@COMMENT{{{This file has been generated by bib2bib 1.74}}
@COMMENT{{{Command line: ./bib2bib -c 'year>=1998 & year <= 2013' -c 'author: "hamadou"' papers.bib}}
@ARTICLE{hamadou:hal-00760437, AUTHOR = {Hamadou, Sardaouna and Sassone, Vladimiro and Yang, Mu}, JOURNAL = {{Mathematical Structures in Computer Science}}, NOTE = {To appear}, PUBLISHER = {Cambridge University Press}, TITLE = {{An analysis of trust in anonymity networks in the presence of adaptive attackers}}, URL = {http://hal.inria.fr/hal-00760437}, X-EDITORIAL-BOARD = {yes}, X-ID-HAL = {hal-00760437}, X-INTERNATIONAL-AUDIENCE = {yes}, YEAR = {2013} }
@INPROCEEDINGS{yang:hal-00760445, ADDRESS = {Tallinn, Estonia}, AUTHOR = {Yang, Mu and Sassone, Vladimiro and Hamadou, Sardaouna}, BOOKTITLE = {{Principles of Security and Trust - First International Conference, POST 2012}}, EDITOR = {Pierpaolo Degano and Joshua D. Guttman}, PAGES = {269-289}, PUBLISHER = {Springer}, TITLE = {{A Game-Theoretic Analysis of Cooperation in Anonymity Networks}}, URL = {http://hal.inria.fr/hal-00760445}, VOLUME = {7215}, X-ID-HAL = {hal-00760445}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PROCEEDINGS = {yes}, YEAR = {2012} }
@INPROCEEDINGS{bugliesi:hal-00760455, ADDRESS = {London, United Kingdom}, AUTHOR = {Bugliesi, Michele and Gallina, Lucia and Marin, Andrea and Rossi, Sabina and Hamadou, Sardaouna}, BOOKTITLE = {{Ninth International Conference on Quantitative Evaluation of Systems, QEST 2012}}, PAGES = {189-198}, PUBLISHER = {IEEE Computer Society}, TITLE = {{Interference-Sensitive Preorders for MANETs}}, URL = {http://hal.inria.fr/hal-00760455}, X-ID-HAL = {hal-00760455}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PROCEEDINGS = {yes}, YEAR = {2012} }
@INPROCEEDINGS{hamadou:2010:inria-00424853:2, ADDRESS = {Eindhoven, The Netherlands}, AUTHOR = {Hamadou, Sardaouna and Palamidessi, Catuscia and Sassone, Vladimiro and ElSalamouny, Ehab}, BOOKTITLE = {Postproceedings of the 6th International Workshop on Formal Aspects in Security and Trust}, DATE-ADDED = {2011-01-02 19:05:50 +0100}, DATE-MODIFIED = {2011-01-02 19:09:15 +0100}, DOI = {10.1007/978-3-642-12459-4{\_}11}, EDITOR = {Pierpaolo Degano and Joshua D. Guttman}, PAGES = {141-156}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, TITLE = {Probable Innocence and Independent Knowledge}, URL = {http://hal.inria.fr/inria-00424853/en}, VOLUME = {5983}, X-ID-HAL = {inria-00424853}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PAYS = {GB,CA}, X-PROCEEDINGS = {yes}, YEAR = {2010}, BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-12459-4%7B%5C_%7D11} }
@INPROCEEDINGS{hamadou:2010:inria-00548007:1, ADDRESS = {Berleley/Oakland, California, USA}, AUTHOR = {Hamadou, Sardaouna and Sassone, Vladimiro and Palamidessi, Catuscia}, BOOKTITLE = {31st IEEE Symposium on Security and Privacy}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, DOI = {10.1109/SP.2010.13}, PAGES = {79-92}, PUBLISHER = {IEEE Computer Society}, TITLE = {Reconciling Belief and Vulnerability in Information Flow}, URL = {http://hal.inria.fr/inria-00548007/en}, X-ID-HAL = {inria-00548007}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PAYS = {GB}, X-PROCEEDINGS = {yes}, YEAR = {2010}, BDSK-URL-1 = {http://dx.doi.org/10.1109/SP.2010.13} }
This file has been generated by bibtex2html 1.74