BibTeX records: Basel Alomair

download as .bib file

@article{DBLP:journals/corr/abs-2403-18624,
  author       = {Yangruibo Ding and
                  Yanjun Fu and
                  Omniyyah Ibrahim and
                  Chawin Sitawarin and
                  Xinyun Chen and
                  Basel Alomair and
                  David A. Wagner and
                  Baishakhi Ray and
                  Yizheng Chen},
  title        = {Vulnerability Detection with Code Language Models: How Far Are We?},
  journal      = {CoRR},
  volume       = {abs/2403.18624},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.18624},
  doi          = {10.48550/ARXIV.2403.18624},
  eprinttype    = {arXiv},
  eprint       = {2403.18624},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-18624.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-17673,
  author       = {Julien Piet and
                  Maha Alrashed and
                  Chawin Sitawarin and
                  Sizhe Chen and
                  Zeming Wei and
                  Elizabeth Sun and
                  Basel Alomair and
                  David A. Wagner},
  title        = {Jatmo: Prompt Injection Defense by Task-Specific Finetuning},
  journal      = {CoRR},
  volume       = {abs/2312.17673},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.17673},
  doi          = {10.48550/ARXIV.2312.17673},
  eprinttype    = {arXiv},
  eprint       = {2312.17673},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-17673.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/ClarkABP19,
  author       = {Andrew Clark and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  title        = {On the Structure and Computation of Random Walk Times in Finite Graphs},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {64},
  number       = {11},
  pages        = {4470--4483},
  year         = {2019},
  url          = {https://doi.org/10.1109/TAC.2019.2895299},
  doi          = {10.1109/TAC.2019.2895299},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tac/ClarkABP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcns/LeeCABP18,
  author       = {Phillip Lee and
                  Andrew Clark and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  title        = {Adaptive Mitigation of Multi-Virus Propagation: {A} Passivity-Based
                  Approach},
  journal      = {{IEEE} Trans. Control. Netw. Syst.},
  volume       = {5},
  number       = {1},
  pages        = {583--596},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCNS.2016.2633791},
  doi          = {10.1109/TCNS.2016.2633791},
  timestamp    = {Sat, 01 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcns/LeeCABP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcns/ClarkLABP18,
  author       = {Andrew Clark and
                  Phillip Lee and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  title        = {Combinatorial Algorithms for Control of Biological Regulatory Networks},
  journal      = {{IEEE} Trans. Control. Netw. Syst.},
  volume       = {5},
  number       = {2},
  pages        = {748--759},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCNS.2017.2781366},
  doi          = {10.1109/TCNS.2017.2781366},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcns/ClarkLABP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LeiZPXAPAA17,
  author       = {Hongjiang Lei and
                  Jianming Zhang and
                  Ki{-}Hong Park and
                  Peng Xu and
                  Imran Shafique Ansari and
                  Gaofeng Pan and
                  Basel Alomair and
                  Mohamed{-}Slim Alouini},
  title        = {On Secure {NOMA} Systems With Transmit Antenna Selection Schemes},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {17450--17464},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2737330},
  doi          = {10.1109/ACCESS.2017.2737330},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LeiZPXAPAA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/LeiAPAA17,
  author       = {Hongjiang Lei and
                  Imran Shafique Ansari and
                  Gaofeng Pan and
                  Basel Alomair and
                  Mohamed{-}Slim Alouini},
  title        = {Secrecy Capacity Analysis Over {\(\alpha\)}-{\(\mu\)} Fading Channels},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {21},
  number       = {6},
  pages        = {1445--1448},
  year         = {2017},
  url          = {https://doi.org/10.1109/LCOMM.2017.2669976},
  doi          = {10.1109/LCOMM.2017.2669976},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/LeiAPAA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamco/ClarkABP17,
  author       = {Andrew Clark and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  title        = {Input Selection for Performance and Controllability of Structured
                  Linear Descriptor Systems},
  journal      = {{SIAM} J. Control. Optim.},
  volume       = {55},
  number       = {1},
  pages        = {457--485},
  year         = {2017},
  url          = {https://doi.org/10.1137/140999888},
  doi          = {10.1137/140999888},
  timestamp    = {Sat, 01 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamco/ClarkABP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/ClarkABP17,
  author       = {Andrew Clark and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  title        = {Toward Synchronization in Networks With Nonlinear Dynamics: {A} Submodular
                  Optimization Framework},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {62},
  number       = {10},
  pages        = {5055--5068},
  year         = {2017},
  url          = {https://doi.org/10.1109/TAC.2017.2680739},
  doi          = {10.1109/TAC.2017.2680739},
  timestamp    = {Sat, 01 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tac/ClarkABP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/RezkiZAA17,
  author       = {Zouheir Rezki and
                  Marwen Zorgui and
                  Basel Alomair and
                  Mohamed{-}Slim Alouini},
  title        = {Secret Key Agreement: Fundamental Limits and Practical Challenges},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {24},
  number       = {3},
  pages        = {72--79},
  year         = {2017},
  url          = {https://doi.org/10.1109/MWC.2017.1500365WC},
  doi          = {10.1109/MWC.2017.1500365WC},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/RezkiZAA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ClarkLABP17,
  author       = {Andrew Clark and
                  Phillip Lee and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  title        = {Combinatorial Algorithms for Control of Biological Regulatory Networks},
  journal      = {CoRR},
  volume       = {abs/1701.05273},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.05273},
  eprinttype    = {arXiv},
  eprint       = {1701.05273},
  timestamp    = {Sat, 01 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ClarkLABP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-01633,
  author       = {Andrew Clark and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  title        = {On the Structure and Computation of Random Walk Times in Finite Graphs},
  journal      = {CoRR},
  volume       = {abs/1709.01633},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.01633},
  eprinttype    = {arXiv},
  eprint       = {1709.01633},
  timestamp    = {Sat, 01 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-01633.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/ZorguiRAA16,
  author       = {Marwen Zorgui and
                  Zouheir Rezki and
                  Basel Alomair and
                  Mohamed{-}Slim Alouini},
  title        = {Secret-Key Agreement With Public Discussion Subject to an Amplitude
                  Constraint},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {20},
  number       = {6},
  pages        = {1124--1127},
  year         = {2016},
  url          = {https://doi.org/10.1109/LCOMM.2016.2551218},
  doi          = {10.1109/LCOMM.2016.2551218},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/ZorguiRAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Alomair16,
  author       = {Basel Alomair},
  title        = {Authenticated encryption: how reordering can impact performance},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {18},
  pages        = {6173--6188},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1764},
  doi          = {10.1002/SEC.1764},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Alomair16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsp/ZorguiRAJA16,
  author       = {Marwen Zorgui and
                  Zouheir Rezki and
                  Basel Alomair and
                  Eduard A. Jorswieck and
                  Mohamed{-}Slim Alouini},
  title        = {On the Ergodic Secret-Key Agreement Over Spatially Correlated Multiple-Antenna
                  Channels With Public Discussion},
  journal      = {{IEEE} Trans. Signal Process.},
  volume       = {64},
  number       = {2},
  pages        = {495--510},
  year         = {2016},
  url          = {https://doi.org/10.1109/TSP.2015.2483488},
  doi          = {10.1109/TSP.2015.2483488},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsp/ZorguiRAJA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/ZorguiRAA16,
  author       = {Marwen Zorgui and
                  Zouheir Rezki and
                  Basel Alomair and
                  Mohamed{-}Slim Alouini},
  title        = {The Diversity-Multiplexing Tradeoff of Secret-Key Agreement Over Multiple
                  Antenna Channels},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {15},
  number       = {2},
  pages        = {1562--1574},
  year         = {2016},
  url          = {https://doi.org/10.1109/TWC.2015.2492963},
  doi          = {10.1109/TWC.2015.2492963},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/ZorguiRAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/ZhouRAA16,
  author       = {Xinyu Zhou and
                  Zouheir Rezki and
                  Basel Alomair and
                  Mohamed{-}Slim Alouini},
  title        = {Achievable Rates of Secure Transmission in Gaussian {MISO} Channel
                  With Imperfect Main Channel Estimation},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {15},
  number       = {6},
  pages        = {4470--4485},
  year         = {2016},
  url          = {https://doi.org/10.1109/TWC.2016.2542128},
  doi          = {10.1109/TWC.2016.2542128},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/ZhouRAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/MandalAP16,
  author       = {Kalikinkar Mandal and
                  Basel Alomair and
                  Radha Poovendran},
  editor       = {Sara Foresti and
                  Giuseppe Persiano},
  title        = {Secure Error-Tolerant Graph Matching Protocols},
  booktitle    = {Cryptology and Network Security - 15th International Conference, {CANS}
                  2016, Milan, Italy, November 14-16, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10052},
  pages        = {265--283},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48965-0\_16},
  doi          = {10.1007/978-3-319-48965-0\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/MandalAP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/LeeCABP16,
  author       = {Phillip Lee and
                  Andrew Clark and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  title        = {Distributed adaptive patching strategies against malware propagation:
                  {A} passivity approach},
  booktitle    = {55th {IEEE} Conference on Decision and Control, {CDC} 2016, Las Vegas,
                  NV, USA, December 12-14, 2016},
  pages        = {2587--2594},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CDC.2016.7798652},
  doi          = {10.1109/CDC.2016.7798652},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cdc/LeeCABP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globalsip/ChaabanRAA16,
  author       = {Anas Chaaban and
                  Zouheir Rezki and
                  Basel Alomair and
                  Mohamed{-}Slim Alouini},
  title        = {The {MISO} wiretap channel with channel uncertainty: Asymptotic perspectives},
  booktitle    = {2016 {IEEE} Global Conference on Signal and Information Processing,
                  GlobalSIP 2016, Washington, DC, USA, December 7-9, 2016},
  pages        = {959--963},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/GlobalSIP.2016.7905984},
  doi          = {10.1109/GLOBALSIP.2016.7905984},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globalsip/ChaabanRAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/RezkiCAA16,
  author       = {Zouheir Rezki and
                  Anas Chaaban and
                  Basel Alomair and
                  Mohamed{-}Slim Alouini},
  title        = {The {MISO} Wiretap Channel with Noisy Main Channel Estimation in the
                  High Power Regime},
  booktitle    = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington,
                  DC, USA, December 4-8, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/GLOCOM.2016.7842318},
  doi          = {10.1109/GLOCOM.2016.7842318},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/RezkiCAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LeeCABP16,
  author       = {Phillip Lee and
                  Andrew Clark and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  title        = {Adaptive Mitigation of Multi-Virus Propagation: {A} Passivity-Based
                  Approach},
  journal      = {CoRR},
  volume       = {abs/1603.04374},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.04374},
  eprinttype    = {arXiv},
  eprint       = {1603.04374},
  timestamp    = {Sat, 01 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LeeCABP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZorguiRAA16,
  author       = {Marwen Zorgui and
                  Zouheir Rezki and
                  Basel Alomair and
                  Mohamed{-}Slim Alouini},
  title        = {Secret-Key Agreement with Public Discussion subject to an Amplitude
                  Constraint},
  journal      = {CoRR},
  volume       = {abs/1604.00107},
  year         = {2016},
  url          = {http://arxiv.org/abs/1604.00107},
  eprinttype    = {arXiv},
  eprint       = {1604.00107},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZorguiRAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ClarkABP16,
  author       = {Andrew Clark and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  title        = {Submodularity in Input Node Selection for Networked Systems},
  journal      = {CoRR},
  volume       = {abs/1605.09465},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.09465},
  eprinttype    = {arXiv},
  eprint       = {1605.09465},
  timestamp    = {Sat, 01 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ClarkABP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MandalAP16,
  author       = {Kalikinkar Mandal and
                  Basel Alomair and
                  Radha Poovendran},
  title        = {Secure Error-Tolerant Graph Matching Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {908},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/908},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MandalAP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/LeeCABP15,
  author       = {Phillip Lee and
                  Andrew Clark and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  title        = {Jamming-based adversarial control of network flow allocation: {A}
                  passivity approach},
  booktitle    = {American Control Conference, {ACC} 2015, Chicago, IL, USA, July 1-3,
                  2015},
  pages        = {4710--4716},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ACC.2015.7172071},
  doi          = {10.1109/ACC.2015.7172071},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcc/LeeCABP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/ClarkABP15,
  author       = {Andrew Clark and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  title        = {Input selection for disturbance rejection in networked cyber-physical
                  systems},
  booktitle    = {54th {IEEE} Conference on Decision and Control, {CDC} 2015, Osaka,
                  Japan, December 15-18, 2015},
  pages        = {954--961},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CDC.2015.7401996},
  doi          = {10.1109/CDC.2015.7401996},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cdc/ClarkABP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/LeeCABP15,
  author       = {Phillip Lee and
                  Andrew Clark and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  title        = {A host takeover game model for competing malware},
  booktitle    = {54th {IEEE} Conference on Decision and Control, {CDC} 2015, Osaka,
                  Japan, December 15-18, 2015},
  pages        = {4523--4530},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CDC.2015.7402926},
  doi          = {10.1109/CDC.2015.7402926},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cdc/LeeCABP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZorguiRAJA15,
  author       = {Marwen Zorgui and
                  Zouheir Rezki and
                  Basel Alomair and
                  Eduard A. Jorswieck and
                  Mohamed{-}Slim Alouini},
  title        = {Secret-key agreement over spatially correlated multiple-antenna channels
                  in the low-SNR regime},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {719--720},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346902},
  doi          = {10.1109/CNS.2015.7346902},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZorguiRAJA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LeeCABP15,
  author       = {Phillip Lee and
                  Andrew Clark and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Passivity-Based Distributed Strategies for Stochastic Stackelberg
                  Security Games},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {113--129},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_7},
  doi          = {10.1007/978-3-319-25594-1\_7},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/LeeCABP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZhouRAA15,
  author       = {Xinyu Zhou and
                  Zouheir Rezki and
                  Basel Alomair and
                  Mohamed{-}Slim Alouini},
  title        = {Achievable Rates of Secure Transmission in Gaussian {MISO} Channel
                  with Imperfect Main Channel Estimation},
  booktitle    = {2015 {IEEE} Globecom Workshops, San Diego, CA, USA, December 6-10,
                  2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/GLOCOMW.2015.7414080},
  doi          = {10.1109/GLOCOMW.2015.7414080},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ZhouRAA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/ZorguiRAA15,
  author       = {Marwen Zorgui and
                  Zouheir Rezki and
                  Basel Alomair and
                  Mohamed{-}Slim Alouini},
  title        = {Secret-key agreement over spatially correlated fast-fading multiple-antenna
                  channels with public discussion},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2015,
                  Hong Kong, China, June 14-19, 2015},
  pages        = {2156--2160},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIT.2015.7282837},
  doi          = {10.1109/ISIT.2015.7282837},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/ZorguiRAA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wiopt/ClarkABP15,
  author       = {Andrew Clark and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  title        = {Scalable and distributed submodular maximization with matroid constraints},
  booktitle    = {13th International Symposium on Modeling and Optimization in Mobile,
                  Ad Hoc, and Wireless Networks, WiOpt 2015, Mumbai, India, May 25-29,
                  2015},
  pages        = {435--442},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://dl.ifip.org/db/conf/wiopt/wiopt2015/ClarkABP15.pdf},
  doi          = {10.1109/WIOPT.2015.7151103},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wiopt/ClarkABP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/ClarkABP14,
  author       = {Andrew Clark and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  title        = {Minimizing Convergence Error in Multi-Agent Systems Via Leader Selection:
                  {A} Supermodular Optimization Approach},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {59},
  number       = {6},
  pages        = {1480--1494},
  year         = {2014},
  url          = {https://doi.org/10.1109/TAC.2014.2303236},
  doi          = {10.1109/TAC.2014.2303236},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tac/ClarkABP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/AlomairP14,
  author       = {Basel Alomair and
                  Radha Poovendran},
  title        = {E-MACs: Toward More Secure and More Efficient Constructions of Secure
                  Channels},
  journal      = {{IEEE} Trans. Computers},
  volume       = {63},
  number       = {1},
  pages        = {204--217},
  year         = {2014},
  url          = {https://doi.org/10.1109/TC.2012.176},
  doi          = {10.1109/TC.2012.176},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/AlomairP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/AlomairP14,
  author       = {Basel Alomair and
                  Radha Poovendran},
  title        = {Efficient Authentication for Mobile and Pervasive Computing},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {13},
  number       = {3},
  pages        = {469--481},
  year         = {2014},
  url          = {https://doi.org/10.1109/TMC.2012.252},
  doi          = {10.1109/TMC.2012.252},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/AlomairP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/Alomair14,
  author       = {Basel Alomair},
  editor       = {David Pointcheval and
                  Damien Vergnaud},
  title        = {Universal Hash-Function Families: From Hashing to Authentication},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8469},
  pages        = {459--474},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06734-6\_27},
  doi          = {10.1007/978-3-319-06734-6\_27},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/Alomair14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/allerton/ZorguiRAA14,
  author       = {Marwen Zorgui and
                  Zouheir Rezki and
                  Basel Alomair and
                  Mohamed{-}Slim Alouini},
  title        = {On the diversity-multiplexing tradeoff of secret-key agreement over
                  multiple-antenna channels},
  booktitle    = {52nd Annual Allerton Conference on Communication, Control, and Computing,
                  Allerton 2014, Allerton Park {\&} Retreat Center, Monticello,
                  IL, USA, September 30 - October 3, 2014},
  pages        = {175--182},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ALLERTON.2014.7028453},
  doi          = {10.1109/ALLERTON.2014.7028453},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/allerton/ZorguiRAA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/RezkiAA14,
  author       = {Zouheir Rezki and
                  Basel Alomair and
                  Mohamed{-}Slim Alouini},
  title        = {On the secrecy capacity of the {MISO} wiretap channel under imperfect
                  channel estimation},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2014, Austin,
                  TX, USA, December 8-12, 2014},
  pages        = {1602--1607},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/GLOCOM.2014.7037037},
  doi          = {10.1109/GLOCOM.2014.7037037},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/RezkiAA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicons/LeeSABP14,
  author       = {Phillip Lee and
                  Omar Saleh and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  editor       = {Linda Bushnell and
                  Larry Rohrbough and
                  Saurabh Amin and
                  Xenofon D. Koutsoukos},
  title        = {Graph-based verification and misbehavior detection in multi-agent
                  networks},
  booktitle    = {3rd International Conference on High Confidence Networked Systems
                  (part of {CPS} Week), HiCoNS '14, Berlin, Germany, April 15-17, 2014},
  pages        = {77--84},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2566468.2566477},
  doi          = {10.1145/2566468.2566477},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicons/LeeSABP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wiopt/ClarkABP14,
  author       = {Andrew Clark and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  title        = {Distributed online submodular maximization in resource-constrained
                  networks},
  booktitle    = {12th International Symposium on Modeling and Optimization in Mobile,
                  Ad Hoc, and Wireless Networks, WiOpt 2014, Hammamet, Tunisia, May
                  12-16, 2014},
  pages        = {397--404},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://dl.ifip.org/db/conf/wiopt/wiopt2014/ClarkABP14.pdf},
  doi          = {10.1109/WIOPT.2014.6850325},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wiopt/ClarkABP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ClarkABP14,
  author       = {Andrew Clark and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  title        = {Global Practical Node and Edge Synchronization in Kuramoto Networks:
                  {A} Submodular Optimization Framework},
  journal      = {CoRR},
  volume       = {abs/1411.5797},
  year         = {2014},
  url          = {http://arxiv.org/abs/1411.5797},
  eprinttype    = {arXiv},
  eprint       = {1411.5797},
  timestamp    = {Sat, 01 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ClarkABP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Alomair14,
  author       = {Basel Alomair},
  title        = {Authenticated Encryption: How Reordering can Impact Performance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {958},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/958},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Alomair14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/AlomairCCP13,
  author       = {Basel Alomair and
                  Andrew Clark and
                  Jorge Cu{\'{e}}llar and
                  Radha Poovendran},
  title        = {Toward a Statistical Framework for Source Anonymity in Sensor Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {12},
  number       = {2},
  pages        = {248--260},
  year         = {2013},
  url          = {https://doi.org/10.1109/TMC.2011.267},
  doi          = {10.1109/TMC.2011.267},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/AlomairCCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/YangAP13,
  author       = {Chouchang Yang and
                  Basel Alomair and
                  Radha Poovendran},
  title        = {Optimized relay-route assignment for anonymity in wireless networks},
  booktitle    = {Proceedings of the 2013 {IEEE} International Symposium on Information
                  Theory, Istanbul, Turkey, July 7-12, 2013},
  pages        = {76--80},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISIT.2013.6620191},
  doi          = {10.1109/ISIT.2013.6620191},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/YangAP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ClarkABP13,
  author       = {Andrew Clark and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  title        = {Minimizing Convergence Error in Multi-Agent Systems via Leader Selection:
                  {A} Supermodular Optimization Approach},
  journal      = {CoRR},
  volume       = {abs/1306.4949},
  year         = {2013},
  url          = {http://arxiv.org/abs/1306.4949},
  eprinttype    = {arXiv},
  eprint       = {1306.4949},
  timestamp    = {Sat, 01 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ClarkABP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/AlomairCCP12,
  author       = {Basel Alomair and
                  Andrew Clark and
                  Jorge Cu{\'{e}}llar and
                  Radha Poovendran},
  title        = {Scalable {RFID} Systems: {A} Privacy-Preserving Protocol with Constant-Time
                  Identification},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {23},
  number       = {8},
  pages        = {1536--1550},
  year         = {2012},
  url          = {https://doi.org/10.1109/TPDS.2011.290},
  doi          = {10.1109/TPDS.2011.290},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/AlomairCCP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Alomair12,
  author       = {Basel Alomair},
  editor       = {Feng Bao and
                  Pierangela Samarati and
                  Jianying Zhou},
  title        = {Authenticated Encryption: How Reordering Can Impact Performance},
  booktitle    = {Applied Cryptography and Network Security - 10th International Conference,
                  {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7341},
  pages        = {84--99},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31284-7\_6},
  doi          = {10.1007/978-3-642-31284-7\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Alomair12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/allerton/YangAP12,
  author       = {Chouchang Yang and
                  Basel Alomair and
                  Radha Poovendran},
  title        = {Multipath flow allocation in anonymous wireless networks with dependent
                  sources},
  booktitle    = {50th Annual Allerton Conference on Communication, Control, and Computing,
                  Allerton 2012, Allerton Park {\&} Retreat Center, Monticello,
                  IL, USA, October 1-5, 2012},
  pages        = {1395--1400},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/Allerton.2012.6483381},
  doi          = {10.1109/ALLERTON.2012.6483381},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/allerton/YangAP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/ClarkABP12,
  author       = {Andrew Clark and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  title        = {Leader selection in multi-agent systems for smooth convergence via
                  fast mixing},
  booktitle    = {Proceedings of the 51th {IEEE} Conference on Decision and Control,
                  {CDC} 2012, December 10-13, 2012, Maui, HI, {USA}},
  pages        = {818--824},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CDC.2012.6426323},
  doi          = {10.1109/CDC.2012.6426323},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cdc/ClarkABP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/YangAP12,
  author       = {Chouchang Yang and
                  Basel Alomair and
                  Radha Poovendran},
  title        = {Optimized flow allocation for anonymous communication in multipath
                  wireless networks},
  booktitle    = {Proceedings of the 2012 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2012, Cambridge, MA, USA, July 1-6, 2012},
  pages        = {219--223},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISIT.2012.6283842},
  doi          = {10.1109/ISIT.2012.6283842},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/YangAP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AlomairLP11,
  author       = {Basel Alomair and
                  Loukas Lazos and
                  Radha Poovendran},
  title        = {Securing low-cost {RFID} systems: An unconditionally secure approach},
  journal      = {J. Comput. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {229--257},
  year         = {2011},
  url          = {https://doi.org/10.3233/JCS-2010-0406},
  doi          = {10.3233/JCS-2010-0406},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AlomairLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/AlomairP10,
  author       = {Basel Alomair and
                  Radha Poovendran},
  title        = {Privacy versus scalability in radio frequency identification systems},
  journal      = {Comput. Commun.},
  volume       = {33},
  number       = {18},
  pages        = {2155--2163},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.comcom.2010.08.006},
  doi          = {10.1016/J.COMCOM.2010.08.006},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/AlomairP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/AlomairCP10,
  author       = {Basel Alomair and
                  Andrew Clark and
                  Radha Poovendran},
  title        = {The power of primes: security of authentication based on a universal
                  hash-function family},
  journal      = {J. Math. Cryptol.},
  volume       = {4},
  number       = {2},
  pages        = {121--148},
  year         = {2010},
  url          = {https://doi.org/10.1515/jmc.2010.005},
  doi          = {10.1515/JMC.2010.005},
  timestamp    = {Sat, 01 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/AlomairCP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/AlomairCCP10,
  author       = {Basel Alomair and
                  Andrew Clark and
                  Jorge Cu{\'{e}}llar and
                  Radha Poovendran},
  title        = {Scalable {RFID} systems: a privacy-preserving protocol with constant-time
                  identification},
  booktitle    = {Proceedings of the 2010 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2010, Chicago, IL, USA, June 28 - July
                  1 2010},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DSN.2010.5545008},
  doi          = {10.1109/DSN.2010.5545008},
  timestamp    = {Sat, 01 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/AlomairCCP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/AlomairCCP10,
  author       = {Basel Alomair and
                  Andrew Clark and
                  Jorge Cu{\'{e}}llar and
                  Radha Poovendran},
  title        = {Statistical Framework for Source Anonymity in Sensor Networks},
  booktitle    = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM}
                  2010, 6-10 December 2010, Miami, Florida, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/GLOCOM.2010.5684248},
  doi          = {10.1109/GLOCOM.2010.5684248},
  timestamp    = {Sat, 01 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/AlomairCCP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/AlomairP10,
  author       = {Basel Alomair and
                  Radha Poovendran},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {Efficient Authentication for Mobile and Pervasive Computing},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {186--202},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_14},
  doi          = {10.1007/978-3-642-17650-0\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/AlomairP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AlomairP10,
  author       = {Basel Alomair and
                  Radha Poovendran},
  editor       = {Kyung Hyune Rhee and
                  DaeHun Nyang},
  title        = {{\textdollar}{\textbackslash}mathcal\{E\}{\textdollar} -MACs: Towards
                  More Secure and More Efficient Constructions of Secure Channels},
  booktitle    = {Information Security and Cryptology - {ICISC} 2010 - 13th International
                  Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6829},
  pages        = {292--310},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-24209-0\_20},
  doi          = {10.1007/978-3-642-24209-0\_20},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/AlomairP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/AlomairP09,
  author       = {Basel Alomair and
                  Radha Poovendran},
  title        = {Information Theoretically Secure Encryption with Almost Free Authentication},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {15},
  number       = {15},
  pages        = {2937--2956},
  year         = {2009},
  url          = {https://doi.org/10.3217/jucs-015-15-2937},
  doi          = {10.3217/JUCS-015-15-2937},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/AlomairP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sis/AlomairP09,
  author       = {Basel Alomair and
                  Radha Poovendran},
  editor       = {Alfonso Rodr{\'{\i}}guez and
                  Mariemma Inmaculada Yag{\"{u}}e del Valle and
                  Eduardo Fern{\'{a}}ndez{-}Medina},
  title        = {Unconditionally Secure Authenticated Encryption with Shorter Keys},
  booktitle    = {Security in Information Systems, Proceedings of the 7th International
                  Workshop on Security in Information Systems, {WOSIS} 2009, In conjunction
                  with {ICEIS} 2009, Milan, Italy, May 2009},
  pages        = {5--15},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Tue, 03 Dec 2019 11:56:05 +0100},
  biburl       = {https://dblp.org/rec/conf/sis/AlomairP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/AlomairSP08,
  author       = {Basel Alomair and
                  Krishna Sampigethaya and
                  Radha Poovendran},
  editor       = {Stig Fr. Mj{\o}lsnes and
                  Sjouke Mauw and
                  Sokratis K. Katsikas},
  title        = {Efficient Generic Forward-Secure Signatures and Proxy Signatures},
  booktitle    = {Public Key Infrastructure, 5th European {PKI} Workshop: Theory and
                  Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5057},
  pages        = {166--181},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69485-4\_12},
  doi          = {10.1007/978-3-540-69485-4\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/AlomairSP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/AlomairP08,
  author       = {Basel Alomair and
                  Radha Poovendran},
  editor       = {Akshai Aggarwal and
                  Mohamad Badra and
                  Fabio Massacci},
  title        = {On the Authentication of {RFID} Systems with Bitwise Operations},
  booktitle    = {{NTMS} 2008, 2nd International Conference on New Technologies, Mobility
                  and Security, November 5-7, 2008, Tangier, Morocco},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/NTMS.2008.ECP.74},
  doi          = {10.1109/NTMS.2008.ECP.74},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/AlomairP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AlomairLP07,
  author       = {Basel Alomair and
                  Loukas Lazos and
                  Radha Poovendran},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Passive Attacks on a Class of Authentication Protocols for {RFID}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {102--115},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_9},
  doi          = {10.1007/978-3-540-76788-6\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/AlomairLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics