default search action
Rachid Saadi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2011
- [j3]CongDuc Pham, Abdallah Makhoul, Rachid Saadi:
Risk-based adaptive scheduling in randomly deployed video sensor networks for critical surveillance applications. J. Netw. Comput. Appl. 34(2): 783-795 (2011) - [c18]Amel Bennaceur, Richard Johansson, Alessandro Moschitti, Romina Spalazzese, Daniel Sykes, Rachid Saadi, Valérie Issarny:
Inferring Affordances Using Learning Techniques. EternalS@FET 2011: 79-87 - [c17]Rachid Saadi, Mohammad Ashiqur Rahaman, Valérie Issarny, Alessandra Toninelli:
Composing Trust Models towards Interoperable Trust Management. IFIPTM 2011: 51-66 - [c16]Amir Seyedi, Rachid Saadi, Valérie Issarny:
Proximity-Based Trust Inference for Mobile Social Networking. IFIPTM 2011: 253-264 - [c15]Paul Grace, Nikolaos Georgantas, Amel Bennaceur, Gordon S. Blair, Franck Chauvel, Valérie Issarny, Massimo Paolucci, Rachid Saadi, Bertrand Souville, Daniel Sykes:
The CONNECT Architecture. SFM 2011: 27-52 - [c14]Gabriele Costa, Valérie Issarny, Fabio Martinelli, Ilaria Matteucci, Rachid Saadi:
Security and Trust. SFM 2011: 393-416 - 2010
- [j2]Gabriele Costa, Aliaksandr Lazouski, Fabio Martinelli, Ilaria Matteucci, Valérie Issarny, Rachid Saadi, Nicola Dragoni, Fabio Massacci:
Security-by-Contract-with-Trust for Mobile Devices. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(4): 75-91 (2010) - [c13]Rachid Saadi, Jean-Marc Pierson, Lionel Brunie:
T2D: a peer to peer trust management system based on disposition to trust. SAC 2010: 1472-1478 - [c12]Antonia Bertolino, Antinisca Di Marco, Fabio Martinelli, Valérie Issarny, Rachid Saadi:
Dependability in dynamic, evolving and heterogeneous systems: the connect approach. SERENE 2010: 83-88 - [p1]Rachid Saadi, Jean-Marc Pierson, Lionel Brunie:
Security in Distributed Collaborative Environments: Limitations and Solutions. Emergent Web Intelligence 2010: 415-454
2000 – 2009
- 2009
- [c11]Abdallah Makhoul, Rachid Saadi, CongDuc Pham:
Coverage and adaptive scheduling algorithms for criticality management on video wireless sensor networks. ICUMT 2009: 1-8 - [c10]Abdallah Makhoul, Rachid Saadi, Congduc Pham:
Adaptive scheduling of wireless video sensor nodes for surveillance applications. PM2HW2N@MSWiM 2009: 54-60 - 2007
- [c9]Rachid Saadi, Jean-Marc Pierson, Lionel Brunie:
Authentication and Access Control Using Trust Collaboration in Pervasive Grid Environments. GPC 2007: 348-361 - [c8]Rachid Saadi, Jean-Marc Pierson, Lionel Brunie:
The Chameleon: A Pervasive Grid Security Architecture. ICNS 2007: 48 - [c7]Rachid Saadi, Jean-Marc Pierson, Lionel Brunie:
Morph Digital Signature A New Signature Framework for e-Documents in Pervasive Environments. ICPS 2007: 185-188 - [c6]Rachid Saadi, Jean-Marc Pierson, Lionel Brunie:
A New Certificate Signature for Pervasive Environment. SECPerU 2007: 43-48 - [c5]Rachid Saadi, Omar Hasan, Jean-Marc Pierson, Lionel Brunie:
Establishing Trust Beliefs Based on a Uniform Disposition to Trust. SITIS 2007: 221-228 - [c4]Rachid Saadi, Jean-Marc Pierson, Lionel Brunie:
X316 Security Toolbox for New Generation of Certificate. TrustBus 2007: 248-258 - [c3]Rachid Saadi, Jean-Marc Pierson, Lionel Brunie:
Context Adapted Certificate Using Morph Template Signature for Pervasive Environments. UCS 2007: 17-32 - 2005
- [j1]Rachid Saadi, Jean-Marc Pierson, Lionel Brunie:
(Dis)trust certification model for large access in a pervasive environment. Int. J. Pervasive Comput. Commun. 1(4): 289-299 (2005) - [c2]Rachid Saadi, Jean-Marc Pierson, Lionel Brunie:
APC: access pass certificate distrust certification model for large access in pervasive environment. ICPS 2005: 361-370 - [c1]Rachid Saadi, Jean-Marc Pierson, Lionel Brunie:
Authentification par la méfiance dans les systèmes pervasifs. UbiMob 2005: 93-96
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint