default search action
Ahmed Serhrouchni
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c106]Yunmeng Shu, Pengwenlong Gu, Cédric Adjih, Chung Shue Chen, Ahmed Serhrouchni:
DynSplit: A Dynamic Split Learning Scheme for 5G-Enpowered Metaverse. MetaCom 2024: 214-221 - 2023
- [c105]Fahad Rahman, Chafiq Titouna, Farid Naït-Abdesselam, Ahmed Serhrouchni:
Scaling A Blockchain System With Layered Architecture. CommNet 2023: 1-6 - [c104]Fahad Rahman, Chafiq Titouna, Farid Naït-Abdesselam, Ahmed Serhrouchni:
Scalable Blockchain Through Prioritised Sharding. CommNet 2023: 1-6 - [c103]Rita Azzi, Rima Kilany Chamoun, Ahmed Serhrouchni, Maria Sokhn:
A Healthcare Delivery System Powered by Semantic Data Description and Blockchain. FICC (1) 2023: 224-242 - [c102]Iman Hmedoush, Pengwenlong Gu, Cédric Adjih, Paul Mühlethaler, Ahmed Serhrouchni:
DS-IRSA: A Deep Reinforcement Learning and Sensing Based IRSA. GLOBECOM 2023: 2790-2795 - [c101]Danylo Goncharskyi, Sung Yong Kim, Pengwenlong Gu, Ahmed Serhrouchni, Rida Khatoun, Farid Naït-Abdesselam:
Lightweight TLS 1.3 Handshake for C-ITS Systems. ICC 2023: 1432-1437 - 2022
- [c100]Danylo Goncharskyi, Sung Yong Kim, Ahmed Serhrouchni, Pengwenlong Gu, Rida Khatoun, Joel Hachem:
Delay Measurement of 0-RTT Transport Layer Security (TLS) Handshake Protocol. CoDIT 2022: 1450-1454 - [c99]Sung Yong Kim, Danylo Goncharskyi, Pengwenlong Gu, Ahmed Serhrouchni, Rida Khatoun, Farid Naït-Abdesselam, Jean-Jacques Grund:
TLS Early Data Resistance to Replay Attacks in Wireless Internet of Things. GLOBECOM 2022: 3539-3544 - 2021
- [j17]Mohammad El-Hajj, Ahmad Fadlallah, Maroun Chamoun, Ahmed Serhrouchni:
A taxonomy of PUF Schemes with a novel Arbiter-based PUF resisting machine learning attacks. Comput. Networks 194: 108133 (2021) - [j16]Yves-Christian Adja Elloh, Badis Hammi, Ahmed Serhrouchni, Sherali Zeadally:
A blockchain-based certificate revocation management and status verification system. Comput. Secur. 104: 102209 (2021) - [c98]Pengwenlong Gu, Dingjie Zhong, Cunqing Hua, Farid Naït-Abdesselam, Ahmed Serhrouchni, Rida Khatoun:
Scaling A Blockchain System For 5G-based Vehicular Networks Using Heuristic Sharding. GLOBECOM 2021: 1-6 - [c97]Yves-Christian Adja Elloh, Ahmed Serhrouchni:
Improved CRL Distribution point for Cooperative Intelligent Transportation Systems. IM 2021: 322-330 - 2020
- [j15]Pengwenlong Gu, Cunqing Hua, Wenchao Xu, Rida Khatoun, Yue Wu, Ahmed Serhrouchni:
Control Channel Anti-Jamming in Vehicular Networks via Cooperative Relay Beamforming. IEEE Internet Things J. 7(6): 5064-5077 (2020) - [c96]Carlos H. O. O. Quevedo, Ana M. B. C. Quevedo, Gustavo A. Campos, Rafael L. Gomes, Joaquim Celestino Jr., Ahmed Serhrouchni:
An Intelligent Mechanism for Sybil Attacks Detection in VANETs. ICC 2020: 1-6 - [i1]Mounira Msahli, Nancy Cam-Winget, William Whyte, Ahmed Serhrouchni, Houda Labiod:
TLS Authentication Using Intelligent Transport System (ITS) Certificates. RFC 8902: 1-13 (2020)
2010 – 2019
- 2019
- [j14]Mohammed El-hajj, Ahmad Fadlallah, Maroun Chamoun, Ahmed Serhrouchni:
A Survey of Internet of Things (IoT) Authentication Schemes. Sensors 19(5): 1141 (2019) - [c95]Achraf Fayad, Badis Hammi, Rida Khatoun, Ahmed Serhrouchni:
A Blockchain-based Lightweight Authentication Solution for IoT. CSNet 2019: 28-34 - [c94]Batoul Haidar, Maroun Chamoun, Ahmed Serhrouchni:
Arabic Cyberbullying Detection: Enhancing Performance by Using Ensemble Machine Learning. iThings/GreenCom/CPSCom/SmartData 2019: 323-327 - [c93]Mohammad El-Hajj, Ahmad Fadlallah, Maroun Chamoun, Ahmed Serhrouchni:
Ethereum for Secure Authentication of IoT using Pre-Shared Keys (PSKs). WINCOM 2019: 1-7 - 2018
- [j13]Mohamed Tahar Hammi, Badis Hammi, Patrick Bellot, Ahmed Serhrouchni:
Bubbles of Trust: A decentralized blockchain-based authentication system for IoT. Comput. Secur. 78: 126-142 (2018) - [j12]Osman Salem, Ahmed Serhrouchni, Ahmed Mehaoua, Raouf Boutaba:
Event Detection in Wireless Body Area Networks Using Kalman Filter and Power Divergence. IEEE Trans. Netw. Serv. Manag. 15(3): 1018-1034 (2018) - [j11]Pengwenlong Gu, Cunqing Hua, Rida Khatoun, Yue Wu, Ahmed Serhrouchni:
Cooperative Antijamming Relaying for Control Channel Jamming in Vehicular Networks. IEEE Trans. Veh. Technol. 67(8): 7033-7046 (2018) - [c92]Mohammed El-hajj, Maroun Chamoun, Ahmad Fadlallah, Ahmed Serhrouchni:
Analysis of Cryptographic Algorithms on IoT Hardware platforms. CSNet 2018: 1-5 - [c91]Zhenzhe Zhong, Isabelle Hamchaoui, Rida Khatoun, Ahmed Serhrouchni:
Performance evaluation of CQIC and TCP BBR in mobile network. ICIN 2018: 1-5 - [c90]Adja Elloh Yves-Christian, Badis Hammi, Ahmed Serhrouchni, Houda Labiod:
Total Eclipse: How To Completely Isolate a Bitcoin Peer. SSIC 2018: 1-7 - [c89]Mohamed Tahar Hammi, Patrick Bellot, Ahmed Serhrouchni:
BCTrust: A decentralized authentication blockchain-based mechanism. WCNC 2018: 1-6 - [c88]Zhenzhe Zhong, Isabelle Hamchaoui, Alexandre Ferrieux, Rida Khatoun, Ahmed Serhrouchni:
CDBE: A cooperative way to improve end-to-end congestion control in mobile network. WiMob 2018: 216-223 - [c87]Pengwenlong Gu, Cunqing Hua, Rida Khatoun, Yue Wu, Ahmed Serhrouchni:
Cooperative relay beamforming for control channel jamming in vehicular networks. WiOpt 2018: 1-7 - 2017
- [c86]Mayssa Jemel, Mounira Msahli, Ahmed Serhrouchni:
Towards an Efficient File Synchronization between Digital Safes. AINA 2017: 136-143 - [c85]Zakarya Drias, Ahmed Serhrouchni, Olivier Vogel:
Identity-based cryptography (IBC) based key management system (KMS) for industrial control systems (ICS). CSNet 2017: 1-10 - [c84]Mohammed El-hajj, Maroun Chamoun, Ahmad Fadlallah, Ahmed Serhrouchni:
Analysis of authentication techniques in Internet of Things (IoT). CSNet 2017: 1-3 - [c83]Batoul Haidar, Maroun Chamoun, Ahmed Serhrouchni:
Multilingual cyberbullying detection system: Detecting cyberbullying in Arabic content. CSNet 2017: 1-8 - [c82]Mohamed Tahar Hammi, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni, Pascale Minet:
A lightweight IoT security protocol. CSNet 2017: 1-8 - [c81]Badis Hammi, Jean Philippe Monteuuis, Houda Labiod, Rida Khatoun, Ahmed Serhrouchni:
Using butterfly keys: A performance study of pseudonym certificates requests in C-ITS. CSNet 2017: 1-6 - [c80]Pengwenlong Gu, Cunqing Hua, Rida Khatoun, Yue Wu, Ahmed Serhrouchni:
Cooperative Anti-Jamming Relaying for Control Channel Jamming in Vehicular Networks. GLOBECOM 2017: 1-6 - [c79]Mayssa Jemel, Ahmed Serhrouchni:
Decentralized Access Control Mechanism with Temporal Dimension Based on Blockchain. ICEBE 2017: 177-182 - [c78]Mounira Msahli, Ahmed Serhrouchni, Houda Labiod, Arnaud Kaiser, Brigitte Lonc:
