Suivre
Imad Aad
Imad Aad
Center for Digital Trust (C4DT), EPFL
Adresse e-mail validée de aad.me - Page d'accueil
Titre
Citée par
Citée par
Année
Differentiation mechanisms for IEEE 802.11
I Aad, C Castelluccia
Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001
9262001
The Mobile Data Challenge: Big Data for Mobile Computing Research
J Eberle, O Bornet, I Aad, JK Laurila, M Miettinen, TMT Do, O Dousse, ...
Pervasive Computing, 2012
6032012
Eviction of misbehaving and faulty nodes in vehicular networks
M Raya, P Papadimitratos, I Aad, D Jungels, JP Hubaux
IEEE Journal on Selected Areas in Communications 25 (8), 1557-1568, 2007
5382007
Denial of service resilience in ad hoc networks
I Aad, JP Hubaux, EW Knightly
Proceedings of the 10th annual international conference on Mobile computing …, 2004
4632004
On selfish behavior in CSMA/CA networks
M Cagalj, S Ganeriwal, I Aad, JP Hubaux
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005
4322005
DOMINO: A system to detect greedy behavior in IEEE 802.11 hotspots
M Raya, JP Hubaux, I Aad
Proceedings of the 2nd international conference on Mobile systems …, 2004
3832004
Method and apparatus for categorizing application access requests on a device
I Aad, D Biswas, GP Perrucci
US Patent App. 13/538,348, 2012
3152012
Impact of denial of service attacks on ad hoc networks
I Aad, JP Hubaux, EW Knightly
IEEE/ACM Transactions on networking 16 (4), 791-802, 2008
2532008
DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots
M Raya, I Aad, JP Hubaux, A El Fawal
IEEE Transactions on Mobile Computing 5 (12), 1691-1705, 2006
2252006
Modeling and analysis of slow CW decrease IEEE 802.11 WLAN
Q Ni, I Aad, C Barakat, T Turletti
Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 14th …, 2003
1762003
Certificate revocation in vehicular networks
M Raya, D Jungels, P Papadimitratos, I Aad, JP Hubaux
Laboratory for computer Communications and Applications (LCA) School of …, 2006
1532006
From big smartphone data to worldwide research: The Mobile Data Challenge
JK Laurila, D Gatica-Perez, I Aad, J Blom, O Bornet, TMT Do, O Dousse, ...
Pervasive and Mobile Computing 9 (6), 752-771, 2013
1292013
Enhancing IEEE 802.11 MAC in congested environments
I Aad, Q Ni, C Barakat, T Turletti
Applications and Services in Wireless Networks, 2004. ASWN 2004. 2004 4th …, 2004
1152004
On cheating in CSMA/CA ad hoc networks
M Cagalj, S Ganeriwal, I Aad, JP Hubaux
802004
Introducing service differentiation into IEEE 802.11
I Aad, C Castelluccia
Computers and Communications, 2000. Proceedings. ISCC 2000. Fifth IEEE …, 2000
782000
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
I Bilogrevic, M Jadliwala, V Joneja, K Kalkan, JP Hubaux, I Aad
IEEE Transactions on Information Forensics and Security, 2014
702014
Packet coding for strong anonymity in ad hoc networks
I Aad, C Castelluccia, JP Huubaux
Securecomm and Workshops, 2006, 1-10, 2006
692006
QoS issues and enhancements for IEEE 802.11 Wireless LAN
Q Ni, L Romdhani, T Turletti, I Aad
INRIA, 2002
672002
Reclaiming privacy for smartphone applications
E De Cristofaro, A Durussel, I Aad
Pervasive Computing and Communications (PerCom), 2011 IEEE International …, 2011
662011
Privacy in mobile computing for location-sharing-based services
I Bilogrevic, M Jadliwala, K Kalkan, JP Hubaux, I Aad
Privacy Enhancing Technologies: 11th International Symposium, PETS 2011 …, 2011
642011
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20