default search action
Mohamed G. Gouda
Person information
- affiliation: University of Texas at Austin, USA
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j89]Rezwana Reaz, Hrishikesh B. Acharya, Ehab S. Elmallah, Jorge Arturo Cobb, Mohamed G. Gouda:
Policy expressions and the bottom-up design of computing policies. Computing 101(9): 1307-1326 (2019) - [c140]Rezwana Reaz, Ehab S. Elmallah, Mohamed G. Gouda:
Executing Firewalls in Public Clouds. ICCCNT 2019: 1-6 - 2017
- [j88]Ehab S. Elmallah, Mohamed G. Gouda:
Hardness of Firewall Analysis. IEEE Trans. Dependable Secur. Comput. 14(3): 339-349 (2017) - [c139]Rezwana Reaz, Hrishikesh B. Acharya, Ehab S. Elmallah, Jorge Arturo Cobb, Mohamed G. Gouda:
Policy Expressions and the Bottom-Up Design of Computing Policies. NETYS 2017: 151-165 - 2016
- [c138]Muqeet Ali, Rezwana Reaz, Mohamed G. Gouda:
Two-phase Nonrepudiation Protocols. ICCCNT 2016: 22:1-22:8 - [c137]Muqeet Ali, Mohamed G. Gouda:
Nonrepudiation Protocols in Cloud Systems. ICCCNT 2016: 23:1-23:6 - [c136]Oliver Jensen, Mohamed G. Gouda, Lili Qiu:
A secure credit card protocol over NFC. ICDCN 2016: 32:1-32:9 - [c135]Muqeet Ali, Rezwana Reaz, Mohamed G. Gouda:
Nonrepudiation Protocols Without a Trusted Party. NETYS 2016: 1-15 - [c134]Oliver Jensen, Tyler O'Meara, Mohamed G. Gouda:
Securing NFC Credit Card Payments Against Malicious Retailers. NETYS 2016: 214-228 - [c133]Marijn J. H. Heule, Rezwana Reaz, Hrishikesh B. Acharya, Mohamed G. Gouda:
Analysis of Computing Policies Using SAT Solvers (Short Paper). SSS 2016: 190-194 - 2015
- [c132]Rezwana Reaz, Muqeet Ali, Mohamed G. Gouda, Marijn Heule, Ehab S. Elmallah:
The Implication Problem of Computing Policies. SSS 2015: 109-123 - 2014
- [c131]Mohamed G. Gouda:
Keynote Talk: Communication Without Repudiation: The Unanswered Question. NETYS 2014: 1-8 - [c130]Ehab S. Elmallah, Mohamed G. Gouda:
Hardness of Firewall Analysis. NETYS 2014: 153-168 - [c129]Ehab S. Elmallah, Hrishikesh B. Acharya, Mohamed G. Gouda:
Incremental Verification of Computing Policies. SSS 2014: 226-236 - 2013
- [j87]Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda:
The best keying protocol for sensor networks. Pervasive Mob. Comput. 9(4): 564-571 (2013) - 2012
- [j86]Alex X. Liu, Jason M. Kovacs, Mohamed G. Gouda:
A secure cookie scheme. Comput. Networks 56(6): 1723-1730 (2012) - [j85]Young-ri Choi, Mohamed G. Gouda:
A state-based model of sensor protocols. Theor. Comput. Sci. 458: 61-75 (2012) - 2011
- [j84]Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda:
Is that you? Authentication in a network without identities. Int. J. Secur. Networks 6(4): 181-190 (2011) - [j83]Mohamed G. Gouda, Hrishikesh B. Acharya:
Nash equilibria in stabilizing systems. Theor. Comput. Sci. 412(33): 4325-4335 (2011) - [j82]Jorge Arturo Cobb, Mohamed G. Gouda:
Stabilization of max-min fair networks without per-flow state. Theor. Comput. Sci. 412(40): 5562-5579 (2011) - [c128]Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda:
Is That You? Authentication in a Network without Identities. GLOBECOM 2011: 1-5 - [c127]Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda:
TPP: The Two-Way Password Protocol. ICCCN 2011: 1-6 - [c126]Taehwan Choi, Mohamed G. Gouda:
HTTPI: An HTTP with Integrity. ICCCN 2011: 1-6 - [c125]Hrishikesh B. Acharya, Mohamed G. Gouda:
On the Hardness of Topology Inference. ICDCN 2011: 251-262 - [c124]Hrishikesh B. Acharya, Mohamed G. Gouda:
Firewall verification and redundancy checking are equivalent. INFOCOM 2011: 2123-2128 - [c123]Sushil K. Prasad, Almadena Yu. Chtchelkanova, Sajal K. Das, Frank Dehne, Mohamed G. Gouda, Anshul Gupta, Joseph F. JáJá, Krishna Kant, Anita La Salle, Richard LeBlanc, Manish Lumsdaine, David A. Padua, Manish Parashar, Viktor K. Prasanna, Yves Robert, Arnold L. Rosenberg, Sartaj Sahni, Behrooz A. Shirazi, Alan Sussman, Charles C. Weems, Jie Wu:
NSF/IEEE-TCPP curriculum initiative on parallel and distributed computing: core topics for undergraduates. SIGCSE 2011: 617-618 - [c122]Hrishikesh B. Acharya, Mohamed G. Gouda:
Brief announcement: RedRem: a parallel redundancy remover. SPAA 2011: 267-268 - [c121]Hrishikesh B. Acharya, Taehwan Choi, Rida A. Bazzi, Mohamed G. Gouda:
The K-Observer Problem in Computer Networks. SSS 2011: 5-18 - [c120]Hrishikesh B. Acharya, Anil Kumar Katti, Mohamed G. Gouda:
Brief Announcement: A Conjecture on Traceability, and a New Class of Traceable Networks. SSS 2011: 431-432 - [c119]Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda:
The best keying protocol for sensor networks. WOWMOM 2011: 1-6 - 2010
- [j81]Mohamed Eltoweissy, David Hung-Chang Du, Mario Gerla, Silvia Giordano, Mohamed G. Gouda, Henning Schulzrinne, Moustafa Youssef, Donald F. Towsley:
Mission critical networking [Guest editorial]. IEEE J. Sel. Areas Commun. 28(5): 625-629 (2010) - [j80]Alex X. Liu, Mohamed G. Gouda:
Complete Redundancy Removal for Packet Classifiers in TCAMs. IEEE Trans. Parallel Distributed Syst. 21(4): 424-437 (2010) - [j79]Young-ri Choi, Chin-Tser Huang, Mohamed G. Gouda:
Stabilization of Flood Sequencing Protocols in Sensor Networks. IEEE Trans. Parallel Distributed Syst. 21(7): 1042-1055 (2010) - [c118]Hrishikesh B. Acharya, Mohamed G. Gouda:
The Weak Network Tracing Problem. ICDCN 2010: 184-194 - [c117]Hrishikesh B. Acharya, Mohamed G. Gouda:
Projection and Division: Linear-Space Verification of Firewalls. ICDCS 2010: 736-743 - [c116]Hrishikesh B. Acharya, Aditya Joshi, Mohamed G. Gouda:
Firewall modules and modular firewalls. ICNP 2010: 174-182 - [c115]Yan Li, Mohamed G. Gouda:
IP Fast Reroute in Networks with Shared Risk Links. Networking 2010: 213-226 - [c114]Hrishikesh B. Acharya, Mohamed G. Gouda:
Brief Announcement: On the Hardness of Topology Inference. SSS 2010: 285-287 - [c113]Hrishikesh B. Acharya, Mohamed G. Gouda:
On the Power of Non-spoofing Adversaries. DISC 2010: 437-449
2000 – 2009
- 2009
- [j78]Rida A. Bazzi, Young-ri Choi, Mohamed G. Gouda:
Hop chains: Secure routing and the establishment of distinct identities. Theor. Comput. Sci. 410(6-7): 467-480 (2009) - [j77]Alex X. Liu, Mohamed G. Gouda:
Firewall Policy Queries. IEEE Trans. Parallel Distributed Syst. 20(6): 766-777 (2009) - [c112]Yan Li, Mohamed G. Gouda:
Balanced Peer Lists: Towards a Collusion-Resistant BGP. ICCCN 2009: 1-6 - [c111]Hrishikesh B. Acharya, Mohamed G. Gouda:
Linear-Time Verification of Firewalls. ICNP 2009: 133-140 - [c110]Hrishikesh B. Acharya, Ehab S. Elmallah, Mohamed G. Gouda:
Consistent Fixed Points and Negative Gain. PDCAT 2009: 299-305 - [c109]Hrishikesh B. Acharya, Mohamed G. Gouda:
Brief announcement: the theory of network tracing. PODC 2009: 318-319 - [c108]Yan Li, Mohamed G. Gouda:
The Blocking Option in Routing Protocols. SRDS 2009: 227-235 - [c107]Hrishikesh B. Acharya, Mohamed G. Gouda:
A Theory of Network Tracing. SSS 2009: 62-74 - [c106]Mohamed G. Gouda, Hrishikesh B. Acharya:
Nash Equilibria in Stabilizing Systems. SSS 2009: 311-324 - [c105]Hrishikesh B. Acharya, Ehab S. Elmallah, Mohamed G. Gouda:
Brief Announcement: Consistent Fixed Points and Negative Gain. SSS 2009: 771-772 - [e1]Ehab Al-Shaer, Mohamed G. Gouda, Jorge Lobo, Sanjai Narain, Felix Wu:
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009. ACM 2009, ISBN 978-1-60558-778-3 [contents] - 2008
- [j76]Mohamed G. Gouda, Alex X. Liu:
Formal Specification and Verification of a Secure Micropayment Protocol. Int. J. Netw. Secur. 7(1): 81-87 (2008) - [j75]Ehab S. Elmallah, Mohamed G. Gouda, Sandeep S. Kulkarni:
Logarithmic keying. ACM Trans. Auton. Adapt. Syst. 3(4): 18:1-18:18 (2008) - [j74]Alex X. Liu, Mohamed G. Gouda:
Diverse Firewall Design. IEEE Trans. Parallel Distributed Syst. 19(9): 1237-1251 (2008) - [c104]Mohamed G. Gouda, Alex X. Liu, Mansoor Jafry:
Verification of Distributed Firewalls. GLOBECOM 2008: 2013-2017 - [c103]Yan Li, Mohamed G. Gouda:
Sources and Monitors: A Trust Model for Peer-to-Peer Networks. ICCCN 2008: 285-290 - [c102]Andrew R. Dalton, William P. McCartney, Kajari Ghosh Dastidar, Jason O. Hallstrom, Nigamanth Sridhar, Ted Herman, William Leal, Anish Arora, Mohamed G. Gouda:
DESAL alpha: An Implementation of the Dynamic Embedded Sensor-Actuator Language. ICCCN 2008: 541-547 - [c101]Jorge Arturo Cobb, Mohamed G. Gouda:
Stabilization of Max-Min Fair Networks without Per-flow State. SSS 2008: 156-172 - [c100]Taehwan Choi, Sooel Son, Mohamed G. Gouda, Jorge Arturo Cobb:
Pharewell to Phishing. SSS 2008: 233-245 - 2007
- [j73]Mohamed G. Gouda, Alex X. Liu:
Structured firewall design. Comput. Networks 51(4): 1106-1120 (2007) - [j72]Mohamed G. Gouda, Alex X. Liu, Lok M. Leung, Mohamed A. Alam:
SPP: An anti-phishing single password protocol. Comput. Networks 51(13): 3715-3726 (2007) - [j71]Hongwei Zhang, Anish Arora, Young-ri Choi, Mohamed G. Gouda:
Reliable bursty convergecast in wireless sensor networks. Comput. Commun. 30(13): 2560-2576 (2007) - [j70]Mohamed G. Gouda, F. Furman Haddix:
The alternator. Distributed Comput. 20(1): 21-28 (2007) - [j69]Anish Arora, Mohamed G. Gouda, Jason O. Hallstrom, Ted Herman, William Leal, Nigamanth Sridhar:
A state-based language for sensor-actuator networks. SIGBED Rev. 4(3): 25-30 (2007) - [j68]Mehmet Hakan Karaata, Mohamed G. Gouda:
A Stabilizing Deactivation/Reactivation Protocol. IEEE Trans. Computers 56(7): 881-888 (2007) - [j67]Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda:
Optimal Dispersal of Certificate Chains. IEEE Trans. Parallel Distributed Syst. 18(4): 474-484 (2007) - [c99]Edmund L. Wong, Praveen Balasubramanian, Lorenzo Alvisi, Mohamed G. Gouda, Vitaly Shmatikov:
Truth in advertising: lightweight verification of route integrity. PODC 2007: 147-156 - [c98]Young-ri Choi, Mohamed G. Gouda:
Stabilization of Flood Sequencing Protocols in Sensor Networks. SSS 2007: 139-153 - [c97]Mohamed G. Gouda, Yan Li:
The Truth System: Can a System of Lying Processes Stabilize? SSS 2007: 311-324 - 2006
- [b2]Chin-Tser Huang, Mohamed G. Gouda:
Hop Integrity in the Internet. Advances in Information Security 21, Springer 2006, ISBN 978-0-387-24426-6, pp. 1-112 - [j66]Eunjin Jung, Alex X. Liu, Mohamed G. Gouda:
Key bundles and parcels: Secure communication in many groups. Comput. Networks 50(11): 1781-1798 (2006) - [j65]Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora:
Secret instantiation in ad-hoc networks. Comput. Commun. 29(2): 200-215 (2006) - [j64]Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora:
Erratum to "Secret instantiation in ad-hoc networks" [Computer Communications 29 (2006) 200-215]. Comput. Commun. 29(11): 2167 (2006) - [j63]Eunjin Jung, Mohamed G. Gouda:
Vulnerability analysis of certificate graphs. Int. J. Secur. Networks 1(1/2): 13-23 (2006) - [j62]Young-ri Choi, Mohamed G. Gouda, Hongwei Zhang, Anish Arora:
Stabilization of Grid Routing in Sensor Networks. J. Aerosp. Comput. Inf. Commun. 3(5): 214-233 (2006) - [j61]Mohamed G. Gouda, Eunjin Jung:
Stabilizing Certificate Dispersal. J. Aerosp. Comput. Inf. Commun. 3(10): 487-497 (2006) - [j60]Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy:
Convergence of IPsec in presence of resets. J. High Speed Networks 15(2): 173-183 (2006) - [c96]Mohamed G. Gouda:
How to Assign Symmetric Keys in a Network of Small Computers. ICCCN 2006: 139-140 - [c95]Eunjin Jung, Mohamed G. Gouda:
Rating Certificates. ICCCN 2006: 449-454 - [c94]Amitanand S. Aiyer, Lorenzo Alvisi, Mohamed G. Gouda:
Key Grids: A Protocol Family for Assigning Symmetric Keys. ICNP 2006: 178-186 - [c93]Rida A. Bazzi, Young-ri Choi, Mohamed G. Gouda:
Hop Chains: Secure Routing and the Establishment of Distinct Identities. OPODIS 2006: 365-379 - [c92]Mohamed G. Gouda, Jorge Arturo Cobb, Chin-Tser Huang:
Fault Masking in Tri-redundant Systems. SSS 2006: 304-313 - [c91]Mohamed G. Gouda, Sandeep S. Kulkarni, Ehab S. Elmallah:
Logarithmic Keying of Communication Networks. SSS 2006: 314-323 - 2005
- [b1]Tommy M. McGuire, Mohamed G. Gouda:
The Austin Protocol Compiler. Advances in Information Security 13, Springer 2005, ISBN 978-0-387-23227-0, pp. 1-132 - [j59]Mohamed G. Gouda:
Self-Stabilizing Systems, Part 1. J. High Speed Networks 14(1): 1-2 (2005) - [j58]Jorge Arturo Cobb, Mohamed G. Gouda, Deepinder P. Sidhu:
Hello again: Stabilization of the Hello protocol in OSPF. J. High Speed Networks 14(1): 39-57 (2005) - [j57]Mohamed G. Gouda:
Self-Stabilizing Systems, Part 2. J. High Speed Networks 14(2): 107 (2005) - [c90]Alex X. Liu, Mohamed G. Gouda:
Complete Redundancy Detection in Firewalls. DBSec 2005: 193-206 - [c89]Anish Arora, Rajiv Ramnath, Prasun Sinha, Emre Ertin, Sandip Bapat, Vinayak Naik, Vinod Kulathumani, Hongwei Zhang, Mukundan Sridharan, Santosh Kumar, Hui Cao, Nick Seddon, Chris Anderson, Ted Herman, Chen Zhang, Nishank Trivedi, Mohamed G. Gouda, Young-ri Choi, Mikhail Nesterenko, Romil Shah, Sandeep S. Kulkarni, Mahesh Aramugam, Limin Wang, David E. Culler, Prabal Dutta, Cory Sharp, Gilman Tolle, Mike Grimmer, Bill Ferriera, Ken Parker:
Project ExScal (Short Abstract). DCOSS 2005: 393-394 - [c88]Mohamed G. Gouda, Alex X. Liu:
A Model of Stateful Firewalls and Its Properties. DSN 2005: 128-137 - [c87]Alex X. Liu, Jason M. Kovacs, Chin-Tser Huang, Mohamed G. Gouda:
A secure cookie protocol. ICCCN 2005: 333-338 - [c86]Benjamin Kuipers, Alex X. Liu, Aashin Gautam, Mohamed G. Gouda:
Zmail: Zero-Sum Free Market Control of Spam. ICDCS Workshops 2005: 20-26 - [c85]Chin-Tser Huang, Mohamed G. Gouda:
State Checksum and Its Role in System Stabilization. ICDCS Workshops 2005: 29-34 - [c84]Hongwei Zhang, Anish Arora, Young-ri Choi, Mohamed G. Gouda:
Reliable bursty convergecast in wireless sensor networks. MobiHoc 2005: 266-276 - [c83]Mohamed G. Gouda, Young-ri Choi:
A State-Based Model of Sensor Protocols. OPODIS 2005: 246-260 - [c82]F. Furman Haddix, Mohamed G. Gouda:
A General Alternator. IASTED PDCS 2005: 409-413 - [c81]Anish Arora, Rajiv Ramnath, Emre Ertin, Prasun Sinha, Sandip Bapat, Vinayak Naik, Vinod Kulathumani, Hongwei Zhang, Hui Cao, Mukundan Sridharan, Santosh Kumar, Nick Seddon, Chris Anderson, Ted Herman, Nishank Trivedi, Chen Zhang, Mikhail Nesterenko, Romil Shah, Sandeep S. Kulkarni, Mahesh Aramugam, Limin Wang, Mohamed G. Gouda, Young-ri Choi, David E. Culler, Prabal Dutta, Cory Sharp, Gilman Tolle, Mike Grimmer, Bill Ferriera, Ken Parker:
ExScal: Elements of an Extreme Scale Wireless Sensor Network. RTCSA 2005: 102-108 - [c80]Mohamed G. Gouda, Eunjin Jung:
Stabilizing Certificate Dispersal. Self-Stabilizing Systems 2005: 140-152 - [p1]Mohamed G. Gouda, Young-ri Choi, Anish Arora:
Antireplay Protocols for Sensor Networks. Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks 2005: 561-574 - 2004
- [j56]Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kulathumani, Hongwei Zhang, Vinayak Naik, Vineet Mittal, Hui Cao, Murat Demirbas, Mohamed G. Gouda, Young-ri Choi, Ted Herman, Sandeep S. Kulkarni, Umamaheswaran Arumugam, Mikhail Nesterenko, Adnan Vora, Mark Miyashita:
A line in the sand: a wireless sensor network for target detection, classification, and tracking. Comput. Networks 46(5): 605-634 (2004) - [c79]Alex X. Liu, Mohamed G. Gouda:
Diverse Firewall Design. DSN 2004: 595-604 - [c78]Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda:
Optimal dispersal of special certificate graphs. GLOBECOM 2004: 2213-2217 - [c77]Mohamed G. Gouda, Alex X. Liu:
Formal Specification and Verification of a Micropayment Protocol. ICCCN 2004: 489-494 - [c76]Mohamed G. Gouda, Alex X. Liu:
Firewall Design: Consistency, Completeness, and Compactness. ICDCS 2004: 320-327 - [c75]Mohamed G. Gouda, Eunjin Jung:
Certificate Dispersal in Ad-Hoc Networks. ICDCS 2004: 616-623 - [c74]Alex X. Liu, Mohamed G. Gouda, Huibo H. Ma, Anne H. H. Ngu:
Firewall Queries. OPODIS 2004: 197-212 - [c73]Mohamed G. Gouda, Young-ri Choi, Anish Arora:
Sentries and Sleepers in Sensor Networks. OPODIS 2004: 384-399 - [c72]Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda:
Optimal Dispersal of Certificate Chains. DISC 2004: 435-449 - 2003
- [j55]Mohamed G. Gouda, Chin-Tser Huang:
A secure address resolution protocol. Comput. Networks 41(1): 57-71 (2003) - [j54]Vinayak Naik, Anish Arora, Sandip Bapat, Mohamed G. Gouda:
Dependable Systems - Whisper: Local Secret Maintenance in Sensor Networks. IEEE Distributed Syst. Online 4(9) (2003) - [j53]Mohamed G. Gouda, Marco Schneider:
Maximizable routing metrics. IEEE/ACM Trans. Netw. 11(4): 663-675 (2003) - [c71]Young-ri Choi, Mohamed G. Gouda, Moon C. Kim, Anish Arora:
The mote connectivity protocol. ICCCN 2003: 533-538 - [c70]Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy:
