@COMMENT{{{This file has been generated by bib2bib 1.74}}
@COMMENT{{{Command line: ./bib2bib -c 'year>=1998 & year <= 2013' -c 'author: "hamadou"' papers.bib}}

@ARTICLE{hamadou:hal-00760437,
  AUTHOR = {Hamadou, Sardaouna and Sassone, Vladimiro and Yang, Mu},
  JOURNAL = {{Mathematical Structures in Computer Science}},
  NOTE = {To appear},
  PUBLISHER = {Cambridge University Press},
  TITLE = {{An analysis of trust in anonymity networks in the presence of adaptive attackers}},
  URL = {http://hal.inria.fr/hal-00760437},
  X-EDITORIAL-BOARD = {yes},
  X-ID-HAL = {hal-00760437},
  X-INTERNATIONAL-AUDIENCE = {yes},
  YEAR = {2013}
}

@INPROCEEDINGS{yang:hal-00760445,
  ADDRESS = {Tallinn, Estonia},
  AUTHOR = {Yang, Mu and Sassone, Vladimiro and Hamadou, Sardaouna},
  BOOKTITLE = {{Principles of Security and Trust - First International Conference, POST 2012}},
  EDITOR = {Pierpaolo Degano and Joshua D. Guttman},
  PAGES = {269-289},
  PUBLISHER = {Springer},
  TITLE = {{A Game-Theoretic Analysis of Cooperation in Anonymity Networks}},
  URL = {http://hal.inria.fr/hal-00760445},
  VOLUME = {7215},
  X-ID-HAL = {hal-00760445},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PROCEEDINGS = {yes},
  YEAR = {2012}
}

@INPROCEEDINGS{bugliesi:hal-00760455,
  ADDRESS = {London, United Kingdom},
  AUTHOR = {Bugliesi, Michele and Gallina, Lucia and Marin, Andrea and Rossi, Sabina and Hamadou, Sardaouna},
  BOOKTITLE = {{Ninth International Conference on Quantitative Evaluation of Systems, QEST 2012}},
  PAGES = {189-198},
  PUBLISHER = {IEEE Computer Society},
  TITLE = {{Interference-Sensitive Preorders for MANETs}},
  URL = {http://hal.inria.fr/hal-00760455},
  X-ID-HAL = {hal-00760455},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PROCEEDINGS = {yes},
  YEAR = {2012}
}

@INPROCEEDINGS{hamadou:2010:inria-00424853:2,
  ADDRESS = {Eindhoven, The Netherlands},
  AUTHOR = {Hamadou, Sardaouna and Palamidessi, Catuscia and Sassone, Vladimiro and ElSalamouny, Ehab},
  BOOKTITLE = {Postproceedings of the 6th International Workshop on Formal Aspects in Security and Trust},
  DATE-ADDED = {2011-01-02 19:05:50 +0100},
  DATE-MODIFIED = {2011-01-02 19:09:15 +0100},
  DOI = {10.1007/978-3-642-12459-4{\_}11},
  EDITOR = {Pierpaolo Degano and Joshua D. Guttman},
  PAGES = {141-156},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Probable Innocence and Independent Knowledge},
  URL = {http://hal.inria.fr/inria-00424853/en},
  VOLUME = {5983},
  X-ID-HAL = {inria-00424853},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {GB,CA},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-12459-4%7B%5C_%7D11}
}

@INPROCEEDINGS{hamadou:2010:inria-00548007:1,
  ADDRESS = {Berleley/Oakland, California, USA},
  AUTHOR = {Hamadou, Sardaouna and Sassone, Vladimiro and Palamidessi, Catuscia},
  BOOKTITLE = {31st IEEE Symposium on Security and Privacy},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1109/SP.2010.13},
  PAGES = {79-92},
  PUBLISHER = {IEEE Computer Society},
  TITLE = {Reconciling Belief and Vulnerability in Information Flow},
  URL = {http://hal.inria.fr/inria-00548007/en},
  X-ID-HAL = {inria-00548007},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {GB},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1109/SP.2010.13}
}


This file has been generated by bibtex2html 1.74