Reconciling belief and vulnerability in information flow S Hamadou, V Sassone, C Palamidessi 2010 IEEE Symposium on Security and Privacy, 79-92, 2010 | 38 | 2010 |
A flaw in the electronic commerce protocol SET S Brlek, S Hamadou, J Mullins Information Processing Letters 97 (3), 104-108, 2006 | 37 | 2006 |
SMT-based cost optimization approach for the integration of avionic functions in IMA and TTEthernet architectures S Beji, S Hamadou, A Gherbi, J Mullins 2014 IEEE/ACM 18th International Symposium on Distributed Simulation and …, 2014 | 32 | 2014 |
A probabilistic energy-aware model for mobile ad-hoc networks L Gallina, S Hamadou, A Marin, S Rossi Analytical and Stochastic Modeling Techniques and Applications: 18th …, 2011 | 28 | 2011 |
Interference-sensitive preorders for manets M Bugliesi, L Gallina, A Marin, S Rossi, S Hamadou 2012 Ninth International Conference on Quantitative Evaluation of Systems …, 2012 | 24 | 2012 |
Trust in anonymity networks V Sassone, S Hamadou, M Yang CONCUR 2010-Concurrency Theory: 21th International Conference, CONCUR 2010 …, 2010 | 19 | 2010 |
Behavioural equivalences and interference metrics for mobile ad-hoc networks M Bugliesi, L Gallina, S Hamadou, A Marin, S Rossi Performance Evaluation 73, 41-72, 2014 | 16 | 2014 |
Probable innocence in the presence of independent knowledge S Hamadou, C Palamidessi, V Sassone, E ElSalamouny Formal Aspects in Security and Trust: 6th International Workshop, FAST 2009 …, 2010 | 14 | 2010 |
Trust in Crowds: probabilistic behaviour in anonymity protocols V Sassone, E ElSalamouny, S Hamadou International Symposium on Trustworthy Global Computing, 88-102, 2010 | 10 | 2010 |
Amine El Kouhen, Abdelouahed Gherbi, Sardaouna Hamadou, John Mullins T Robati An Extension for AADL to Model Mixed-Criticality Avionic Systems Deployed on …, 2014 | 9* | 2014 |
Quantifying leakage in the presence of unreliable sources of information S Hamadou, C Palamidessi, V Sassone Journal of Computer and System Sciences 88, 27-52, 2017 | 8 | 2017 |
A game-theoretic analysis of cooperation in anonymity networks M Yang, V Sassone, S Hamadou Principles of Security and Trust: First International Conference, POST 2012 …, 2012 | 7 | 2012 |
A framework for throughput and energy efficiency in mobile ad hoc networks L Gallina, S Hamadou, A Marin, S Rossi 2011 IFIP Wireless Days (WD), 1-6, 2011 | 6 | 2011 |
Theoretical information reuse and integration T Bouabana-Tebibel, SH Rubin Springer International Publishing, 2016 | 3 | 2016 |
An analysis of trust in anonymity networks in the presence of adaptive attackers S Hamadou, V Sassone, M Yang Mathematical Structures in Computer Science 25 (2), 429-456, 2015 | 3 | 2015 |
A Time-Triggered Constraint-Based Calculus for Avionic Systems S Hamadou, J Mullins, A Gherbi, S Beji IEEE International Symposium on Object/Component/Service-Oriented Real-Time …, 2015 | 3 | 2015 |
A probabilistic scheduler for the analysis of cryptographic protocols S Brlek, S Hamadou, J Mullins Electronic Notes in Theoretical Computer Science 194 (1), 61-83, 2007 | 3 | 2007 |
Some remarks on the certificates registration of the electronic commerce protocol set S Brlek, S Hamadou, J Mullins Advanced Int'l Conference on Telecommunications and Int'l Conference on …, 2006 | 3 | 2006 |
Anonymous and secure electronic transaction protocol S Brlek, S Hamadou, J Mullins Annals of Telecommunications 5 (60), 530-557, 2005 | 3 | 2005 |
Iterative integration of TTEthernet network flows S Beji, S Hamadou, J Mullins, A Gherbi International Journal of Critical Computer-Based Systems 9 (3), 167-192, 2019 | 2 | 2019 |