Convergence of IPsec in Presence of Resets. ICDCS Workshops 2003: 22-27 - [c69]Eunjin Jung, Alex X. Liu, Mohamed G. Gouda:
Key Bundels and Parcels: Secure Communication in Many Groups. Networked Group Communication 2003: 119-130 - [c68]Murat Demirbas, Anish Arora, Mohamed G. Gouda:
A Pursuer-Evader Game for Sensor Networks. Self-Stabilizing Systems 2003: 1-16 - [c67]Jorge Arturo Cobb, Mohamed G. Gouda, Ravi Musunuri:
A Stabilizing Solution to the Stable Path Problem. Self-Stabilizing Systems 2003: 169-183 - 2002
- [j52]Jorge Arturo Cobb, Mohamed G. Gouda:
Stabilization of General Loop-Free Routing. J. Parallel Distributed Comput. 62(5): 922-944 (2002) - [j51]Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire:
Hop integrity in computer networks. IEEE/ACM Trans. Netw. 10(3): 308-319 (2002) - [j50]Mohamed G. Gouda:
Multiphase Stabilization. IEEE Trans. Software Eng. 28(2): 201-208 (2002) - [c66]Mohamed G. Gouda, Chin-Tser Huang, E. N. Elnozahy:
Key Trees and the Security of Interval Multicast. ICDCS 2002: 467-468 - 2001
- [j49]Mohamed G. Gouda:
Elements of security: Closure, convergence, and protection. Inf. Process. Lett. 77(2-4): 109-114 (2001) - [c65]Chin-Tser Huang, Mohamed G. Gouda:
An anti-replay window protocol with controlled shift. ICCCN 2001: 242-247 - [c64]Jorge Arturo Cobb, Mohamed G. Gouda:
Stabilization of Routing in Directed Networks. WSS 2001: 51-66 - [c63]Mohamed G. Gouda:
The Theory of Weak Stabilization. WSS 2001: 114-123 - [c62]Mohamed G. Gouda, Chin-Tser Huang, Anish Arora:
On the Security and Vulnerability of PING. WSS 2001: 124-135 - [c61]Xiaozhou (Steve) Li, Yang Richard Yang, Mohamed G. Gouda, Simon S. Lam:
Batch rekeying for secure group communications. WWW 2001: 525-534 - 2000
- [j48]Mohamed G. Gouda, Tommy M. McGuire:
Alert communication primitives above TCP. J. High Speed Networks 9(2): 139-150 (2000) - [j47]Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam:
Secure group communications using key graphs. IEEE/ACM Trans. Netw. 8(1): 16-30 (2000) - [c60]Mohamed G. Gouda, Chin-Tser Huang, Eric Li:
Anti-replay window protocols for secure IP. ICCCN 2000: 310-315 - [c59]Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire:
Hop Integrity in Computer Networks. ICNP 2000: 3-11
1990 – 1999
- 1999
- [j46]Shlomi Dolev, Mohamed G. Gouda, Marco Schneider:
Memory Requirements for Silent Stabilization. Acta Informatica 36(6): 447-462 (1999) - [c58]Alaa Youssef, Hussein M. Abdel-Wahab, Kurt Maly, Mohamed G. Gouda:
General and Scalable State Feedback for Multimedia Systems. ISCC 1999: 187-193 - [c57]Mohamed G. Gouda, Marco Schneider:
Stabilization of maximal metric trees. WSS 1999: 10-17 - [c56]Mohamed G. Gouda, F. Furman Haddix:
The alternator. WSS 1999: 48-53 - 1998
- [j45]Jorge Arturo Cobb, Mohamed G. Gouda, Amal El-Nahas:
Time-shift scheduling - fair scheduling of flows in high-speed networks. IEEE/ACM Trans. Netw. 6(3): 274-285 (1998) - [c55]Mohamed G. Gouda, Tommy M. McGuire:
Accelerated Heartbeat Protocols. ICDCS 1998: 202-209 - [c54]Mohamed G. Gouda, Marco Schneider:
Maximizable Routing Metrics. ICNP 1998: 71- - [c53]Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam:
Secure Group Communications Using Key Graphs. SIGCOMM 1998: 68-79 - 1997
- [j44]George Varghese, Anish Arora, Mohamed G. Gouda:
Self-Stabilization by Tree Correction. Chic. J. Theor. Comput. Sci. 1997 (1997) - [j43]Douglas H. Steves, Chris Edmondson-Yurkanan, Mohamed G. Gouda:
Properties of secure transaction protocols. Comput. Networks ISDN Syst. 29(15): 1809-1821 (1997) - [j42]Jorge Arturo Cobb, Mohamed G. Gouda:
The Request Reply Family of Group Routing Protocols. IEEE Trans. Computers 46(6): 659-672 (1997) - [j41]Jorge Arturo Cobb, Mohamed G. Gouda:
Flow theory. IEEE/ACM Trans. Netw. 5(5): 661-674 (1997) - [c52]Jorge Arturo Cobb, Mohamed G. Gouda:
Balanced Routing. ICNP 1997: 277-284 - [c51]Alaa Youssef, Hussein M. Abdel-Wahab, Kurt Maly, Mohamed G. Gouda:
Inter-stream adaptation for collaborative multimedia applications. ISCC 1997: 116-120 - [c50]Amal El-Nahas, Khalil M. Ahmed, Mohamed G. Gouda:
