2005 |
5 | | Karlo Berket,
Abdelilah Essiari,
Mary R. Thompson:
Securing Resources in Collaborative Environments: A Peer-to-Peer Approach.
IASTED PDCS 2005: 588-593 |
2004 |
4 | EE | Karlo Berket,
Abdelilah Essiari,
Artur Muratas:
PKI-Based Security for Peer-to-Peer Information Sharing.
Peer-to-Peer Computing 2004: 45-52 |
3 | EE | Emmanuel Bresson,
Olivier Chevassut,
Abdelilah Essiari,
David Pointcheval:
Mutual authentication and group key agreement for low-power mobile devices.
Computer Communications 27(17): 1730-1737 (2004) |
2003 |
2 | EE | Mary R. Thompson,
Abdelilah Essiari,
Srilekha Mudumbai:
Certificate-based authorization policy in a PKI environment.
ACM Trans. Inf. Syst. Secur. 6(4): 566-588 (2003) |
1 | EE | Mary R. Thompson,
Abdelilah Essiari,
Katarzyna Keahey,
Von Welch,
S. Lang,
B. Liu:
Fine-Grained Authorization for Job and Resource Management Using Akenti and the Globus Toolkit
CoRR cs.DC/0306070: (2003) |