Magdi M. S. El-Soudani
List of publications from the DBLP Bibliography Server - FAQ
2008 | ||
---|---|---|
7 | EE | Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy M. S. El-Soudani: Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme. ARES 2008: 636-641 |
6 | EE | Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy M. S. El-Soudani: A Survey on Trust and Reputation Schemes in Ad Hoc Networks. ARES 2008: 881-886 |
2007 | ||
5 | EE | Marianne Azer, Sherif El-Kassas, Magdy M. S. El-Soudani: Certification and Revocation Schemes in Ad Hoc Networks Survey and Challenges. ICSNC 2007: 17 |
4 | EE | Marianne Azer, Sherif El-Kassas, Magdy M. S. El-Soudani: Threshold Cryptography and Authentication in Ad Hoc Networks Survey and Challenges. ICSNC 2007: 5 |
2006 | ||
3 | Marianne Azer, Sherif El-Kassas, Magdi M. S. El-Soudani: Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection. SECRYPT 2006: 63-68 | |
2003 | ||
2 | Magdi M. S. El-Soudani, Mohamed A. Eissa: Cooperative Defense Firewall Protocol. SEC 2003: 373-384 | |
2002 | ||
1 | Magdi M. S. El-Soudani, H. S. El-Refaey, H. M. Mourad: Zero Knowledge Broadcasting Identification Scheme. SEC 2002: 227-238 |
1 | Marianne Azer | [3] [4] [5] [6] [7] |
2 | Mohamed A. Eissa | [2] |
3 | Sherif El-Kassas | [3] [4] [5] [6] [7] |
4 | H. S. El-Refaey | [1] |
5 | Abdel Wahab F. Hassan | [6] [7] |
6 | H. M. Mourad | [1] |