TLS for Cooperative ITS Services. IOV 2017: 176-189 - [c77]Pengwenlong Gu, Rida Khatoun, Youcef Begriche, Ahmed Serhrouchni:
Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks. WCNC 2017: 1-6 - 2016
- [j10]Rida Khatoun, Youcef Begriche, Juliette Dromard, Lyes Khoukhi, Ahmed Serhrouchni:
A statistical trust system in wireless mesh networks. Ann. des Télécommunications 71(5-6): 187-199 (2016) - [c76]Mayssa Jemel, Mounira Msahli, Ahmed Serhrouchni:
SyncDS: A digital safe based file synchronization approach. CCNC 2016: 317-318 - [c75]Pengwenlong Gu, Rida Khatoun, Youcef Begriche, Ahmed Serhrouchni:
Vehicle Driving Pattern Based Sybil Attack Detection. HPCC/SmartCity/DSS 2016: 1282-1288 - [c74]Samih Souissi, Ahmed Serhrouchni, Layth Sliman, Benoit Charroux:
Security Incident Response: Towards a Novel Decision-Making System. ISDA 2016: 667-676 - [c73]Mounira Msahli, Ahmed Serhrouchni, Mohamad Badra:
Extending TLS with KMIP Protocol for Cloud Computing. NTMS 2016: 1-6 - 2015
- [c72]Mayssa Jemel, Mounira Msahli, Ahmed Serhrouchni:
Digital safe: Secure synchronization of shared files. IAS 2015: 67-72 - [c71]Abdelhamid Makiou, Ahmed Serhrouchni:
Efficient training data extraction framework for intrusion detection systems. NOF 2015: 1-4 - [c70]Zakarya Drias, Ahmed Serhrouchni, Olivier Vogel:
Taxonomy of attacks on industrial control protocols. CFIP/NOTERE 2015: 1-6 - [c69]Mayssa Jemel, Ahmed Serhrouchni:
Toward user's devices collaboration to distribute securely the client side storage. CFIP/NOTERE 2015: 1-6 - [c68]Marion Vasseur, Rida Khatoun, Ahmed Serhrouchni:
Survey on packet marking fields and information for IP traceback. CFIP/NOTERE 2015: 1-8 - [c67]Zakarya Drias, Ahmed Serhrouchni, Olivier Vogel:
Analysis of cyber security for industrial control systems. SSIC 2015: 1-8 - [c66]Fouad Amine Guenane, Ahmed Serhrouchni:
Secure access & authentication for collaborative intercloud exchange service. SSIC 2015: 1-5 - [c65]Rida Khatoun, P. Gut, R. Doulami, Lyes Khoukhi, Ahmed Serhrouchni:
A reputation system for detection of black hole attack in vehicular networking. SSIC 2015: 1-5 - [c64]Mounira Msahli, Mohamed Tahar Hammi, Ahmed Serhrouchni:
Safe box cloud authentication using TLS extesion. SSIC 2015: 1-6 - [c63]Marion Vasseur, Xiuzhen Chen, Rida Khatoun, Ahmed Serhrouchni:
Survey on packet marking fields and information for IP traceback. SSIC 2015: 1-8 - [c62]Fouad Amine Guenane, Michele Nogueira Lima, Ahmed Serhrouchni:
DDOS Mitigation Cloud-Based Service. TrustCom/BigDataSE/ISPA (1) 2015: 1363-1368 - 2014
- [j9]Somia Natouri, Chidung Lac, Ahmed Serhrouchni:
A Model-Based Resilience Analysis for IMS. J. Networks 9(3): 588-603 (2014) - [c61]Abdelhamid Makiou, Youcef Begriche, Ahmed Serhrouchni:
Improving Web Application Firewalls to detect advanced SQL injection attacks. IAS 2014: 35-40 - [c60]Mayssa Jemel, Ahmed Serhrouchni:
Security assurance of local data stored by HTML5 web application. IAS 2014: 47-52 - [c59]Mayssa Jemel, Ahmed Serhrouchni:
Content protection and secure synchronization of HTML5 local storage data. CCNC 2014 - [c58]Abdelhamid Makiou, Youcef Begriche, Ahmed Serhrouchni:
Hybrid approach to detect SQLi attacks and evasion techniques. CollaborateCom 2014: 452-456 - [c57]Mounira Msahli, Ahmed Serhrouchni:
PCM in cloud. GrC 2014: 201-206 - [c56]Samih Souissi, Ahmed Serhrouchni:
AIDD: A novel generic attack modeling approach. HPCS 2014: 580-583 - [c55]Mounira Msahli, Xiuzhen Chen, Ahmed Serhrouchni:
Towards a Fine-Grained Access Control for Cloud. ICEBE 2014: 286-291 - [c54]Mayssa Jemel, Ahmed Serhrouchni:
Security enhancement of HTML5 Local Data Storage. NOF 2014: 1-2 - [c53]Balkis Hamdane, Sihem Guemara El Fatmi, Ahmed Serhrouchni:
A novel name-based security mechanism for information-centric networking. WCNC 2014: 2928-2933 - 2013
- [c52]Mounira Msahli, Ahmed Serhrouchni:
SBaaS: Safe Box as a service. CollaborateCom 2013: 143-147 - [c51]Hachem Guerid, Karel Mittig, Ahmed Serhrouchni:
Collaborative approach for inter-domain botnet detection in large-scale networks. CollaborateCom 2013: 279-288 - [c50]Balkis Hamdane, Mounira Msahli, Ahmed Serhrouchni, Sihem Guemara El Fatmi:
Data-based access control in named data networking. CollaborateCom 2013: 531-536 - [c49]Hachem Guerid, Karel Mittig, Ahmed Serhrouchni:
Privacy-preserving domain-flux botnet detection in a large scale network. COMSNETS 2013: 1-9 - [c48]Balkis Hamdane, Ahmed Serhrouchni, Sihem Guemara El Fatmi:
Access control enforcement in Named Data Networking. ICITST 2013: 576-581 - [c47]Mounira Msahli, Rached Abdeljaoued, Ahmed Serhrouchni:
Access control in probative value Cloud. ICITST 2013: 607-611 - 2011
- [c46]Joël Dumoulin, Maria Sokhn, Elena Mugellini, Omar Abou Khaled, Ahmed Serhrouchni:
Multiview Browsing and Visualization of Distributed Information. NOTERE 2011: 1-7 - [c45]Maria Sokhn, Elena Mugellini, Omar Abou Khaled, Ahmed Serhrouchni:
End-to-End Adaptive Framework for Multimedia Information Retrieval. WWIC 2011: 197-206 - [e1]Isabelle M. Demeure, Thomas Robert, Ahmed Serhrouchni:
11th Annual International Conference on New Technologies of Distributed Systems, NOTERE 2011, Paris, France, 9-13 May 2011. IEEE 2011, ISBN 978-1-4577-0729-2 [contents] - 2010
- [j8]Maria Sokhn, Elena Mugellini, Omar Abou Khaled, Ahmed Serhrouchni:
Conference knowledge modelling for conference-video-recordings querying and visualization. J. Multim. Process. Technol. 1(2): 95-111 (2010) - [c44]Youcef Begriche, Ahmed Serhrouchni:
Bayesian statistical analysis for spams. LCN 2010: 989-992 - [c43]Radwane Saad, Ahmed Serhrouchni, Ken Chen:
hTracker: towards a Service Provider Oriented Peer-to-peer architecture. NOTERE 2010: 25-32
2000 – 2009
- 2009
- [c42]Maria Sokhn, Francesco Carrino, Elena Mugellini, Omar Abou Khaled, Ahmed Serhrouchni:
Conference knowledge modeling for conference-video-recordings querying & visualization. MEDES 2009: 226-232 - [c41]Mohamad Badra, Ahmed Serhrouchni, Thomas Guillet:
Random Values, Nonce and Challenges: Semantic Meaning versus Opaque and Strings of Data. VTC Fall 2009 - 2008
- [c40]André Ribeiro Cardoso, Ahmed Serhrouchni, Erick Aguiar Donato, Joaquim Celestino Jr., Mikaël Salaün:
An Infrastructure of Programmable Networks for Peer-to-Peer Applications. AICT 2008: 46-51 - [c39]Maroun Chamoun, Rima Kilany, Ahmed Serhrouchni:
A Service Oriented P2P architecture with semantic support. ICON 2008: 1-6 - [c38]Radwane Saad, Farid Naït-Abdesselam, Ahmed Serhrouchni:
