dblp.uni-trier.dewww.uni-trier.de

Mohamed Saleh

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
11 Tarek Elfouly, Mohamed Saleh, Quatibah M. Malluhi: Efficient Forward Error Correction for Reliable Transmission in Packet Networks. PDPTA 2008: 103-109
2007
10EEMohamed Saleh, Mourad Debbabi: Modeling Security Protocols as Games. IAS 2007: 253-260
9EEMohamed Saleh, Mourad Debbabi: Verifying Security Properties of Cryptoprotocols: A Novel Approach. SEFM 2007: 349-360
8EEMohamed Saleh: Estimating market shares in each market segment using the information entropy concept. Applied Mathematics and Computation 190(2): 1735-1739 (2007)
7EEMohamed Saleh, Ali Reza Arasteh, Assaad Sakha, Mourad Debbabi: Forensic analysis of logs: Modeling and verification. Knowl.-Based Syst. 20(7): 671-682 (2007)
2006
6 Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua: Common Criteria Approach to J2ME CLDC Security Requirements. SoMeT 2006: 177-194
5EEMourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua: Security Evaluation of J2ME CLDC Embedded Java Platform. Journal of Object Technology 5(2): 125-154 (2006)
2005
4EEMourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua: Java for Mobile Devices: A Security Study. ACSAC 2005: 235-244
3EEMourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua: Security Analysis of Mobile Java. DEXA Workshops 2005: 231-235
2EEMourad Debbabi, Mohamed Saleh: Game Semantics Model for Security Protocols. ICFEM 2005: 125-140
1EEMourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua: Security Analysis of Wireless Java. PST 2005

Coauthor Index

1Ali Reza Arasteh [7]
2Mourad Debbabi [1] [2] [3] [4] [5] [6] [7] [9] [10]
3Tarek Elfouly [11]
4Quatibah M. Malluhi [11]
5Assaad Sakha [7]
6Chamseddine Talhi [1] [3] [4] [5] [6]
7Sami Zhioua [1] [3] [4] [5] [6]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)