Hatem Bettahar

According to our database1, Hatem Bettahar authored at least 33 papers between 1999 and 2012.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
An efficient key management scheme for content access control for linear hierarchies.
Comput. Networks, 2012

2011
A new Application-Level Multicast technique for stable, robust and efficient overlay tree construction.
Comput. Networks, 2011

2009
TKS: a transition key management scheme for secure application level multicast.
Int. J. Secur. Networks, 2009

2008
Adaptive clustering for scalable key management in dynamic group communications.
Int. J. Secur. Networks, 2008

Impact of Cheating and Non-Cooperation on the Stability and the Performances of Application-Level Multicast Sessions.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Key management for content access control in a hierarchy.
Comput. Networks, 2007

Efficient Key Management Scheme for Secure Application Level Multicast.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

A New and Efficient Key Management Scheme for Content Access Control within Tree Hierarchies.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Adaptive Multicast Membership Management for Mobile Multicast Receivers.
Proceedings of the 2006 IEEE International Conference on Wireless and Mobile Computing, 2006

AAA based security architecture for multicast content distribution.
Proceedings of the International Symposium on Computer Networks, 2006

Hierarchical Home Agent Architecture for Mobile IP Communications.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

Transparent Handover for Mobile Multicast Sources.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Mobile Multicast Route Optimisation.
Proceedings of IEEE International Conference on Communications, 2006

2005
Multicast receiver and sender access control and its applicability to mobile IP environments: A survey.
IEEE Commun. Surv. Tutorials, 2005

H<sub>2</sub>A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming.
Comput. Secur., 2005

An Efficient Key Management Algorithm for Hierarchical Group Communication.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

2004
IP Mobile multicast: Challenges and solutions.
IEEE Commun. Surv. Tutorials, 2004

A taxonomy of multicast data origin authentication: Issues and solutions.
IEEE Commun. Surv. Tutorials, 2004

SAKM: a scalable and adaptive key management approach for multicast communications.
Comput. Commun. Rev., 2004

Mobility-Aware Rendezvous Point for Mobile Multicast Sources.
Proceedings of the Wired/Wireless Internet Communications, Second International Conference, 2004

A Scalable and Adaptive Key Management Protocol for Group Communication.
Proceedings of the Wired/Wireless Internet Communications, Second International Conference, 2004

A<sup>2</sup>cast: an adaptive source authentication protocol for multicast streams.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

2003
Gestion de clés et sécurité multipoint: étude et perspectives.
Ann. des Télécommunications, 2003

EBM: A New Approach for Scalable DiffServ Multicasting.
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003

Performance Enhancement of Smooth Handoff in Mobile IP by Reducing Packets Disorder.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

2002
A new approach for delay-constrained routing.
Comput. Commun., 2002

GMRP: problème généralisé de routage multipoint.
Ann. des Télécommunications, 2002

AKMP: an adaptive key management protocol for secure multicast.
Proceedings of the 11th International Conference on Computer Communications and Networks, 2002

2001
A Simple Resource Reservation Protocol for Multicast Communications.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

QoS Routing Protocol for the Generalized Multicast Routing Problem (GMRP).
Proceedings of the Networking, 2001

1999
A Scalable Multicast Protocol for Delay-Constrained Shared Multicast Tree Construction.
Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 1999


  Loading...