A collaborative peer-to-peer architecture to defend against DDoS attacks. LCN 2008: 427-434 - [c37]Marguerite Fayçal, Ahmed Serhrouchni:
NETPOPPS: A Network Provider Oriented Peer-to-Peer System. NTMS 2008: 1-6 - [c36]Thomas Guillet, Ahmed Serhrouchni, Mohamad Badra:
Mutual Authentication for SIP: A Semantic Meaning for the SIP Opaque Values. NTMS 2008: 1-6 - [c35]Rida Khatoun, Guillaume Doyen, Dominique Gaïti, Radwane Saad, Ahmed Serhrouchni:
Decentralized Alerts Correlation Approach for DDoS Intrusion Detection. NTMS 2008: 1-5 - 2007
- [c34]André Ribeiro Cardoso, Ahmed Serhrouchni, Joaquim Celestino Jr., Mikaël Salaün:
Convergence among Peer-to-Peer and Programmable Networks. ECUMN 2007: 45-51 - [c33]Marguerite Fayçal, Ahmed Serhrouchni:
CAP: A Context-Aware Peer-to-Peer System. OTM Workshops (2) 2007: 950-959 - 2006
- [j7]Ahmed Serhrouchni, Ibrahim Hajjeh:
Intégrationfr de la signature numérique au protocole SSL/TLS. Ann. des Télécommunications 61(5-6): 522-541 (2006) - [c32]Ahmad Fadlallah, Ahmed Serhrouchni:
PSAT: Proactive Signaling Architecture for IP Traceback. CNSR 2006: 293-299 - [c31]Carole Bassil, Ahmed Serhrouchni, Nicolas Rouhana:
Towards a new Security Architecture for Telephony. ICN/ICONS/MCL 2006: 3 - [c30]Carole Bassil, Ahmed Serhrouchni, Nicolas Rouhana:
Simple voice security protocol. IWCMC 2006: 367-372 - [c29]Ines Feki, Xiaoli Zheng, Mohammed Achemlal, Ahmed Serhrouchni:
Internet Routing Security: An Approach to Detect and to React to Incorrect Advertisements. SECRYPT 2006: 110-117 - 2005
- [j6]Cédric Llorens, Ahmed Serhrouchni:
Mesurer la sécurité d'un réseau d'un opérateur de télécommunication. Ann. des Télécommunications 60(11-12): 1439-1465 (2005) - [j5]Artur Hecker, Houda Labiod, Guy Pujolle, Hossam Afifi, Ahmed Serhrouchni, Pascal Urien:
A New Access Control Solution for a Multi-Provider Wireless Environment. Telecommun. Syst. 29(2): 131-152 (2005) - [c28]Jacques Demerjian, Ibrahim Hajjeh, Ahmed Serhrouchni, Mohamad Badra:
Network Security using E-DHCP over NAT/IPSEC. Web Technologies, Applications, and Services 2005: 53-58 - [c27]Ahmad Fadlallah, Ahmed Serhrouchni:
A signaling architecture against dos attacks. ICETE 2005: 216-221 - [c26]Carole Bassil, Ahmed Serhrouchni, Nicolas Rouhana:
Critical Analysis and New Perspective for Securing Voice Networks. ICN (2) 2005: 810-818 - [c25]Cédric Llorens, Ahmed Serhrouchni:
Security Verification of a Virtual Private Network over MPLS. Net-Con 2005: 339-353 - [c24]Taghrid Asfour-Block, Ahmed Serhrouchni:
Reliable Multicast over Satellite Networks. ISCC 2005: 698-703 - [c23]André Ribeiro Cardoso, Ahmed Serhrouchni, Bertrand Mathieu, Mikaël Salaün:
Service Deployment in Active Networks Based on a P2P System. MATA 2005: 172-181 - 2004
- [j4]Maroun Chamoun, Rima Kilany, Ahmed Serhrouchni:
Architecture d'un réseau actif à base de services Web. Ann. des Télécommunications 59(5-6): 615-640 (2004) - [j3]Mohamad Badra, Ahmed Serhrouchni, Pascal Urien:
A lightweight identity authentication protocol for wireless networks. Comput. Commun. 27(17): 1738-1745 (2004) - [c22]Jacques Demerjian, Ahmed Serhrouchni, Mohammed Achemlal:
Certificate-Based Access Control and Authentication for DHCP. ICETE (2) 2004: 99-106 - [c21]Ibrahim Hajjeh, Ahmed Serhrouchni:
Integrating a Signature Module in SSL/TLS. ICETE (2) 2004: 305-310 - [c20]Jacques Demerjian, Ahmed Serhrouchni:
