Date


School

Output Type

Download Available

57 results

Security and Routing Scoped IP Multicast Addresses

Conference Proceeding
Romdhani, I., Al-Dubai, A., & Kellil, M. (2009)
Security and Routing Scoped IP Multicast Addresses. In International Conference on Parallel Processing Workshops, 2009. ICPPW '09. , (228-235). https://doi.org/10.1109/icppw.2009.81
IP multicast is an efficient and scalable network layer delivering method for multimedia content to a large number of receivers across the Internet. It saves the network bandw...

Mobile Multicast Route Optimisation

Conference Proceeding
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006)
Mobile Multicast Route Optimisation. In IEEE International Conference on Communications, 2006. ICC '06, 1977-1983. doi:10.1109/icc.2006.255060
The multiparty nature of multicast applications presents new challenges for Mobile IP users. Unfortunately, when a multicast receiver is mobile, it will experience additional ...

Coded path routing: a new approach to broadcasting in 3-D meshes, Technical Report

Conference Proceeding
Al-Dubai, A., & Ould-Khaoua, M. (2002)
Coded path routing: a new approach to broadcasting in 3-D meshes, Technical Report. In Conference Proceedings of the 2001 IEEE International Performance, Computing, and Communications Conference (Cat. No.01CH37210), 155-162. https://doi.org/10.1109/IPCCC.2001.918648
Broadcast is an important collective communication operation required by many real-world parallel applications. This paper proposes the Coded Path Routing (or CPR for short) a...

A Multi-attributes-based Trust Model of Internet of Vehicle

Conference Proceeding
Ou, W., Luo, E., Tan, Z., Xiang, L., Yi, Q., & Tian, C. (2019)
A Multi-attributes-based Trust Model of Internet of Vehicle. In Network and System Security. , (706-713). https://doi.org/10.1007/978-3-030-36938-5_45
Internet of Vehicle (IoV) is an open network and it changes in constant, where there are large number of entities. Effective way to keep security of data in IoV is to establis...

Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things

Conference Proceeding
Semedo, F., Moradpoor, N., & Rafiq, M. (2018)
Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things. In SIN '18 Proceedings of the 11th International Conference on Security of Information and Networkshttps://doi.org/10.1145/3264437.3264438
The Internet of Things (IoT) can be described as the ever-growing global network of objects with built-in sensing and communication interfaces such as sensors, Global Position...

Transparent Handover for Mobile Multicast Sources

Conference Proceeding
Romdhani, I., Bettahar, H., & Bouabdallah, A. (2006)
Transparent Handover for Mobile Multicast Sources. In International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006. ICN/ICONS/MCL 2006, 145-145. doi:10.1109/icniconsmcl.2006.217
The Internet research community has proposed many routing protocols to support efficient multicast application. However, these protocols were developed for multicast parties w...

The impact of routing schemes on group communication throughput in scalable networks.

Conference Proceeding
Al-Dubai, A. (2008)
The impact of routing schemes on group communication throughput in scalable networks. In Proceedings of the 2008 IEEE international parallel & distributed processing symposium, 1-8. https://doi.org/10.1109/IPDPS.2008.4536490
Multicast communication has been a major avenue for many studies in interconnection networks. However, such a communication pattern has been studied under either limited opera...

Enhanced Methods of Coursework Provision in Computer Networks.

Conference Proceeding
Buchanan, W. J., & Saliou, L. (2005)
Enhanced Methods of Coursework Provision in Computer Networks. In ITRE 2004. 2nd International Conference Information Technology: Research and Education, 111-115. https://doi.org/10.1109/ITRE.2004.1393657
Many computing-related programmes and modules have many problems caused with large class sizes, large-scale plagiarism, module franchising, and an increasing requirement from ...

Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things.

Conference Proceeding
Abdmeziem, R., Tandjaoui, D., & Romdhani, I. (2016)
Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things
Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirem...

Norms and standards in modular medical architectures.

Conference Proceeding
Fricker, S., Fiedler, M., Grottland, A., Jell, T., Magedanz, T., Thuemmler, C., …Paulin, A. (2014)
Norms and standards in modular medical architectures. In 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom) (IEEE Healthcom 2013), (382-387). https://doi.org/10.1109/HealthCom.2013.6720705
Recent Internet of Things (IoT) research has been aiming at interoperability of devices and the integration of sensor networks. The Future Internet - Private Public Partnershi...