Mohamed G. Gouda - Publications

Affiliations: 
University of Texas at Austin, Austin, Texas, U.S.A. 
Area:
Computer Science

68 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2014 Gouda MG. Keynote talk: Communication without repudiation: The unanswered question Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8593: 1-8. DOI: 10.1007/978-3-319-09581-3_1  0.318
2013 Choi T, Acharya HB, Gouda MG. The best keying protocol for sensor networks Pervasive and Mobile Computing. 9: 564-571. DOI: 10.1016/J.Pmcj.2012.06.007  0.367
2012 Choi YR, Gouda MG. A state-based model of sensor protocols Theoretical Computer Science. 458: 61-75. DOI: 10.1016/J.Tcs.2012.08.013  0.601
2012 Liu AX, Kovacs JM, Gouda MG. A secure cookie scheme Computer Networks. 56: 1723-1730. DOI: 10.1016/J.Comnet.2012.01.013  0.336
2011 Choi T, Acharya HB, Gouda MG. Is that you? Authentication in a network without identities International Journal of Security and Networks. 6: 181-190. DOI: 10.1504/Ijsn.2011.045226  0.336
2011 Choi T, Gouda MG. HTTPI: An HTTP with integrity Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2011.6005788  0.334
2011 Choi T, Acharya HB, Gouda MG. TPP: The two-way password protocol Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2011.6005787  0.357
2010 Liu AX, Gouda MG. Complete redundancy removal for packet classifiers in TCAMs Ieee Transactions On Parallel and Distributed Systems. 21: 424-437. DOI: 10.1109/Tpds.2008.216  0.324
2010 Eltoweissy M, Du DHC, Gerla M, Giordano S, Gouda M, Schulzrinne H, Youssef M. Guest editorial mission critical networking Ieee Journal On Selected Areas in Communications. 28: 625-629. DOI: 10.1109/Jsac.2010.100601  0.311
2009 Liu AX, Gouda MG. Firewall policy queries Ieee Transactions On Parallel and Distributed Systems. 20: 766-777. DOI: 10.1109/Tpds.2008.263  0.386
2009 Li Y, Gouda MG. The blocking option in routing protocols Proceedings of the Ieee Symposium On Reliable Distributed Systems. 227-235. DOI: 10.1109/SRDS.2009.10  0.317
2009 Bazzi RA, Choi Yr, Gouda MG. Hop chains: Secure routing and the establishment of distinct identities Theoretical Computer Science. 410: 467-480. DOI: 10.1016/J.Tcs.2008.10.004  0.594
2008 Gouda MG, Liu AX. Formal Specification and Verification of a Secure Micropayment Protocol International Journal of Network Security. 7: 81-87. DOI: 10.6633/Ijns.200807.7(1).10  0.466
2008 Cobb JA, Gouda MG. Stabilization of max-min fair networks without per-flow state Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5340: 156-172. DOI: 10.1016/J.Tcs.2010.11.042  0.314
2007 Arora A, Gouda M, Hallstrom JO, Herman T, Leal WM, Sridhar N. A state-based language for sensor-actuator networks Acm Sigbed Review. 4: 25-30. DOI: 10.1145/1317103.1317108  0.339
2007 Wong EL, Balasubramanian P, Alvisi L, Gouda MG, Shmatikov V. Truth in advertising: Lightweight verification of route integrity Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 147-156. DOI: 10.1145/1281100.1281123  0.332
2007 Choi YR, Gouda MG. Stabilization of flood sequencing protocols in sensor networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4838: 139-153. DOI: 10.1109/Tpds.2009.126  0.579
2007 Karaata MH, Gouda MG. A stabilizing deactivation/reactivation protocol Ieee Transactions On Computers. 56: 881-888. DOI: 10.1109/Tc.2007.1048  0.318
2007 Gouda MG, Liu AX, Leung LM, Alam MA. SPP: An anti-phishing single password protocol Computer Networks. 51: 3715-3726. DOI: 10.1016/J.Comnet.2007.03.007  0.435
2007 Gouda MG, Liu AX. Structured firewall design Computer Networks. 51: 1106-1120. DOI: 10.1016/J.Comnet.2006.06.015  0.302
2007 Zhang H, Arora A, Choi Yr, Gouda MG. Reliable bursty convergecast in wireless sensor networks Computer Communications. 30: 2560-2576. DOI: 10.1016/J.Comcom.2007.05.046  0.56
2006 Jung E, Liu AX, Gouda MG. Key bundles and parcels: Secure communication in many groups Computer Networks. 50: 1781-1798. DOI: 10.1016/J.Comnet.2005.07.013  0.314
2006 Kulkarni SS, Gouda MG, Arora A. Erratum to Secret instantiation in ad-hoc networks [Computer Communications 29 (2006) 200-215] Computer Communications. 29: 2167. DOI: 10.1016/J.Comcom.2006.01.001  0.325
2006 Kulkarni SS, Gouda MG, Arora A. Secret instantiation in ad-hoc networks Computer Communications. 29: 200-215. DOI: 10.1016/J.Comcom.2005.05.017  0.392
2005 Liu AX, Kovacs JM, Huang CT, Gouda MG. A secure cookie protocol Proceedings - International Conference On Computer Communications and Networks, Icccn. 2005: 333-338. DOI: 10.1109/ICCCN.2005.1523880  0.358
2005 Liu AX, Gouda MG. Complete redundancy detection in firewalls Lecture Notes in Computer Science. 3654: 193-206. DOI: 10.1007/11535706_15  0.32
2005 McGuire TM, Gouda MG. The Austin Protocol Compiler Advances in Information Security. 13: 1-132.  0.682
2005 Cobb JA, Gouda MG, Sidhu D. Hello again: Stabilization of the Hello protocol in OSPF Journal of High Speed Networks. 14: 39-57.  0.344
2004 Liu AX, Gouda MG. Diverse firewall design Proceedings of the International Conference On Dependable Systems and Networks. 595-604. DOI: 10.1109/Tpds.2007.70802  0.32
2004 Jung E, Elmallah ES, Gouda MG. Optimal dispersal of certificate chains Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3274: 435-449. DOI: 10.1109/Tpds.2007.1007  0.319
2004 Arora A, Dutta P, Bapat S, Kulathumani V, Zhang H, Naik V, Mittal V, Cao H, Demirbas M, Gouda M, Choi Y, Herman T, Kulkarni S, Arumugam U, Nesterenko M, et al. A line in the sand: A wireless sensor network for target detection, classification, and tracking Computer Networks. 46: 605-634. DOI: 10.1016/J.Comnet.2004.06.007  0.532
2004 Gouda MG, Liu AX. Formal specification and verification of a micropayment protocol Proceedings - International Conference On Computer Communications and Networks, Icccn. 489-494.  0.375
2003 Gouda MG, Schneider M. Maximizable routing metrics Ieee/Acm Transactions On Networking. 11: 663-675. DOI: 10.1109/Tnet.2003.815294  0.397
2003 Choi YR, Gouda MG, Kim MC, Arora A. The mote connectivity protocol Proceedings - International Conference On Computer Communications and Networks, Icccn. 2003: 533-538. DOI: 10.1109/ICCCN.2003.1284220  0.347
2003 Gouda MG, Huang CT. A secure address resolution protocol Computer Networks. 41: 57-71. DOI: 10.1016/S1389-1286(02)00326-2  0.473
2003 Cobb JA, Gouda MG, Musunuri R. A stabilizing solution to the stable path problem Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2704: 169-183. DOI: 10.1007/3-540-45032-7_13  0.334
2003 Demirbas M, Arora A, Gouda MG. A pursuer-evader game for sensor networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2704: 1-16. DOI: 10.1007/3-540-45032-7_1  0.313
2002 Cobb JA, Gouda MG. Stabilization of general loop-free routing Journal of Parallel and Distributed Computing. 62: 922-944. DOI: 10.1006/Jpdc.2001.1830  0.433
2001 Huang CT, Gouda MG. An anti-replay window protocol with controlled shift Proceedings - International Conference On Computer Communications and Networks, Icccn. 2001: 242-247. DOI: 10.1109/ICCCN.2001.956254  0.376
2001 Gouda MG. Elements of security: Closure, convergence, and protection Information Processing Letters. 77: 109-114. DOI: 10.1016/S0020-0190(00)00207-6  0.334
2001 Gouda MG, Huang CT, Arora A. On the security and vulnerability of PING Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2194: 124-135. DOI: 10.1007/3-540-45438-1_9  0.438
2001 Gouda MG. The theory of weak stabilization Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2194: 114-123. DOI: 10.1007/3-540-45438-1_8  0.312
2001 Cobb JA, Gouda MG. Stabilization of routing in directed networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2194: 51-66. DOI: 10.1007/3-540-45438-1_4  0.379
2000 Gouda MG, Elnozahy EN, Huang CT, McGuire TM. Hop integrity in computer networks International Conference On Network Protocols. 3-11. DOI: 10.1109/Tnet.2002.1012363  0.679
2000 Wong CK, Gouda M, Lam SS. Secure group communications using key graphs Ieee Acm Transactions On Networking. 8: 16-30. DOI: 10.1109/90.836475  0.403
2000 Gouda MG, Elnozahy EN, Huang CT, McGuire TM. Hop integrity in computer networks International Conference On Network Protocols. 3-11.  0.313
2000 Gouda MG, McGuire TM. Alert communication primitives above TCP Journal of High Speed Networks. 9: 139-150.  0.647
1998 Cobb JA, Gouda MG, El-Nahas A. Time-shift scheduling - Fair scheduling of flows in high-speed networks Ieee/Acm Transactions On Networking. 6: 274-285. DOI: 10.1109/90.700891  0.333
1998 Gouda MG, McGuire TM. Accelerated heartbeat protocols Proceedings - International Conference On Distributed Computing Systems. 202-209.  0.644
1997 Cobb JA, Gouda MG. The request reply family of group routing protocols Ieee Transactions On Computers. 46: 659-672. DOI: 10.1109/12.600824  0.417
1997 Steves DH, Edmondson-Yurkanan C, Gouda M. Properties of secure transaction protocols Computer Networks and Isdn Systems. 29: 1809-1821. DOI: 10.1016/S0169-7552(97)00101-3  0.645
1996 Gouda MG. Network protocols between exact specifications and pragmatic implementations Acm Computing Surveys. 28: 43. DOI: 10.1145/242224.242278  0.422
1996 Cobb JA, Gouda MG. Group routing without group routing tables: An exercise in protocol design Computer Communications. 19: 1161-1174. DOI: 10.1016/S0140-3664(96)01151-6  0.438
1996 Abdel-Wahab HM, Gouda MG. Systems of recall broadcast Information Sciences. 90: 1-17. DOI: 10.1016/0020-0255(94)00081-6  0.39
1995 Gouda MG, Netravali AN, Sabnani K. A Periodic State Exchange Protocol and Its Verification Ieee Transactions On Communications. 43: 2475-2484. DOI: 10.1109/26.412722  0.411
1995 Gouda MG, Paul S. Wireless link protocol: design by refinement International Conference On Network Protocols. 192-200.  0.385
1993 Gouda MG. Protocol verification made simple: a tutorial Computer Networks and Isdn Systems. 25: 969-980. DOI: 10.1016/0169-7552(93)90094-K  0.487
1993 Singh AK, Gouda MG. Rankers: a classification of synchronization problems Science of Computer Programming. 21: 191-223. DOI: 10.1016/0167-6423(93)90009-E  0.533
1991 Brown GM, Gouda MG, Miller RE. Block Acknowledgment: Redesigning the Window Protocol Ieee Transactions On Communications. 39: 524-532. DOI: 10.1109/26.81740  0.429
1991 Gouda MG, Multari NJ. Stabilizing Communication Protocols Ieee Transactions On Computers. 40: 448-458. DOI: 10.1109/12.88464  0.46
1991 Chang CK, Gouda MG. On the minimum requirements for independent recovery in distributed systems Information Processing Letters. 37: 1-7. DOI: 10.1016/0020-0190(91)90242-A  0.327
1985 Chow CH, Gouda MG, Lam SS. A discipline for constructing multiphase communication protocols Acm Transactions On Computer Systems (Tocs). 3: 315-343. DOI: 10.1145/6110.214400  0.438
1985 Gouda MG, Rosier LE. Priority Networks of Communicating Finite State Machines Siam Journal On Computing. 14: 569-584. DOI: 10.1137/0214042  0.317
1985 Gouda MG, Lee H. Proving Liveness and Termination of Systolic Arrays Using Communicating Finite State Machines Ieee Transactions On Software Engineering. 11: 1240-1251. DOI: 10.1109/Tse.1985.231871  0.34
1985 Gouda M. On "A Simple Protocol Whose Proof Isńt": The State Machine Approach Ieee Transactions On Communications. 33: 380-382. DOI: 10.1109/Tcom.1985.1096296  0.374
1985 Gouda MG, Han JY. Protocol validation by fair progress state exploration Computer Networks and Isdn Systems. 9: 353-361. DOI: 10.1016/0169-7552(85)90086-8  0.368
1984 Gouda MG. Closed Covers: To Verify Progress for Communicating Finite State Machines Ieee Transactions On Software Engineering. 846-855. DOI: 10.1109/Tse.1984.5010313  0.32
1984 Gouda MG, Manning EG, Yu YT. On the progress of communication between two finite state machines Information and Control. 63: 200-216. DOI: 10.1016/S0019-9958(84)80014-5  0.313
Show low-probability matches.