Flow scheduling protocols without real-time clocks. ISCC 1997: 596-600 - [c49]Mohamed G. Gouda, F. Furman Haddix:
The linear alternator. WSS 1997: 31-47 - [c48]Anish Arora, Mohamed G. Gouda:
Delay-insensitive stabilization. WSS 1997: 95-109 - 1996
- [j40]Jorge Arturo Cobb, Mohamed G. Gouda:
Group routing without group routing tables: an exercise in protocol design. Comput. Commun. 19(14): 1161-1174 (1996) - [j39]Mohamed G. Gouda:
Network Protocols Between Exact Specifications and Pragmatic Implementations. ACM Comput. Surv. 28(4es): 43 (1996) - [j38]Hussein M. Abdel-Wahab, Mohamed G. Gouda:
Systems of Recall Broadcast. Inf. Sci. 90(1-4): 1-17 (1996) - [j37]Anish Arora, Mohamed G. Gouda, George Varghese:
Constraint satisfaction as a basis for designing nonmasking fault-tolerance. J. High Speed Networks 5(3): 293-306 (1996) - [j36]Mohamed G. Gouda, F. Furman Haddix:
The Stabilizing Token Ring in Three Bits. J. Parallel Distributed Comput. 35(1): 43-48 (1996) - [c47]Sarah E. Chodrow, Mohamed G. Gouda:
Sentries for the Execution of Concurrent Programs. ICDCS 1996: 11-18 - [c46]Jorge Arturo Cobb, Mohamed G. Gouda:
Group Routing without Group Routing Tables. ICDCS 1996: 344-351 - [c45]Jorge Arturo Cobb, Mohamed G. Gouda, Amal El-Nahas:
Time-Shift Scheduling: Fair Scheduling of Flows in High Speed Networks. ICNP 1996: 6-13 - [c44]Shlomi Dolev, Mohamed G. Gouda, Marco Schneider:
Memory Requirements for Silent Stabilization (Extended Abstract). PODC 1996: 27-34 - 1995
- [j35]James C. Browne, E. Allen Emerson, Mohamed G. Gouda, Daniel P. Miranker, Aloysius K. Mok, Lance Obermeyer, F. Furman Haddix, Rwo-Hsi Wang, Sarah E. Chodrow:
Modularity and Rule-Based Programming. Int. J. Artif. Intell. Tools 4(1-2): 201-218 (1995) - [j34]Sarah E. Chodrow, Mohamed G. Gouda:
Implementation of the Sentry System. Softw. Pract. Exp. 25(4): 373-387 (1995) - [j33]Mohamed G. Gouda, Arun N. Netravali, Krishan K. Sabnani:
A periodic state exchange protocol and its verification. IEEE Trans. Commun. 43(9): 2475-2484 (1995) - [c43]Mohamed G. Gouda:
Stabilizing Client/Server Protocols without the Tears. FORTE 1995: 5-19 - [c42]Mohamed G. Gouda, Sanjoy Paul:
A wireless link protocol: design by refinement. ICNP 1995: 192-200 - [c41]Jorge Arturo Cobb, Mohamed G. Gouda:
Ordered Delivery over One-way Virtual Circuits. ISCC 1995: 105-111 - [c40]Mohamed G. Gouda:
The Triumph and Tribulation of System Stabilization. WDAG 1995: 1-18 - [c39]Anish Arora, Mohamed G. Gouda:
Load Balancing: An Exercise in Constrainted Convergence. WDAG 1995: 183-197 - 1994
- [j32]Mohamed G. Gouda:
Stabilizing Observers. Inf. Process. Lett. 52(2): 99-103 (1994) - [j31]Ambuj K. Singh, James H. Anderson, Mohamed G. Gouda:
The Elusive Atomic Register. J. ACM 41(2): 311-339 (1994) - [j30]Anish Arora, Mohamed G. Gouda:
Distributed Reset. IEEE Trans. Computers 43(9): 1026-1038 (1994) - [c38]Anish Arora, Mohamed G. Gouda, George Varghese:
Constraint Satisfaction as a Basis for Designing Nonmasking Fault-Tolerance. Specification of Parallel Algorithms 1994: 341-356 - [c37]Anish Arora, Mohamed G. Gouda, George Varghese:
Constraint Satisfaction as a Basis for Designing Nonmasking Fault-Tolerance. ICDCS 1994: 424-431 - [c36]James C. Browne, E. Allen Emerson, Mohamed G. Gouda, Daniel P. Miranker, Aloysius K. Mok, Roberto J. Bayardo Jr., Sarah E. Chodrow, David Gadbois, F. Furman Haddix, Thomas W. Hetherington, Lance Obermeyer, Duu-Chung Tsou, Chih-Kan Wang, Rwo-Hsi Wang:
A New Approach to Modularity in Rule-Based Programming. ICTAI 1994: 18-25 - [c35]Jorge Arturo Cobb, Mohamed G. Gouda, Prathima Agrawal:
Protocol synchronization with sparse timestraps. PSTV 1994: 169-184 - [c34]Jorge Arturo Cobb, Chris Edmondson-Yurkanan, Mohamed G. Gouda:
Universal Mobile Addressing in the Internet. WMCSA 1994: 24-31 - 1993
- [j29]Mohamed G. Gouda:
Protocol Verification Made Simple: A Tutorial. Comput. Networks ISDN Syst. 25(9): 969-980 (1993) - [j28]James E. Burns, Mohamed G. Gouda, Raymond E. Miller:
Stabilization and Pseudo-Stabilization. Distributed Comput. 7(1): 35-42 (1993) - [j27]Anish Arora, Paul C. Attie, Michael Evangelist, Mohamed G. Gouda:
Convergence of Iteration Systems. Distributed Comput. 7(1): 43-53 (1993) - [j26]Ambuj K. Singh, Mohamed G. Gouda:
Rankers: A Classification of Synchronization Problems. Sci. Comput. Program. 21(3): 191-223 (1993) - [j25]Anish Arora, Mohamed G. Gouda:
Closure and Convergence: A Foundation of Fault-Tolerant Computing. IEEE Trans. Software Eng. 19(11): 1015-1027 (1993) - [c33]Jorge Arturo Cobb, Mohamed G. Gouda:
Flow theory: Verification of rate-reservation protocols. ICNP 1993: 198-205 - 1992
- [j24]James H. Anderson, Mohamed G. Gouda:
A Criterion for Atomicity. Formal Aspects Comput. 4(3): 273-298 (1992) - [c32]Anish Arora, Mohamed G. Gouda:
Closure and Convergence: A Formulation of Fault-Tolerant Computing. FTCS 1992: 396-403 - [c31]Jean-Michel Couvreur, Nissim Francez, Mohamed G. Gouda:
Asynchronous Unison (Extended Abstract). ICDCS 1992: 486-493 - [c30]Mohamed G. Gouda:
The Two-Dimensional Window Protocol. PSTV 1992: 365-379 - [c29]Sarah E. Chodrow, Mohamed G. Gouda:
The Sentry System. SRDS 1992: 230-237 - [c28]James H. Anderson, Jae-Heon Yang, Mohamed G. Gouda:
The Granularity of Waiting (Extended Abstract). WDAG 1992: 313-328 - 1991
- [j23]James H. Anderson, Mohamed G. Gouda:
A New Explanation of the Glitch Phenomenon. Acta Informatica 28(4): 297-309 (1991) - [j22]Chung-Kuo Chang, Mohamed G. Gouda:
On the Minimum Requirements for Independent Recovery in Distributed Systems. Inf. Process. Lett. 37(1): 1-7 (1991) - [j21]Anish Arora, Shlomi Dolev, Mohamed G. Gouda:
Maintaining Digital Clocks in Step. Parallel Process. Lett. 1: 11-18 (1991) - [j20]Mohamed G. Gouda, Nicholas J. Multari:
Stabilizing Communication Protocols. IEEE Trans. Computers 40(4): 448-458 (1991) - [j19]Geoffrey M. Brown, Mohamed G. Gouda, Raymond E. Miller:
Block acknowledgment: redesigning the window protocol. IEEE Trans. Commun. 39(4): 524-532 (1991) - [j18]Mohamed G. Gouda, Ted Herman:
Adaptive Programming. IEEE Trans. Software Eng. 17(9): 911-921 (1991) - [c27]Ming T. Liu, Mohamed G. Gouda, Raymond E. Miller, Krishan K. Sabnani:
Protocol engineering (panel session). ACM Conference on Computer Science 1991: 703 - [c26]Anish Arora, Shlomi Dolev, Mohamed G. Gouda:
Maintaining Digital Clocks In Step. WDAG 1991: 71-79 - 1990
- [j17]Mohamed G. Gouda, Rodney R. Howell, Louis E. Rosier:
The Instability of Self-Stabilization. Acta Informatica 27(8): 697-724 (1990) - [j16]Mohamed G. Gouda, Ted Herman:
Stabilizing Unison. Inf. Process. Lett. 35(4): 171-175 (1990) - [c25]Anish Arora, Paul C. Attie, Michael Evangelist, Mohamed G. Gouda:
Convergence of Iteration Systems (Extended Abstract). CONCUR 1990: 70-82 - [c24]Anish Arora, Mohamed G. Gouda:
Distributed Reset (Extended Abstract). FSTTCS 1990: 316-331 - [c23]Anish Arora, Mohamed G. Gouda, Ted Herman:
Composite Routing Protocols. SPDP 1990: 70-78 - [c22]Mohamed G. Gouda, Michael Evangelist:
Convergence/response tradeoffs in concurrent systems. SPDP 1990: 188-192
1980 – 1989
- 1989
- [j15]Geoffrey M. Brown, Mohamed G. Gouda, Chuan-lin Wu:
Token Systems that Self-Stabilize. IEEE Trans. Computers 38(6): 845-852 (1989) - [c21]Mohamed G. Gouda, Rodney R. Howell, Louis E. Rosier:
System Simulation and the Sensitivity of Self-Stabilization. MFCS 1989: 249-258 - [c20]Geoffrey M. Brown, Mohamed G. Gouda, Raymond E. Miller:
Block Acknowledgement: Redesigning the Window Protocol. SIGCOMM 1989: 128-135 - 1988
- [j14]James H. Anderson, Mohamed G. Gouda:
Atomic Semantics of Nonatomic Programs. Inf. Process. Lett. 28(2): 99-103 (1988) - [c19]Mohamed G. Gouda, Nicholas F. Maxemchuk, Utpal Mukherji, Krishan K. Sabnani:
Delivery and discrimination: the Seine protocol. SIGCOMM 1988: 292-302 - 1987
- [c18]Ambuj K. Singh, James H. Anderson, Mohamed G. Gouda:
The Elusive Atomic Register Revisited. PODC 1987: 206-221 - [c17]Chung-Kuo Chang, Mohamed G. Gouda:
Independent Recovery. SRDS 1987: 93-104 - 1986
- [j13]Mohamed G. Gouda, Chung-Kuo Chang:
Proving Liveness for Networks of Communicating Finite State Machines. ACM Trans. Program. Lang. Syst. 8(1): 154-182 (1986) - 1985
- [j12]Mohamed G. Gouda, Ji-Yun Han:
Protocol Validation by Fair Progress State Exploration. Comput. Networks 9: 353-361 (1985) - [j11]Mohamed G. Gouda, Louis E. Rosier:
Priority Networks of Communicating Finite State Machines. SIAM J. Comput. 14(3): 569-584 (1985) - [j10]Mohamed G. Gouda:
On "A Simple Protocol Whose Proof Isńt": The State Machine Approach. IEEE Trans. Commun. 33(4): 380-382 (1985) - [j9]Ching-Hua Chow, Mohamed G. Gouda, Simon S. Lam:
A Discipline for Constructing Multiphase Communication Protocols. ACM Trans. Comput. Syst. 3(4): 315-343 (1985) - [j8]Mohamed G. Gouda, Hui-Seng Lee:
Proving Liveness and Termination of Systolic Arrays Using Communication Finite State Machines. IEEE Trans. Software Eng. 11(10): 1240-1251 (1985) - [c16]Mohamed G. Gouda, Khe-Sing The:
Modeling physical layer protocols using communicating finite state machines. SIGCOMM 1985: 54-62 - 1984
- [j7]Ching-Hua Chow, Mohamed G. Gouda, Simon S. Lam:
An exercise in constructing multi-phase communication protocols. Comput. Commun. Rev. 14(2): 42-49 (1984) - [j6]Mohamed G. Gouda, Eric G. Manning, Yao-Tin Yu:
On the Progress of Communications between Two Finite State Machines. Inf. Control. 63(3): 200-216 (1984) - [j5]Mohamed G. Gouda, Yao-Tin Yu:
Protocol Validation by Maximal Progress State Exploration. IEEE Trans. Commun. 32(1): 94-97 (1984) - [j4]Mohamed G. Gouda, Yao-Tin Yu:
Synthesis of Communicating Finite-State Machines with Guaranteed Progress. IEEE Trans. Commun. 32(7): 779-788 (1984) - [j3]Mohamed G. Gouda:
Closed Covers: To Verify Progress for Communicating Finite State Machines. IEEE Trans. Software Eng. 10(6): 846-855 (1984) - [c15]Mohamed G. Gouda, Louis E. Rosier:
Communicating Finite State Machines with Priority Channnels. ICALP 1984: 209-221 - [c14]Mohamed G. Gouda, Chung-Kuo Chang:
A Technique for Proving Liveness of Communicating Finite State Machines with Examples. PODC 1984: 38-49 - [c13]Hai-Yann Hwang, Umeshwar Dayal, Mohamed G. Gouda:
Using Semiouterjoins to Process Queries in Multidatabase Systems. PODS 1984: 153-162 - [c12]Mohamed G. Gouda, Ching-Hua Chow, Simon S. Lam:
On the Decidability of Livelock Detection in Networks of Communicating Finite State Machines. PSTV 1984: 47-56 - [c11]Ching-Hua Chow, Mohamed G. Gouda, Simon S. Lam:
On Constructing Multi-Phase Communication Protocols. PSTV 1984: 57-68 - 1983
- [j2]Yao-Tin Yu, Mohamed G. Gouda:
Unboundedness Detection for a Class of Communicating Finite-State Machines. Inf. Process. Lett. 17(5): 235-240 (1983) - [c10]Mohamed G. Gouda:
An Example for Constructing Communicating Machines by Step-Wise Refinement. Protocol Specification, Testing, and Verification 1983: 63-74 - [c9]Mohamed G. Gouda, Yao-Tin Yu:
Maximal progress state exploration. SIGCOMM 1983: 68-75 - 1982
- [j1]Yao-Tin Yu, Mohamed G. Gouda:
Deadlock Detection for a Class of Communicating Finite State Machines. IEEE Trans. Commun. 30(12): 2514-2518 (1982) - [c8]Mohamed G. Gouda, Bijendra N. Jain:
Necessary and Sufficient Conditions to Detect Message Duplication in Protocol Hierarchies. PSTV 1982: 317 - [c7]Yao-Tin Yu, Mohamed G. Gouda:
Deadlock Detection for a Class of Communicating Finite State Machine. PSTV 1982: 319 - 1981
- [c6]Mohamed G. Gouda, Umeshwar Dayal:
Optimal Semijoin Schedules For Query Processing in Local Distributed Database Systems. SIGMOD Conference 1981: 164-175 - 1980
- [c5]Mohamed G. Gouda, Eric G. Manning, Yao-Tin Yu:
On the progress of communication between two machines. Operating Systems Engineering 1980: 369-389
1970 – 1979
- 1979
- [c4]Mohamed G. Gouda, D. Body, W. Wood:
Global and Local Models for the Specification and Verification of Distributed Systems. Berkeley Workshop 1979: 155- - 1978
- [c3]Mohamed G. Gouda:
A Hierarchial Controller for Concurrent Accessing of Distributed Databases. Computer Architecture for Non-Numeric Processing 1978: 65-70 - 1976
- [c2]Mohamed G. Gouda, Eric G. Manning:
Protocol Machines: A Concise Formal Model and its Automatic Implementation. ICCC 1976: 346-350 - [c1]Mohamed G. Gouda, Eric G. Manning:
On the Modelling, Analysis and Design of Protocols - A Special Class of Software Structures. ICSE 1976: 256-262
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-02 21:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint