default search action
Imad Aad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [c25]Imad Aad, Torsten Braun, Dima Mansour:
Authentication and Trust in Service-Centric Networking. LCN 2016: 563-566 - 2015
- [c24]Arnaud Durand, Mikael Gasparian, Thomas Rouvinez, Imad Aad, Torsten Braun, Tuan Anh Trinh:
BitWorker, a Decentralized Distributed Computing System Based on BitTorrent. WWIC 2015: 151-164 - 2014
- [j10]Igor Bilogrevic, Murtuza Jadliwala, Vishal Joneja, Kübra Kalkan, Jean-Pierre Hubaux, Imad Aad:
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices. IEEE Trans. Inf. Forensics Secur. 9(7): 1141-1156 (2014) - 2013
- [j9]Juha K. Laurila, Daniel Gatica-Perez, Imad Aad, Jan Blom, Olivier Bornet, Trinh Minh Tri Do, Olivier Dousse, Julien Eberle, Markus Miettinen:
From big smartphone data to worldwide research: The Mobile Data Challenge. Pervasive Mob. Comput. 9(6): 752-771 (2013) - [j8]Qing Wei, Imad Aad, Luca Scalia, Jörg Widmer, Philipp Hofmann, Luis Loyola:
E-MAC: an elastic MAC layer for IEEE 802.11 networks. Wirel. Commun. Mob. Comput. 13(4): 393-409 (2013) - [c23]Debmalya Biswas, Imad Aad, Gian Paolo Perrucci:
Privacy Panel: Usable and Quantifiable Mobile Privacy. ARES 2013: 218-223 - 2012
- [c22]Laurent Bindschaedler, Murtuza Jadliwala, Igor Bilogrevic, Imad Aad, Philip Ginzboorg, Valtteri Niemi, Jean-Pierre Hubaux:
Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks. NDSS 2012 - [c21]Igor Bilogrevic, Murtuza Jadliwala, István Lám, Imad Aad, Philip Ginzboorg, Valtteri Niemi, Laurent Bindschaedler, Jean-Pierre Hubaux:
Big Brother Knows Your Friends: On Privacy of Social Communities in Pervasive Networks. Pervasive 2012: 370-387 - 2011
- [j7]Igor Bilogrevic, Murtuza Jadliwala, Praveen Kumar, Sudeep Singh Walia, Jean-Pierre Hubaux, Imad Aad, Valtteri Niemi:
Meetings through the cloud: Privacy-preserving scheduling on mobile devices. J. Syst. Softw. 84(11): 1910-1927 (2011) - [c20]Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hubaux, Imad Aad, Valtteri Niemi:
Privacy-preserving activity scheduling on mobile devices. CODASPY 2011: 261-272 - [c19]Emiliano De Cristofaro, Anthony Durussel, Imad Aad:
Reclaiming privacy for smartphone applications. PerCom 2011: 84-92 - [c18]Igor Bilogrevic, Murtuza Jadliwala, Kübra Kalkan, Jean-Pierre Hubaux, Imad Aad:
Privacy in Mobile Computing for Location-Sharing-Based Services. PETS 2011: 77-96 - [c17]Murtuza Jadliwala, Julien Freudiger, Imad Aad, Jean-Pierre Hubaux, Valtteri Niemi:
Privacy-triggered communications in pervasive social networks. WOWMOM 2011: 1-6 - [i1]Emiliano De Cristofaro, Anthony Durussel, Imad Aad:
Reclaiming Privacy for Smartphone Applications. IACR Cryptol. ePrint Arch. 2011: 41 (2011) - 2010
- [c16]Luca Scalia, Joerg Widmer, Imad Aad:
On the side effects of packet detection sensitivity in IEEE 802.11 interference management. WOWMOM 2010: 1-7
2000 – 2009
- 2009
- [c15]Hermann S. Lichte, Stefan Valentin, Holger von Malm, Holger Karl, Akram Bin Sediq, Imad Aad:
Rate-Per-Link Adaptation in Cooperative Wireless Networks with Multi-Rate Combining. ICC 2009: 1-6 - [c14]Hermann Simon Lichte, Stefan Valentin, Holger Karl, Imad Aad, Jörg Widmer:
Analyzing space/capacity tradeoffs of cooperative wireless networks using a probabilistic model of interference. MSWiM 2009: 54-62 - [c13]Christopher Soghoian, Imad Aad:
Merx: Secure and Privacy Preserving Delegated Payments. TRUST 2009: 217-239 - 2008
- [j6]Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly:
Impact of denial of service attacks on ad hoc networks. IEEE/ACM Trans. Netw. 16(4): 791-802 (2008) - [c12]Hermann S. Lichte, Stefan Valentin, Holger Karl, Imad Aad, Luis Loyola, Jörg Widmer:
Design and Evaluation of a Routing-Informed Cooperative MAC Protocol for Ad Hoc Networks. INFOCOM 2008: 1858-1866 - [c11]Stefan Valentin, Hermann S. Lichte, Holger Karl, Imad Aad, Luis Loyola, Jörg Widmer:
Opportunistic relaying vs. selective cooperation: analyzing the occurrence-conditioned outage capacity. MSWiM 2008: 193-202 - [c10]Luis Loyola, Hermann S. Lichte, Imad Aad, Jörg Widmer, Stefan Valentin:
Increasing the Capacity of IEEE 802.11 Wireless LAN through Cooperative Coded Retransmissions. VTC Spring 2008: 1746-1750 - 2007
- [j5]Maxim Raya, Panagiotis Papadimitratos, Imad Aad, Daniel Jungels, Jean-Pierre Hubaux:
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks. IEEE J. Sel. Areas Commun. 25(8): 1557-1568 (2007) - [c9]Imad Aad, Philipp Hofmann, Luis Loyola, Farhan Riaz, Jörg Widmer:
E-MAC: Self-Organizing 802.11-Compatible MAC with Elastic Real-time Scheduling. MASS 2007: 1-10 - 2006
- [j4]Maxim Raya, Imad Aad, Jean-Pierre Hubaux, Alaeddine El Fawal:
DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots. IEEE Trans. Mob. Comput. 5(12): 1691-1705 (2006) - [c8]Robert Vilzmann, Jörg Widmer, Imad Aad, Christian Hartmann:
Lo~w-Comp-lexity Beamforming Techniques for Wireless Multihop Networks. SECON 2006: 489-497 - [c7]Imad Aad, Claude Castelluccia, Jean-Pierre Hubaux:
Packet Coding for Strong Anonymity in Ad Hoc Networks. SecureComm 2006: 1-10 - 2005
- [j3]Imad Aad, Qiang Ni, Chadi Barakat, Thierry Turletti:
Enhancing IEEE 802.11 MAC in congested environments. Comput. Commun. 28(14): 1605-1617 (2005) - [c6]Mario Cagalj, Saurabh Ganeriwal, Imad Aad, Jean-Pierre Hubaux:
On selfish behavior in CSMA/CA networks. INFOCOM 2005: 2513-2524 - 2004
- [c5]Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly:
Denial of service resilience in ad hoc networks. MobiCom 2004: 202-215 - [c4]Maxim Raya, Jean-Pierre Hubaux, Imad Aad:
DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots. MobiSys 2004 - 2003
- [j2]Imad Aad, Claude Castelluccia:
EnhancingIEEE 802.11 performance in congested environments. Ann. des Télécommunications 58(3-4): 397-416 (2003) - [j1]Imad Aad, Claude Castelluccia:
Priorities in WLANs. Comput. Networks 41(4): 505-526 (2003) - [c3]Qiang Ni, Imad Aad, Chadi Barakat, Thierry Turletti:
Modeling and analysis of slow CW decrease IEEE 802.11 WLAN. PIMRC 2003: 1717-1721 - 2002
- [b1]Imad Aad:
Quality of service in wireless local area networks. (Qualité de service dans les réseaux locaux sans-fil). Joseph Fourier University, Grenoble, France, 2002 - 2001
- [c2]Imad Aad, Claude Castelluccia:
Differentiation Mechanisms for IEEE 802.11. INFOCOM 2001: 209-218 - 2000
- [c1]Imad Aad, Claude Castelluccia:
Introducing Service Differentiation into IEEE 802.11. ISCC 2000: 438-443
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint