default search action
Hatem Bettahar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2012
- [j13]H. Ragab Hassen, Hatem Bettahar, Abdelmadjid Bouabdallah, Yacine Challal:
An efficient key management scheme for content access control for linear hierarchies. Comput. Networks 56(8): 2107-2118 (2012) - 2011
- [j12]Mothanna Alkubeily, Hatem Bettahar, Abdelmadjid Bouabdallah:
A new Application-Level Multicast technique for stable, robust and efficient overlay tree construction. Comput. Networks 55(15): 3332-3350 (2011) - 2009
- [j11]Hatem Bettahar, Mothanna Alkubeily, Abdelmadjid Bouabdallah:
TKS: a transition key management scheme for secure application level multicast. Int. J. Secur. Networks 4(4): 210-222 (2009) - 2008
- [j10]Yacine Challal, Said Gharout, Abdelmadjid Bouabdallah, Hatem Bettahar:
Adaptive clustering for scalable key management in dynamic group communications. Int. J. Secur. Networks 3(2): 133-146 (2008) - 2007
- [j9]H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Bettahar, Yacine Challal:
Key management for content access control in a hierarchy. Comput. Networks 51(11): 3197-3219 (2007) - 2005
- [j8]Yacine Challal, Abdelmadjid Bouabdallah, Hatem Bettahar:
H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming. Comput. Secur. 24(1): 57-68 (2005) - [j7]Mounir Kellil, Imed Romdhani, Hong-Yon Lach, Abdelmadjid Bouabdallah, Hatem Bettahar:
Multicast receiver and sender access control and its applicability to mobile IP environments: A survey. IEEE Commun. Surv. Tutorials 7(1-4): 46-70 (2005) - 2004
- [j6]Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah:
SAKM: a scalable and adaptive key management approach for multicast communications. Comput. Commun. Rev. 34(2): 55-70 (2004) - [j5]Imed Romdhani, Mounir Kellil, Hong-Yon Lach, Abdelmadjid Bouabdallah, Hatem Bettahar:
IP Mobile multicast: Challenges and solutions. IEEE Commun. Surv. Tutorials 6(1-4): 18-41 (2004) - [j4]Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah:
A taxonomy of multicast data origin authentication: Issues and solutions. IEEE Commun. Surv. Tutorials 6(1-4): 34-57 (2004) - 2003
- [j3]Hamida Seba, Abdelmadjid Bouabdallah, Nadjib Badache, Hatem Bettahar, Djamel Tandjaoui:
Gestion de clés et sécurité multipoint: étude et perspectives. Ann. des Télécommunications 58(7-8): 1090-1129 (2003) - 2002
- [j2]Hatem Bettahar, Abdelmadjid Bouabdallah:
GMRP: problème généralisé de routage multipoint. Ann. des Télécommunications 57(9-10): 996-1012 (2002) - [j1]Hatem Bettahar, Abdelmadjid Bouabdallah:
A new approach for delay-constrained routing. Comput. Commun. 25(18): 1751-1764 (2002)
Conference and Workshop Papers
- 2008
- [c20]Mothanna Alkubeily, Hatem Bettahar, Abdelmadjid Bouabdallah:
Impact of Cheating and Non-Cooperation on the Stability and the Performances of Application-Level Multicast Sessions. IAS 2008: 141-146 - 2007
- [c19]H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Bettahar:
A New and Efficient Key Management Scheme for Content Access Control within Tree Hierarchies. AINA Workshops (1) 2007: 551-556 - [c18]Hatem Bettahar, Mothanna Alkubeily:
Efficient Key Management Scheme for Secure Application Level Multicast. ISCC 2007: 489-494 - 2006
- [c17]Imed Romdhani, Jose Munoz, Hatem Bettahar, Abdelmadjid Bouabdallah:
Mobile Multicast Route Optimisation. ICC 2006: 1977-1983 - [c16]Imed Romdhani, Hatem Bettahar, Abdelmadjid Bouabdallah:
Transparent Handover for Mobile Multicast Sources. ICN/ICONS/MCL 2006: 145 - [c15]Imed Romdhani, Jose Munoz, Hatem Bettahar, Abdelmadjid Bouabdallah:
Hierarchical Home Agent Architecture for Mobile IP Communications. ISCC 2006: 136-141 - [c14]Yoann Hinard, Hatem Bettahar, Yacine Challal, Abdelmadjid Bouabdallah:
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks. ISCC 2006: 662-667 - [c13]Yoann Hinard, Hatem Bettahar, Yacine Challal, Abdelmadjid Bouabdallah:
AAA based security architecture for multicast content distribution. ISCN 2006: 85-90 - [c12]Imed Romdhani, Jose Munoz, Hatem Bettahar, Abdelmadjid Bouabdallah:
Adaptive Multicast Membership Management for Mobile Multicast Receivers. WiMob 2006: 189-195 - 2005
- [c11]H. Ragab Hassan, Abdelmadjid Bouabdallah, Hatem Bettahar, Yacine Challal:
An Efficient Key Management Algorithm for Hierarchical Group Communication. SecureComm 2005: 270-276 - 2004
- [c10]Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah:
Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication. HSNMC 2004: 1056-1067 - [c9]Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah:
A2cast: an adaptive source authentication protocol for multicast streams. ISCC 2004: 363-368 - [c8]Imed Romdhani, Mounir Kellil, Hong-Yon Lach, Abdelmadjid Bouabdallah, Hatem Bettahar:
Mobility-Aware Rendezvous Point for Mobile Multicast Sources. WWIC 2004: 62-73 - [c7]Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah:
A Scalable and Adaptive Key Management Protocol for Group Communication. WWIC 2004: 260-271 - 2003
- [c6]Djamel Tandjaoui, Nadjib Badache, Hatem Bettahar, Abdelmadjid Bouabdallah, Hamida Seba:
Performance Enhancement of Smooth Handoff in Mobile IP by Reducing Packets Disorder. ISCC 2003: 149-154 - [c5]Aaron Striegel, Abdelmadjid Bouabdallah, Hatem Bettahar, G. Manimaran:
EBM: A New Approach for Scalable DiffServ Multicasting. Networked Group Communication 2003: 131-142 - 2002
- [c4]Hatem Bettahar, Abdelmadjid Bouabdallah, Yacine Challal:
AKMP: an adaptive key management protocol for secure multicast. ICCCN 2002: 190-195 - 2001
- [c3]Hatem Bettahar, Abdelmadjid Bouabdallah:
QoS Routing Protocol for the Generalized Multicast Routing Problem (GMRP). ICN (1) 2001: 630-639 - [c2]Hatem Bettahar, Christophe Beaujean, Abdelmadjid Bouabdallah, Stéphane Cateloin:
A Simple Resource Reservation Protocol for Multicast Communications. ISCC 2001: 139-144 - 1999
- [c1]Hatem Bettahar, Abdelmadjid Bouabdallah:
A Scalable Multicast Protocol for Delay-Constrained Shared Multicast Tree Construction. ISCC 1999: 58-64
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint