dblp.uni-trier.dewww.uni-trier.de

Yacine Challal

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
13EEAbdelraouf Ouadjaout, Yacine Challal, Noureddine Lasla, Miloud Bagaa: SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks. ARES 2008: 503-508
12EEYacine Challal, Said Gharout, Abdelmadjid Bouabdallah, Hatem Bettahar: Adaptive clustering for scalable key management in dynamic group communications. IJSN 3(2): 133-146 (2008)
2007
11EEMiloud Bagaa, Noureddine Lasla, Abdelraouf Ouadjaout, Yacine Challal: SEDAN: Secure and Efficient protocol for Data Aggregation in wireless sensor Networks. LCN 2007: 1053-1060
10EEH. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Bettahar, Yacine Challal: Key management for content access control in a hierarchy. Computer Networks 51(11): 3197-3219 (2007)
2006
9EEYoann Hinard, Hatem Bettahar, Yacine Challal, Abdelmadjid Bouabdallah: Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks. ISCC 2006: 662-667
8EEYoann Hinard, Hatem Bettahar, Yacine Challal, Abdelmadjid Bouabdallah: AAA based security architecture for multicast content distribution. ISCN 2006: 85-90
2005
7EEYacine Challal, Abdelmadjid Bouabdallah, Yoann Hinard: RLH: receiver driven layered hash-chaining for multicast data origin authentication. Computer Communications 28(7): 726-740 (2005)
6EEYacine Challal, Abdelmadjid Bouabdallah, Hatem Bettahar: H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming. Computers & Security 24(1): 57-68 (2005)
2004
5EEYacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah: Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication. HSNMC 2004: 1056-1067
4EEYacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah: A2cast: an adaptive source authentication protocol for multicast streams. ISCC 2004: 363-368
3EEYacine Challal, Abdelmadjid Bouabdallah, Yoann Hinard: Efficient Multicast Source Authentication using Layered Hash-Chaining Scheme. LCN 2004: 411-412
2EEYacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah: A Scalable and Adaptive Key Management Protocol for Group Communication. WWIC 2004: 260-271
1EEYacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah: SAKM: a scalable and adaptive key management approach for multicast communications. Computer Communication Review 34(2): 55-70 (2004)

Coauthor Index

1Miloud Bagaa [11] [13]
2Hatem Bettahar [1] [2] [4] [5] [6] [8] [9] [10] [12]
3Abdelmadjid Bouabdallah [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [12]
4Said Gharout [12]
5H. Ragab Hassen [10]
6Yoann Hinard [3] [7] [8] [9]
7Noureddine Lasla [11] [13]
8Abdelraouf Ouadjaout [11] [13]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)