partout et à tout moment et permettant aux objets
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::0320df3cc3388db5e8434236ee3af288
https://hal.inria.fr/inria-00167822
https://hal.inria.fr/inria-00167822
Publikováno v:
ICN/ICONS/MCL
5th International Conference on Networking-ICN 2006
5th International Conference on Networking-ICN 2006, Apr 2006, Ile maurice, pp.64
HAL
5th International Conference on Networking-ICN 2006
5th International Conference on Networking-ICN 2006, Apr 2006, Ile maurice, pp.64
HAL
In this paper, we present an efficient clustering scheme for application level multicast key distribution in mobile ad hoc networks. We show how our scheme can be combined with the Multipoint Relaying technique, in a very effective way, according to