Year |
Citation |
Score |
2014 |
Gouda MG. Keynote talk: Communication without repudiation: The unanswered question Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8593: 1-8. DOI: 10.1007/978-3-319-09581-3_1 |
0.318 |
|
2013 |
Choi T, Acharya HB, Gouda MG. The best keying protocol for sensor networks Pervasive and Mobile Computing. 9: 564-571. DOI: 10.1016/J.Pmcj.2012.06.007 |
0.367 |
|
2012 |
Choi YR, Gouda MG. A state-based model of sensor protocols Theoretical Computer Science. 458: 61-75. DOI: 10.1016/J.Tcs.2012.08.013 |
0.601 |
|
2012 |
Liu AX, Kovacs JM, Gouda MG. A secure cookie scheme Computer Networks. 56: 1723-1730. DOI: 10.1016/J.Comnet.2012.01.013 |
0.336 |
|
2011 |
Choi T, Acharya HB, Gouda MG. Is that you? Authentication in a network without identities International Journal of Security and Networks. 6: 181-190. DOI: 10.1504/Ijsn.2011.045226 |
0.336 |
|
2011 |
Choi T, Gouda MG. HTTPI: An HTTP with integrity Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2011.6005788 |
0.334 |
|
2011 |
Choi T, Acharya HB, Gouda MG. TPP: The two-way password protocol Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2011.6005787 |
0.357 |
|
2010 |
Liu AX, Gouda MG. Complete redundancy removal for packet classifiers in TCAMs Ieee Transactions On Parallel and Distributed Systems. 21: 424-437. DOI: 10.1109/Tpds.2008.216 |
0.324 |
|
2010 |
Eltoweissy M, Du DHC, Gerla M, Giordano S, Gouda M, Schulzrinne H, Youssef M. Guest editorial mission critical networking Ieee Journal On Selected Areas in Communications. 28: 625-629. DOI: 10.1109/Jsac.2010.100601 |
0.311 |
|
2009 |
Liu AX, Gouda MG. Firewall policy queries Ieee Transactions On Parallel and Distributed Systems. 20: 766-777. DOI: 10.1109/Tpds.2008.263 |
0.386 |
|
2009 |
Li Y, Gouda MG. The blocking option in routing protocols Proceedings of the Ieee Symposium On Reliable Distributed Systems. 227-235. DOI: 10.1109/SRDS.2009.10 |
0.317 |
|
2009 |
Bazzi RA, Choi Yr, Gouda MG. Hop chains: Secure routing and the establishment of distinct identities Theoretical Computer Science. 410: 467-480. DOI: 10.1016/J.Tcs.2008.10.004 |
0.594 |
|
2008 |
Gouda MG, Liu AX. Formal Specification and Verification of a Secure Micropayment Protocol International Journal of Network Security. 7: 81-87. DOI: 10.6633/Ijns.200807.7(1).10 |
0.466 |
|
2008 |
Cobb JA, Gouda MG. Stabilization of max-min fair networks without per-flow state Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5340: 156-172. DOI: 10.1016/J.Tcs.2010.11.042 |
0.314 |
|
2007 |
Arora A, Gouda M, Hallstrom JO, Herman T, Leal WM, Sridhar N. A state-based language for sensor-actuator networks Acm Sigbed Review. 4: 25-30. DOI: 10.1145/1317103.1317108 |
0.339 |
|
2007 |
Wong EL, Balasubramanian P, Alvisi L, Gouda MG, Shmatikov V. Truth in advertising: Lightweight verification of route integrity Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 147-156. DOI: 10.1145/1281100.1281123 |
0.332 |
|
2007 |
Choi YR, Gouda MG. Stabilization of flood sequencing protocols in sensor networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4838: 139-153. DOI: 10.1109/Tpds.2009.126 |
0.579 |
|
2007 |
Karaata MH, Gouda MG. A stabilizing deactivation/reactivation protocol Ieee Transactions On Computers. 56: 881-888. DOI: 10.1109/Tc.2007.1048 |
0.318 |
|
2007 |
Gouda MG, Liu AX, Leung LM, Alam MA. SPP: An anti-phishing single password protocol Computer Networks. 51: 3715-3726. DOI: 10.1016/J.Comnet.2007.03.007 |
0.435 |
|
2007 |
Gouda MG, Liu AX. Structured firewall design Computer Networks. 51: 1106-1120. DOI: 10.1016/J.Comnet.2006.06.015 |
0.302 |
|
2007 |
Zhang H, Arora A, Choi Yr, Gouda MG. Reliable bursty convergecast in wireless sensor networks Computer Communications. 30: 2560-2576. DOI: 10.1016/J.Comcom.2007.05.046 |
0.56 |
|
2006 |
Jung E, Liu AX, Gouda MG. Key bundles and parcels: Secure communication in many groups Computer Networks. 50: 1781-1798. DOI: 10.1016/J.Comnet.2005.07.013 |
0.314 |
|
2006 |
Kulkarni SS, Gouda MG, Arora A. Erratum to Secret instantiation in ad-hoc networks [Computer Communications 29 (2006) 200-215] Computer Communications. 29: 2167. DOI: 10.1016/J.Comcom.2006.01.001 |
0.325 |
|
2006 |
Kulkarni SS, Gouda MG, Arora A. Secret instantiation in ad-hoc networks Computer Communications. 29: 200-215. DOI: 10.1016/J.Comcom.2005.05.017 |
0.392 |
|
2005 |
Liu AX, Kovacs JM, Huang CT, Gouda MG. A secure cookie protocol Proceedings - International Conference On Computer Communications and Networks, Icccn. 2005: 333-338. DOI: 10.1109/ICCCN.2005.1523880 |
0.358 |
|
2005 |
Liu AX, Gouda MG. Complete redundancy detection in firewalls Lecture Notes in Computer Science. 3654: 193-206. DOI: 10.1007/11535706_15 |
0.32 |
|
2005 |
McGuire TM, Gouda MG. The Austin Protocol Compiler Advances in Information Security. 13: 1-132. |
0.682 |
|
2005 |
Cobb JA, Gouda MG, Sidhu D. Hello again: Stabilization of the Hello protocol in OSPF Journal of High Speed Networks. 14: 39-57. |
0.344 |
|
2004 |
Liu AX, Gouda MG. Diverse firewall design Proceedings of the International Conference On Dependable Systems and Networks. 595-604. DOI: 10.1109/Tpds.2007.70802 |
0.32 |
|
2004 |
Jung E, Elmallah ES, Gouda MG. Optimal dispersal of certificate chains Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3274: 435-449. DOI: 10.1109/Tpds.2007.1007 |
0.319 |
|
2004 |
Arora A, Dutta P, Bapat S, Kulathumani V, Zhang H, Naik V, Mittal V, Cao H, Demirbas M, Gouda M, Choi Y, Herman T, Kulkarni S, Arumugam U, Nesterenko M, et al. A line in the sand: A wireless sensor network for target detection, classification, and tracking Computer Networks. 46: 605-634. DOI: 10.1016/J.Comnet.2004.06.007 |
0.532 |
|
2004 |
Gouda MG, Liu AX. Formal specification and verification of a micropayment protocol Proceedings - International Conference On Computer Communications and Networks, Icccn. 489-494. |
0.375 |
|
2003 |
Gouda MG, Schneider M. Maximizable routing metrics Ieee/Acm Transactions On Networking. 11: 663-675. DOI: 10.1109/Tnet.2003.815294 |
0.397 |
|
2003 |
Choi YR, Gouda MG, Kim MC, Arora A. The mote connectivity protocol Proceedings - International Conference On Computer Communications and Networks, Icccn. 2003: 533-538. DOI: 10.1109/ICCCN.2003.1284220 |
0.347 |
|
2003 |
Gouda MG, Huang CT. A secure address resolution protocol Computer Networks. 41: 57-71. DOI: 10.1016/S1389-1286(02)00326-2 |
0.473 |
|
2003 |
Cobb JA, Gouda MG, Musunuri R. A stabilizing solution to the stable path problem Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2704: 169-183. DOI: 10.1007/3-540-45032-7_13 |
0.334 |
|
2003 |
Demirbas M, Arora A, Gouda MG. A pursuer-evader game for sensor networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2704: 1-16. DOI: 10.1007/3-540-45032-7_1 |
0.313 |
|
2002 |
Cobb JA, Gouda MG. Stabilization of general loop-free routing Journal of Parallel and Distributed Computing. 62: 922-944. DOI: 10.1006/Jpdc.2001.1830 |
0.433 |
|
2001 |
Huang CT, Gouda MG. An anti-replay window protocol with controlled shift Proceedings - International Conference On Computer Communications and Networks, Icccn. 2001: 242-247. DOI: 10.1109/ICCCN.2001.956254 |
0.376 |
|
2001 |
Gouda MG. Elements of security: Closure, convergence, and protection Information Processing Letters. 77: 109-114. DOI: 10.1016/S0020-0190(00)00207-6 |
0.334 |
|
2001 |
Gouda MG, Huang CT, Arora A. On the security and vulnerability of PING Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2194: 124-135. DOI: 10.1007/3-540-45438-1_9 |
0.438 |
|
2001 |
Gouda MG. The theory of weak stabilization Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2194: 114-123. DOI: 10.1007/3-540-45438-1_8 |
0.312 |
|
2001 |
Cobb JA, Gouda MG. Stabilization of routing in directed networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2194: 51-66. DOI: 10.1007/3-540-45438-1_4 |
0.379 |
|
2000 |
Gouda MG, Elnozahy EN, Huang CT, McGuire TM. Hop integrity in computer networks International Conference On Network Protocols. 3-11. DOI: 10.1109/Tnet.2002.1012363 |
0.679 |
|
2000 |
Wong CK, Gouda M, Lam SS. Secure group communications using key graphs Ieee Acm Transactions On Networking. 8: 16-30. DOI: 10.1109/90.836475 |
0.403 |
|
2000 |
Gouda MG, Elnozahy EN, Huang CT, McGuire TM. Hop integrity in computer networks International Conference On Network Protocols. 3-11. |
0.313 |
|
2000 |
Gouda MG, McGuire TM. Alert communication primitives above TCP Journal of High Speed Networks. 9: 139-150. |
0.647 |
|
1998 |
Cobb JA, Gouda MG, El-Nahas A. Time-shift scheduling - Fair scheduling of flows in high-speed networks Ieee/Acm Transactions On Networking. 6: 274-285. DOI: 10.1109/90.700891 |
0.333 |
|
1998 |
Gouda MG, McGuire TM. Accelerated heartbeat protocols Proceedings - International Conference On Distributed Computing Systems. 202-209. |
0.644 |
|
1997 |
Cobb JA, Gouda MG. The request reply family of group routing protocols Ieee Transactions On Computers. 46: 659-672. DOI: 10.1109/12.600824 |
0.417 |
|
1997 |
Steves DH, Edmondson-Yurkanan C, Gouda M. Properties of secure transaction protocols Computer Networks and Isdn Systems. 29: 1809-1821. DOI: 10.1016/S0169-7552(97)00101-3 |
0.645 |
|
1996 |
Gouda MG. Network protocols between exact specifications and pragmatic implementations Acm Computing Surveys. 28: 43. DOI: 10.1145/242224.242278 |
0.422 |
|
1996 |
Cobb JA, Gouda MG. Group routing without group routing tables: An exercise in protocol design Computer Communications. 19: 1161-1174. DOI: 10.1016/S0140-3664(96)01151-6 |
0.438 |
|
1996 |
Abdel-Wahab HM, Gouda MG. Systems of recall broadcast Information Sciences. 90: 1-17. DOI: 10.1016/0020-0255(94)00081-6 |
0.39 |
|
1995 |
Gouda MG, Netravali AN, Sabnani K. A Periodic State Exchange Protocol and Its Verification Ieee Transactions On Communications. 43: 2475-2484. DOI: 10.1109/26.412722 |
0.411 |
|
1995 |
Gouda MG, Paul S. Wireless link protocol: design by refinement International Conference On Network Protocols. 192-200. |
0.385 |
|
1993 |
Gouda MG. Protocol verification made simple: a tutorial Computer Networks and Isdn Systems. 25: 969-980. DOI: 10.1016/0169-7552(93)90094-K |
0.487 |
|
1993 |
Singh AK, Gouda MG. Rankers: a classification of synchronization problems Science of Computer Programming. 21: 191-223. DOI: 10.1016/0167-6423(93)90009-E |
0.533 |
|
1991 |
Brown GM, Gouda MG, Miller RE. Block Acknowledgment: Redesigning the Window Protocol Ieee Transactions On Communications. 39: 524-532. DOI: 10.1109/26.81740 |
0.429 |
|
1991 |
Gouda MG, Multari NJ. Stabilizing Communication Protocols Ieee Transactions On Computers. 40: 448-458. DOI: 10.1109/12.88464 |
0.46 |
|
1991 |
Chang CK, Gouda MG. On the minimum requirements for independent recovery in distributed systems Information Processing Letters. 37: 1-7. DOI: 10.1016/0020-0190(91)90242-A |
0.327 |
|
1985 |
Chow CH, Gouda MG, Lam SS. A discipline for constructing multiphase communication protocols Acm Transactions On Computer Systems (Tocs). 3: 315-343. DOI: 10.1145/6110.214400 |
0.438 |
|
1985 |
Gouda MG, Rosier LE. Priority Networks of Communicating Finite State Machines Siam Journal On Computing. 14: 569-584. DOI: 10.1137/0214042 |
0.317 |
|
1985 |
Gouda MG, Lee H. Proving Liveness and Termination of Systolic Arrays Using Communicating Finite State Machines Ieee Transactions On Software Engineering. 11: 1240-1251. DOI: 10.1109/Tse.1985.231871 |
0.34 |
|
1985 |
Gouda M. On "A Simple Protocol Whose Proof Isńt": The State Machine Approach Ieee Transactions On Communications. 33: 380-382. DOI: 10.1109/Tcom.1985.1096296 |
0.374 |
|
1985 |
Gouda MG, Han JY. Protocol validation by fair progress state exploration Computer Networks and Isdn Systems. 9: 353-361. DOI: 10.1016/0169-7552(85)90086-8 |
0.368 |
|
1984 |
Gouda MG. Closed Covers: To Verify Progress for Communicating Finite State Machines Ieee Transactions On Software Engineering. 846-855. DOI: 10.1109/Tse.1984.5010313 |
0.32 |
|
1984 |
Gouda MG, Manning EG, Yu YT. On the progress of communication between two finite state machines Information and Control. 63: 200-216. DOI: 10.1016/S0019-9958(84)80014-5 |
0.313 |
|
Show low-probability matches. |