Magdi M. S. El-Soudani
List of publications from the
2008 |
7 | EE | Marianne Azer,
Sherif El-Kassas,
Abdel Wahab F. Hassan,
Magdy M. S. El-Soudani:
Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme.
ARES 2008: 636-641 |
6 | EE | Marianne Azer,
Sherif El-Kassas,
Abdel Wahab F. Hassan,
Magdy M. S. El-Soudani:
A Survey on Trust and Reputation Schemes in Ad Hoc Networks.
ARES 2008: 881-886 |
2007 |
5 | EE | Marianne Azer,
Sherif El-Kassas,
Magdy M. S. El-Soudani:
Certification and Revocation Schemes in Ad Hoc Networks Survey and Challenges.
ICSNC 2007: 17 |
4 | EE | Marianne Azer,
Sherif El-Kassas,
Magdy M. S. El-Soudani:
Threshold Cryptography and Authentication in Ad Hoc Networks Survey and Challenges.
ICSNC 2007: 5 |
2006 |
3 | | Marianne Azer,
Sherif El-Kassas,
Magdi M. S. El-Soudani:
Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection.
SECRYPT 2006: 63-68 |
2003 |
2 | | Magdi M. S. El-Soudani,
Mohamed A. Eissa:
Cooperative Defense Firewall Protocol.
SEC 2003: 373-384 |
2002 |
1 | | Magdi M. S. El-Soudani,
H. S. El-Refaey,
H. M. Mourad:
Zero Knowledge Broadcasting Identification Scheme.
SEC 2002: 227-238 |