Sardaouna Hamadou
Sardaouna Hamadou
INRIA Saclay, LIX École Polytechnique,
Verified email at
Cited by
Cited by
Reconciling belief and vulnerability in information flow
S Hamadou, V Sassone, C Palamidessi
2010 IEEE Symposium on Security and Privacy, 79-92, 2010
A flaw in the electronic commerce protocol SET
S Brlek, S Hamadou, J Mullins
Information Processing Letters 97 (3), 104-108, 2006
SMT-based cost optimization approach for the integration of avionic functions in IMA and TTEthernet architectures
S Beji, S Hamadou, A Gherbi, J Mullins
2014 IEEE/ACM 18th International Symposium on Distributed Simulation and …, 2014
A probabilistic energy-aware model for mobile ad-hoc networks
L Gallina, S Hamadou, A Marin, S Rossi
Analytical and Stochastic Modeling Techniques and Applications: 18th …, 2011
Interference-sensitive preorders for manets
M Bugliesi, L Gallina, A Marin, S Rossi, S Hamadou
2012 Ninth International Conference on Quantitative Evaluation of Systems …, 2012
Trust in anonymity networks
V Sassone, S Hamadou, M Yang
CONCUR 2010-Concurrency Theory: 21th International Conference, CONCUR 2010 …, 2010
Behavioural equivalences and interference metrics for mobile ad-hoc networks
M Bugliesi, L Gallina, S Hamadou, A Marin, S Rossi
Performance Evaluation 73, 41-72, 2014
Probable innocence in the presence of independent knowledge
S Hamadou, C Palamidessi, V Sassone, E ElSalamouny
Formal Aspects in Security and Trust: 6th International Workshop, FAST 2009 …, 2010
Trust in Crowds: probabilistic behaviour in anonymity protocols
V Sassone, E ElSalamouny, S Hamadou
International Symposium on Trustworthy Global Computing, 88-102, 2010
Amine El Kouhen, Abdelouahed Gherbi, Sardaouna Hamadou, John Mullins
T Robati
An Extension for AADL to Model Mixed-Criticality Avionic Systems Deployed on …, 2014
Quantifying leakage in the presence of unreliable sources of information
S Hamadou, C Palamidessi, V Sassone
Journal of Computer and System Sciences 88, 27-52, 2017
A game-theoretic analysis of cooperation in anonymity networks
M Yang, V Sassone, S Hamadou
Principles of Security and Trust: First International Conference, POST 2012 …, 2012
A framework for throughput and energy efficiency in mobile ad hoc networks
L Gallina, S Hamadou, A Marin, S Rossi
2011 IFIP Wireless Days (WD), 1-6, 2011
Theoretical information reuse and integration
T Bouabana-Tebibel, SH Rubin
Springer International Publishing, 2016
An analysis of trust in anonymity networks in the presence of adaptive attackers
S Hamadou, V Sassone, M Yang
Mathematical Structures in Computer Science 25 (2), 429-456, 2015
A Time-Triggered Constraint-Based Calculus for Avionic Systems
S Hamadou, J Mullins, A Gherbi, S Beji
IEEE International Symposium on Object/Component/Service-Oriented Real-Time …, 2015
A probabilistic scheduler for the analysis of cryptographic protocols
S Brlek, S Hamadou, J Mullins
Electronic Notes in Theoretical Computer Science 194 (1), 61-83, 2007
Some remarks on the certificates registration of the electronic commerce protocol set
S Brlek, S Hamadou, J Mullins
Advanced Int'l Conference on Telecommunications and Int'l Conference on …, 2006
Anonymous and secure electronic transaction protocol
S Brlek, S Hamadou, J Mullins
Annals of Telecommunications 5 (60), 530-557, 2005
Iterative integration of TTEthernet network flows
S Beji, S Hamadou, J Mullins, A Gherbi
International Journal of Critical Computer-Based Systems 9 (3), 167-192, 2019
The system can't perform the operation now. Try again later.
Articles 1–20