default search action
Mohamed G. Gouda
Person information
- affiliation: University of Texas at Austin, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – 2019
- 2019
- [j89]Rezwana Reaz, Hrishikesh B. Acharya, Ehab S. Elmallah, Jorge Arturo Cobb, Mohamed G. Gouda:
Policy expressions and the bottom-up design of computing policies. Computing 101(9): 1307-1326 (2019) - [c140]Rezwana Reaz, Ehab S. Elmallah, Mohamed G. Gouda:
Executing Firewalls in Public Clouds. ICCCNT 2019: 1-6 - 2017
- [j88]Ehab S. Elmallah, Mohamed G. Gouda:
Hardness of Firewall Analysis. IEEE Trans. Dependable Secur. Comput. 14(3): 339-349 (2017) - [c139]Rezwana Reaz, Hrishikesh B. Acharya, Ehab S. Elmallah, Jorge Arturo Cobb, Mohamed G. Gouda:
Policy Expressions and the Bottom-Up Design of Computing Policies. NETYS 2017: 151-165 - 2016
- [c138]Muqeet Ali, Rezwana Reaz, Mohamed G. Gouda:
Two-phase Nonrepudiation Protocols. ICCCNT 2016: 22:1-22:8 - [c137]Muqeet Ali, Mohamed G. Gouda:
Nonrepudiation Protocols in Cloud Systems. ICCCNT 2016: 23:1-23:6 - [c136]Oliver Jensen, Mohamed G. Gouda, Lili Qiu:
A secure credit card protocol over NFC. ICDCN 2016: 32:1-32:9 - [c135]Muqeet Ali, Rezwana Reaz, Mohamed G. Gouda:
Nonrepudiation Protocols Without a Trusted Party. NETYS 2016: 1-15 - [c134]Oliver Jensen, Tyler O'Meara, Mohamed G. Gouda:
Securing NFC Credit Card Payments Against Malicious Retailers. NETYS 2016: 214-228 - [c133]Marijn J. H. Heule, Rezwana Reaz, Hrishikesh B. Acharya, Mohamed G. Gouda:
Analysis of Computing Policies Using SAT Solvers (Short Paper). SSS 2016: 190-194 - 2015
- [c132]Rezwana Reaz, Muqeet Ali, Mohamed G. Gouda, Marijn Heule, Ehab S. Elmallah:
The Implication Problem of Computing Policies. SSS 2015: 109-123 - 2014
- [c131]Mohamed G. Gouda:
Keynote Talk: Communication Without Repudiation: The Unanswered Question. NETYS 2014: 1-8 - [c130]Ehab S. Elmallah, Mohamed G. Gouda:
Hardness of Firewall Analysis. NETYS 2014: 153-168 - [c129]Ehab S. Elmallah, Hrishikesh B. Acharya, Mohamed G. Gouda:
Incremental Verification of Computing Policies. SSS 2014: 226-236 - 2013
- [j87]Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda:
The best keying protocol for sensor networks. Pervasive Mob. Comput. 9(4): 564-571 (2013) - 2012
- [j86]Alex X. Liu, Jason M. Kovacs, Mohamed G. Gouda:
A secure cookie scheme. Comput. Networks 56(6): 1723-1730 (2012) - [j85]Young-ri Choi, Mohamed G. Gouda:
A state-based model of sensor protocols. Theor. Comput. Sci. 458: 61-75 (2012) - 2011
- [j84]Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda:
Is that you? Authentication in a network without identities. Int. J. Secur. Networks 6(4): 181-190 (2011) - [j83]Mohamed G. Gouda, Hrishikesh B. Acharya:
Nash equilibria in stabilizing systems. Theor. Comput. Sci. 412(33): 4325-4335 (2011) - [j82]Jorge Arturo Cobb, Mohamed G. Gouda:
Stabilization of max-min fair networks without per-flow state. Theor. Comput. Sci. 412(40): 5562-5579 (2011) - [c128]Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda:
Is That You? Authentication in a Network without Identities. GLOBECOM 2011: 1-5 - [c127]Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda:
TPP: The Two-Way Password Protocol. ICCCN 2011: 1-6 - [c126]Taehwan Choi, Mohamed G. Gouda:
HTTPI: An HTTP with Integrity. ICCCN 2011: 1-6 - [c125]Hrishikesh B. Acharya, Mohamed G. Gouda:
On the Hardness of Topology Inference. ICDCN 2011: 251-262 - [c124]Hrishikesh B. Acharya, Mohamed G. Gouda:
Firewall verification and redundancy checking are equivalent. INFOCOM 2011: 2123-2128 - [c123]Sushil K. Prasad, Almadena Yu. Chtchelkanova, Sajal K. Das, Frank Dehne, Mohamed G. Gouda, Anshul Gupta, Joseph F. JáJá, Krishna Kant, Anita La Salle, Richard LeBlanc, Manish Lumsdaine, David A. Padua, Manish Parashar, Viktor K. Prasanna, Yves Robert, Arnold L. Rosenberg, Sartaj Sahni, Behrooz A. Shirazi, Alan Sussman, Charles C. Weems, Jie Wu:
NSF/IEEE-TCPP curriculum initiative on parallel and distributed computing: core topics for undergraduates. SIGCSE 2011: 617-618 - [c122]Hrishikesh B. Acharya, Mohamed G. Gouda:
Brief announcement: RedRem: a parallel redundancy remover. SPAA 2011: 267-268 - [c121]Hrishikesh B. Acharya, Taehwan Choi, Rida A. Bazzi, Mohamed G. Gouda:
The K-Observer Problem in Computer Networks. SSS 2011: 5-18 - [c120]Hrishikesh B. Acharya, Anil Kumar Katti, Mohamed G. Gouda:
Brief Announcement: A Conjecture on Traceability, and a New Class of Traceable Networks. SSS 2011: 431-432 - [c119]Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda:
The best keying protocol for sensor networks. WOWMOM 2011: 1-6 - 2010
- [j81]Mohamed Eltoweissy, David Hung-Chang Du, Mario Gerla, Silvia Giordano, Mohamed G. Gouda, Henning Schulzrinne, Moustafa Youssef, Donald F. Towsley:
Mission critical networking [Guest editorial]. IEEE J. Sel. Areas Commun. 28(5): 625-629 (2010) - [j80]Alex X. Liu, Mohamed G. Gouda:
Complete Redundancy Removal for Packet Classifiers in TCAMs. IEEE Trans. Parallel Distributed Syst. 21(4): 424-437 (2010) - [j79]Young-ri Choi, Chin-Tser Huang, Mohamed G. Gouda:
Stabilization of Flood Sequencing Protocols in Sensor Networks. IEEE Trans. Parallel Distributed Syst. 21(7): 1042-1055 (2010) - [c118]Hrishikesh B. Acharya, Mohamed G. Gouda:
The Weak Network Tracing Problem. ICDCN 2010: 184-194 - [c117]Hrishikesh B. Acharya, Mohamed G. Gouda:
Projection and Division: Linear-Space Verification of Firewalls. ICDCS 2010: 736-743 - [c116]Hrishikesh B. Acharya, Aditya Joshi, Mohamed G. Gouda:
Firewall modules and modular firewalls. ICNP 2010: 174-182 - [c115]Yan Li, Mohamed G. Gouda:
IP Fast Reroute in Networks with Shared Risk Links. Networking 2010: 213-226 - [c114]Hrishikesh B. Acharya, Mohamed G. Gouda:
Brief Announcement: On the Hardness of Topology Inference. SSS 2010: 285-287 - [c113]Hrishikesh B. Acharya, Mohamed G. Gouda:
On the Power of Non-spoofing Adversaries. DISC 2010: 437-449
2000 – 2009
- 2009
- [j78]Rida A. Bazzi, Young-ri Choi, Mohamed G. Gouda:
Hop chains: Secure routing and the establishment of distinct identities. Theor. Comput. Sci. 410(6-7): 467-480 (2009) - [j77]Alex X. Liu, Mohamed G. Gouda:
Firewall Policy Queries. IEEE Trans. Parallel Distributed Syst. 20(6): 766-777 (2009) - [c112]Yan Li, Mohamed G. Gouda:
Balanced Peer Lists: Towards a Collusion-Resistant BGP. ICCCN 2009: 1-6 - [c111]Hrishikesh B. Acharya, Mohamed G. Gouda:
Linear-Time Verification of Firewalls. ICNP 2009: 133-140 - [c110]Hrishikesh B. Acharya, Ehab S. Elmallah, Mohamed G. Gouda:
Consistent Fixed Points and Negative Gain. PDCAT 2009: 299-305 - [c109]Hrishikesh B. Acharya, Mohamed G. Gouda:
Brief announcement: the theory of network tracing. PODC 2009: 318-319 - [c108]Yan Li, Mohamed G. Gouda:
The Blocking Option in Routing Protocols. SRDS 2009: 227-235 - [c107]Hrishikesh B. Acharya, Mohamed G. Gouda:
A Theory of Network Tracing. SSS 2009: 62-74 - [c106]Mohamed G. Gouda, Hrishikesh B. Acharya:
Nash Equilibria in Stabilizing Systems. SSS 2009: 311-324 - [c105]Hrishikesh B. Acharya, Ehab S. Elmallah, Mohamed G. Gouda:
Brief Announcement: Consistent Fixed Points and Negative Gain. SSS 2009: 771-772 - [e1]Ehab Al-Shaer, Mohamed G. Gouda, Jorge Lobo, Sanjai Narain, Felix Wu:
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009. ACM 2009, ISBN 978-1-60558-778-3 [contents] - 2008
- [j76]Mohamed G. Gouda, Alex X. Liu:
Formal Specification and Verification of a Secure Micropayment Protocol. Int. J. Netw. Secur. 7(1): 81-87 (2008) - [j75]Ehab S. Elmallah, Mohamed G. Gouda, Sandeep S. Kulkarni:
Logarithmic keying. ACM Trans. Auton. Adapt. Syst. 3(4): 18:1-18:18 (2008) - [j74]Alex X. Liu, Mohamed G. Gouda:
Diverse Firewall Design. IEEE Trans. Parallel Distributed Syst. 19(9): 1237-1251 (2008) - [c104]Mohamed G. Gouda, Alex X. Liu, Mansoor Jafry:
Verification of Distributed Firewalls. GLOBECOM 2008: 2013-2017 - [c103]Yan Li, Mohamed G. Gouda:
Sources and Monitors: A Trust Model for Peer-to-Peer Networks. ICCCN 2008: 285-290 - [c102]Andrew R. Dalton, William P. McCartney, Kajari Ghosh Dastidar, Jason O. Hallstrom, Nigamanth Sridhar, Ted Herman, William Leal, Anish Arora, Mohamed G. Gouda:
DESAL alpha: An Implementation of the Dynamic Embedded Sensor-Actuator Language. ICCCN 2008: 541-547 - [c101]Jorge Arturo Cobb, Mohamed G. Gouda:
Stabilization of Max-Min Fair Networks without Per-flow State. SSS 2008: 156-172 - [c100]Taehwan Choi, Sooel Son, Mohamed G. Gouda, Jorge Arturo Cobb:
Pharewell to Phishing. SSS 2008: 233-245 - 2007
- [j73]Mohamed G. Gouda, Alex X. Liu:
Structured firewall design. Comput. Networks 51(4): 1106-1120 (2007) - [j72]Mohamed G. Gouda, Alex X. Liu, Lok M. Leung, Mohamed A. Alam:
SPP: An anti-phishing single password protocol. Comput. Networks 51(13): 3715-3726 (2007) - [j71]Hongwei Zhang, Anish Arora, Young-ri Choi, Mohamed G. Gouda:
Reliable bursty convergecast in wireless sensor networks. Comput. Commun. 30(13): 2560-2576 (2007) - [j70]Mohamed G. Gouda, F. Furman Haddix:
The alternator. Distributed Comput. 20(1): 21-28 (2007) - [j69]Anish Arora, Mohamed G. Gouda, Jason O. Hallstrom, Ted Herman, William Leal, Nigamanth Sridhar:
A state-based language for sensor-actuator networks. SIGBED Rev. 4(3): 25-30 (2007) - [j68]Mehmet Hakan Karaata, Mohamed G. Gouda:
A Stabilizing Deactivation/Reactivation Protocol. IEEE Trans. Computers 56(7): 881-888 (2007) - [j67]Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda:
Optimal Dispersal of Certificate Chains. IEEE Trans. Parallel Distributed Syst. 18(4): 474-484 (2007) - [c99]Edmund L. Wong, Praveen Balasubramanian, Lorenzo Alvisi, Mohamed G. Gouda, Vitaly Shmatikov:
Truth in advertising: lightweight verification of route integrity. PODC 2007: 147-156 - [c98]Young-ri Choi, Mohamed G. Gouda:
Stabilization of Flood Sequencing Protocols in Sensor Networks. SSS 2007: 139-153 - [c97]Mohamed G. Gouda, Yan Li:
The Truth System: Can a System of Lying Processes Stabilize? SSS 2007: 311-324 - 2006
- [b2]Chin-Tser Huang, Mohamed G. Gouda:
Hop Integrity in the Internet. Advances in Information Security 21, Springer 2006, ISBN 978-0-387-24426-6, pp. 1-112 - [j66]Eunjin Jung, Alex X. Liu, Mohamed G. Gouda:
Key bundles and parcels: Secure communication in many groups. Comput. Networks 50(11): 1781-1798 (2006) - [j65]Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora:
Secret instantiation in ad-hoc networks. Comput. Commun. 29(2): 200-215 (2006) - [j64]Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora:
Erratum to "Secret instantiation in ad-hoc networks" [Computer Communications 29 (2006) 200-215]. Comput. Commun. 29(11): 2167 (2006) - [j63]Eunjin Jung, Mohamed G. Gouda:
Vulnerability analysis of certificate graphs. Int. J. Secur. Networks 1(1/2): 13-23 (2006) - [j62]Young-ri Choi, Mohamed G. Gouda, Hongwei Zhang, Anish Arora:
Stabilization of Grid Routing in Sensor Networks. J. Aerosp. Comput. Inf. Commun. 3(5): 214-233 (2006) - [j61]Mohamed G. Gouda, Eunjin Jung:
Stabilizing Certificate Dispersal. J. Aerosp. Comput. Inf. Commun. 3(10): 487-497 (2006) - [j60]Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy:
Convergence of IPsec in presence of resets. J. High Speed Networks 15(2): 173-183 (2006) - [c96]Mohamed G. Gouda:
How to Assign Symmetric Keys in a Network of Small Computers. ICCCN 2006: 139-140 - [c95]Eunjin Jung, Mohamed G. Gouda:
Rating Certificates. ICCCN 2006: 449-454 - [c94]Amitanand S. Aiyer, Lorenzo Alvisi, Mohamed G. Gouda:
Key Grids: A Protocol Family for Assigning Symmetric Keys. ICNP 2006: 178-186 - [c93]Rida A. Bazzi, Young-ri Choi, Mohamed G. Gouda:
Hop Chains: Secure Routing and the Establishment of Distinct Identities. OPODIS 2006: 365-379 - [c92]Mohamed G. Gouda, Jorge Arturo Cobb, Chin-Tser Huang:
Fault Masking in Tri-redundant Systems. SSS 2006: 304-313 - [c91]Mohamed G. Gouda, Sandeep S. Kulkarni, Ehab S. Elmallah:
Logarithmic Keying of Communication Networks. SSS 2006: 314-323 - 2005
- [b1]Tommy M. McGuire, Mohamed G. Gouda:
The Austin Protocol Compiler. Advances in Information Security 13, Springer 2005, ISBN 978-0-387-23227-0, pp. 1-132 - [j59]Mohamed G. Gouda:
Self-Stabilizing Systems, Part 1. J. High Speed Networks 14(1): 1-2 (2005) - [j58]Jorge Arturo Cobb, Mohamed G. Gouda, Deepinder P. Sidhu:
Hello again: Stabilization of the Hello protocol in OSPF. J. High Speed Networks 14(1): 39-57 (2005) - [j57]Mohamed G. Gouda:
Self-Stabilizing Systems, Part 2. J. High Speed Networks 14(2): 107 (2005) - [c90]Alex X. Liu, Mohamed G. Gouda:
Complete Redundancy Detection in Firewalls. DBSec 2005: 193-206 - [c89]Anish Arora, Rajiv Ramnath, Prasun Sinha, Emre Ertin, Sandip Bapat, Vinayak Naik, Vinod Kulathumani, Hongwei Zhang, Mukundan Sridharan, Santosh Kumar, Hui Cao, Nick Seddon, Chris Anderson, Ted Herman, Chen Zhang, Nishank Trivedi, Mohamed G. Gouda, Young-ri Choi, Mikhail Nesterenko, Romil Shah, Sandeep S. Kulkarni, Mahesh Aramugam, Limin Wang, David E. Culler, Prabal Dutta, Cory Sharp, Gilman Tolle, Mike Grimmer, Bill Ferriera, Ken Parker:
Project ExScal (Short Abstract). DCOSS 2005: 393-394 - [c88]Mohamed G. Gouda, Alex X. Liu:
A Model of Stateful Firewalls and Its Properties. DSN 2005: 128-137 - [c87]Alex X. Liu, Jason M. Kovacs, Chin-Tser Huang, Mohamed G. Gouda:
A secure cookie protocol. ICCCN 2005: 333-338 - [c86]Benjamin Kuipers, Alex X. Liu, Aashin Gautam, Mohamed G. Gouda:
Zmail: Zero-Sum Free Market Control of Spam. ICDCS Workshops 2005: 20-26 - [c85]Chin-Tser Huang, Mohamed G. Gouda:
State Checksum and Its Role in System Stabilization. ICDCS Workshops 2005: 29-34 - [c84]Hongwei Zhang, Anish Arora, Young-ri Choi, Mohamed G. Gouda:
Reliable bursty convergecast in wireless sensor networks. MobiHoc 2005: 266-276 - [c83]Mohamed G. Gouda, Young-ri Choi:
A State-Based Model of Sensor Protocols. OPODIS 2005: 246-260 - [c82]F. Furman Haddix, Mohamed G. Gouda:
A General Alternator. IASTED PDCS 2005: 409-413 - [c81]Anish Arora, Rajiv Ramnath, Emre Ertin, Prasun Sinha, Sandip Bapat, Vinayak Naik, Vinod Kulathumani, Hongwei Zhang, Hui Cao, Mukundan Sridharan, Santosh Kumar, Nick Seddon, Chris Anderson, Ted Herman, Nishank Trivedi, Chen Zhang, Mikhail Nesterenko, Romil Shah, Sandeep S. Kulkarni, Mahesh Aramugam, Limin Wang, Mohamed G. Gouda, Young-ri Choi, David E. Culler, Prabal Dutta, Cory Sharp, Gilman Tolle, Mike Grimmer, Bill Ferriera, Ken Parker:
ExScal: Elements of an Extreme Scale Wireless Sensor Network. RTCSA 2005: 102-108 - [c80]Mohamed G. Gouda, Eunjin Jung:
Stabilizing Certificate Dispersal. Self-Stabilizing Systems 2005: 140-152 - [p1]Mohamed G. Gouda, Young-ri Choi, Anish Arora:
Antireplay Protocols for Sensor Networks. Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks 2005: 561-574 - 2004
- [j56]Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kulathumani, Hongwei Zhang, Vinayak Naik, Vineet Mittal, Hui Cao, Murat Demirbas, Mohamed G. Gouda, Young-ri Choi, Ted Herman, Sandeep S. Kulkarni, Umamaheswaran Arumugam, Mikhail Nesterenko, Adnan Vora, Mark Miyashita:
A line in the sand: a wireless sensor network for target detection, classification, and tracking. Comput. Networks 46(5): 605-634 (2004) - [c79]Alex X. Liu, Mohamed G. Gouda:
Diverse Firewall Design. DSN 2004: 595-604 - [c78]Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda:
Optimal dispersal of special certificate graphs. GLOBECOM 2004: 2213-2217 - [c77]Mohamed G. Gouda, Alex X. Liu:
Formal Specification and Verification of a Micropayment Protocol. ICCCN 2004: 489-494 - [c76]Mohamed G. Gouda, Alex X. Liu:
Firewall Design: Consistency, Completeness, and Compactness. ICDCS 2004: 320-327 - [c75]Mohamed G. Gouda, Eunjin Jung:
Certificate Dispersal in Ad-Hoc Networks. ICDCS 2004: 616-623 - [c74]Alex X. Liu, Mohamed G. Gouda, Huibo H. Ma, Anne H. H. Ngu:
Firewall Queries. OPODIS 2004: 197-212 - [c73]Mohamed G. Gouda, Young-ri Choi, Anish Arora:
Sentries and Sleepers in Sensor Networks. OPODIS 2004: 384-399 - [c72]Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda:
Optimal Dispersal of Certificate Chains. DISC 2004: 435-449 - 2003
- [j55]Mohamed G. Gouda, Chin-Tser Huang:
A secure address resolution protocol. Comput. Networks 41(1): 57-71 (2003) - [j54]Vinayak Naik, Anish Arora, Sandip Bapat, Mohamed G. Gouda:
Dependable Systems - Whisper: Local Secret Maintenance in Sensor Networks. IEEE Distributed Syst. Online 4(9) (2003) - [j53]Mohamed G. Gouda, Marco Schneider:
Maximizable routing metrics. IEEE/ACM Trans. Netw. 11(4): 663-675 (2003) - [c71]Young-ri Choi, Mohamed G. Gouda, Moon C. Kim, Anish Arora:
The mote connectivity protocol. ICCCN 2003: 533-538 - [c70]Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy:
Convergence of IPsec in Presence of Resets. ICDCS Workshops 2003: 22-27 - [c69]Eunjin Jung, Alex X. Liu, Mohamed G. Gouda:
Key Bundels and Parcels: Secure Communication in Many Groups. Networked Group Communication 2003: 119-130 - [c68]Murat Demirbas, Anish Arora, Mohamed G. Gouda:
A Pursuer-Evader Game for Sensor Networks. Self-Stabilizing Systems 2003: 1-16 - [c67]Jorge Arturo Cobb, Mohamed G. Gouda, Ravi Musunuri:
A Stabilizing Solution to the Stable Path Problem. Self-Stabilizing Systems 2003: 169-183 - 2002
- [j52]Jorge Arturo Cobb, Mohamed G. Gouda:
Stabilization of General Loop-Free Routing. J. Parallel Distributed Comput. 62(5): 922-944 (2002) - [j51]Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire:
Hop integrity in computer networks. IEEE/ACM Trans. Netw. 10(3): 308-319 (2002) - [j50]Mohamed G. Gouda:
Multiphase Stabilization. IEEE Trans. Software Eng. 28(2): 201-208 (2002) - [c66]Mohamed G. Gouda, Chin-Tser Huang, E. N. Elnozahy:
Key Trees and the Security of Interval Multicast. ICDCS 2002: 467-468 - 2001
- [j49]Mohamed G. Gouda:
Elements of security: Closure, convergence, and protection. Inf. Process. Lett. 77(2-4): 109-114 (2001) - [c65]