Sardaouna Hamadou
Sardaouna Hamadou
INRIA Saclay, LIX École Polytechnique,
Verified email at
Cited by
Cited by
Reconciling belief and vulnerability in information flow
S Hamadou, V Sassone, C Palamidessi
2010 IEEE Symposium on Security and Privacy, 79-92, 2010
A flaw in the electronic commerce protocol SET
S Brlek, S Hamadou, J Mullins
Information Processing Letters 97 (3), 104-108, 2006
SMT-based cost optimization approach for the integration of avionic functions in IMA and TTEthernet architectures
S Beji, S Hamadou, A Gherbi, J Mullins
2014 IEEE/ACM 18th International Symposium on Distributed Simulation and …, 2014
A probabilistic energy-aware model for mobile ad-hoc networks
L Gallina, S Hamadou, A Marin, S Rossi
International Conference on Analytical and Stochastic Modeling Techniques …, 2011
Interference-sensitive preorders for manets
M Bugliesi, L Gallina, A Marin, S Rossi, S Hamadou
2012 Ninth International Conference on Quantitative Evaluation of Systems …, 2012
Trust in anonymity networks
V Sassone, S Hamadou, M Yang
International Conference on Concurrency Theory, 48-70, 2010
Behavioural equivalences and interference metrics for mobile ad-hoc networks
M Bugliesi, L Gallina, S Hamadou, A Marin, S Rossi
Performance Evaluation 73, 41-72, 2014
Probable innocence in the presence of independent knowledge
S Hamadou, C Palamidessi, V Sassone, E ElSalamouny
International Workshop on Formal Aspects in Security and Trust, 141-156, 2009
Trust in Crowds: probabilistic behaviour in anonymity protocols
V Sassone, E ElSalamouny, S Hamadou
International Symposium on Trustworthy Global Computing, 88-102, 2010
Amine El Kouhen, Abdelouahed Gherbi, Sardaouna Hamadou, John Mullins
T Robati
An Extension for AADL to Model Mixed-Criticality Avionic Systems Deployed on …, 2014
A game-theoretic analysis of cooperation in anonymity networks
M Yang, V Sassone, S Hamadou
International Conference on Principles of Security and Trust, 269-289, 2012
A framework for throughput and energy efficiency in mobile ad hoc networks
L Gallina, S Hamadou, A Marin, S Rossi
2011 IFIP Wireless Days (WD), 1-6, 2011
A Time-Triggered Constraint-Based Calculus for Avionic Systems
S Hamadou, J Mullins, A Gherbi, S Beji
IEEE International Symposium on Object/Component/Service-Oriented Real-Time …, 2015
Quantifying leakage in the presence of unreliable sources of information
S Hamadou, C Palamidessi, V Sassone
Journal of Computer and System Sciences 88, 27-52, 2017
A probabilistic scheduler for the analysis of cryptographic protocols
S Brlek, S Hamadou, J Mullins
Electronic Notes in Theoretical Computer Science 194 (1), 61-83, 2007
Some remarks on the certificates registration of the electronic commerce protocol set
S Brlek, S Hamadou, J Mullins
Advanced Int'l Conference on Telecommunications and Int'l Conference on …, 2006
Anonymous and secure electronic transaction protocol
S Brlek, S Hamadou, J Mullins
Annales des télécommunications 60 (5-6), 530-557, 2005
Specifying avionic embedded systems by denotations of the time-triggered constraint-based calculus
S Hamadou, J Mullins, C Chareton, A Gherbi
2015 IEEE International Conference on Information Reuse and Integration, 303-310, 2015
An analysis of trust in anonymity networks in the presence of adaptive attackers
S Hamadou, V Sassone, M Yang
Iterative integration of TTEthernet network flows
S Beji, S Hamadou, J Mullins, A Gherbi
International Journal of Critical Computer-Based Systems 9 (3), 167-192, 2019
The system can't perform the operation now. Try again later.
Articles 1–20