DHCP Authentication Using Certificates. SEC 2004: 457-472 - 2003
- [c19]Ibrahim Hajjeh, Ahmed Serhrouchni, Frédérique Tastet:
ISAKMP handshake for SSL/TLS. GLOBECOM 2003: 1481-1485 - [c18]Ibrahim Hajjeh, Ahmed Serhrouchni, Frédérique Tastet:
New Key Management Protocol for SSL/TLS. Net-Con 2003: 251-262 - [c17]Mohamad Badra, Ahmed Serhrouchni:
Light TLS: Extended Handshake for Wireless Communications. MWCN 2003 - [c16]Mohamad Badra, Ahmed Serhrouchni:
A new secure session exchange key protocol for wireless communications. PIMRC 2003: 2765-2769 - 2002
- [c15]Rim Hammi, Prométhée Spathis, Dany Zebiane, Ken Chen, Ahmed Serhrouchni, Kim Loan Thai:
Deployment and Experimentation of an active network at a: large scale: AMARRAGE. Net-Con 2002: 141-152 - [c14]Ahmed Serhrouchni, Adil Andaloussi, Abdel Obaid:
A solution for improving TCP performance over wireless links. Net-Con 2002: 457-468 - [c13]Rima Kilany, Ahmed Serhrouchni:
Using distributed component model for active service deployment. ISCC 2002: 258-263 - 2001
- [c12]Taghrid Asfour, Ahmed Serhrouchni:
The Coexistence of Multicast and Unicast over a GPS Capable Network. ICN (1) 2001: 589-598 - [c11]Taghrid Asfour, Ahmed Serhrouchni:
RMTP Performance in Heterogeneous Environments & a New QoS-Based Mechanism for Building RMTP Trees. ISCC 2001: 160-165 - 2000
- [j2]Gerard J. Holzmann, Elie Najm, Ahmed Serhrouchni:
SPIN Model Checking: An Introduction. Int. J. Softw. Tools Technol. Transf. 2(4): 321-327 (2000) - [j1]Sara Oueslati-Boulahia, Ahmed Serhrouchni, Samir Tohmé, S. Baier, Marouane Berrada:
TCP over satellite links: Problems and solutions. Telecommun. Syst. 13(2-4): 199-212 (2000) - [c10]Taghrid Asfour, Ahmed Serhrouchni:
Performance Evaluation of RMTP Using NS and RMTP Integration in Current Networks. INTERWORKING 2000: 147-159 - [c9]Taghrid Asfour, Stephan Block, Ahmed Serhrouchni, Samir Tohmé:
Contractual Group Membership CGM: A New Mechanism for Multicast Group Management. ISCC 2000: 666-671
1990 – 1999
- 1999
- [c8]Stephan Block, Ken Chen, Philippe Godlewski, Ahmed Serhrouchni:
Some Design Issues of SRMTP, a Scalable Reliable Multicast Transport Protocol. ECMAST 1999: 423-440 - [c7]Omar Cherkaoui, Nathalie Rico, Ahmed Serhrouchni:
SNMPv3 Can Still be Simple? Integrated Network Management 1999: 501-515 - 1998
- [c6]Omar Cherkaoui, Ylian Saint Hillaire, Hafedh Mili, Abdellatif Obaid, Ahmed Serhrouchni:
The modularity of SNMPv3. ISCC 1998: 120-124 - [c5]Mostafa Hashem Sherif, Ahmed Serhrouchni, A. Yassin Gaid, Farshid Farazmandnia:
SET and SSL: electronic payments on the Internet. ISCC 1998: 353-358 - [c4]Omar Cherkaoui, Ylian Saint-Hilaire, Hafedh Mili, Ahmed Serhrouchni:
Towards a modular and interoperable SNMPv3. NOMS 1998: 391-394 - [c3]Omar Cherkaoui, Abdellatif Obaid, Ahmed Serhrouchni, Noëmie Simoni:
QOS metrics tool using management by delegation. NOMS 1998: 836-839 - 1996
- [c2]Siedfried Löffler, Ahmed Serhrouchni:
Creating implementations from Promela models. The Spin Verification System 1996: 91-99 - 1990
- [c1]J. Queiroz, Ahmed Serhrouchni, P. Cunha, Elie Najm:
PIL: A Tool for Pre-implementation of LOTOS. FORTE 1990: 567-570
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-21 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint