Mahmoud EL-HADIDI
Mahmoud EL-HADIDI
Professor of Computer Networks, Cairo University
Verified email at eun.eg - Homepage
TitleCited byYear
Throughput analysis of IEEE 802.11 DCF under finite load traffic
AN Zaki, MT El-Hadidi
First International Symposium on Control, Communications and Signal …, 2004
522004
Analysis of wireless CSMA/CA network using single station superposition (SSS)
TMS Khattab, MT El-Hadidi, HAM Mourad
AEU-International Journal of Electronics and Communications 56 (2), 73-83, 2002
272002
Fuzzy-based Adaptive Cross Layer Routing Protocol for Delay Sensitive Applications in MANET
C Fathy, MT El-Hadidi, MA El-Nasr
ICC 2012 - Ad-hoc and Sensor Networking Symposium, Ottawa (CANADA), 2012
152012
Implementation of a hybrid encryption scheme for Ethernet
MT El-Hadidi, NH Hegazi, HK Aslan
Proceedings IEEE Symposium on Computers and Communications, 150-156, 1995
151995
Performance analysis and estimation of call admission control parameters in wireless integrated voice and data networks
MT El‐Hadidi, KM Elsayed, MM Abdallah
European transactions on telecommunications 11 (4), 327-343, 2000
112000
Performance evaluation of resource reservation and call admission policies for deterministic services in PGPS-based packet networks
KMF Elsayed, A Saad, MT El-Hadidi
Computer Communications 25 (17), 1513-1526, 2002
102002
Known attacks for the A5/1 algorithm: a tutorial
SE AlAschkar, MT El-Hadidi
International Conference on Information and Communications Technology (ICICT …, 2003
92003
Performance analysis of the Kerberos protocol in a distributed environment
MT El-Hadidi, NH Hegazi, HK Aslan
Proceedings Second IEEE Symposium on Computer and Communications, 235-239, 1997
91997
Fuzzy-based Adaptive Cross Layer Routing Protocol for Mobile Ad hoc Networks
C Fathy, MT El-Hadidi, MA El-Nasr
International Performance Computing and Communications Conference (IPCCC2011), 2011
82011
Quantifying the ict needs of academic institutes using the service category-stakeholder matrix approach
M El-Hadidi, H Anis, S El-Akabawi, A Fahmy, M Salem, A Tantawy, ...
2008 ITI 6th International Conference on Information & Communications …, 2008
82008
Security in the Information Society : Visions and Perspectives
MA Ghonaimy, MT El-Hadidi, HK Aslan
Springer, 2002
8*2002
Performance evaluation of a new hybrid encryption protocol for authentication and key distribution
MT El-Hadidi, NH Hegazi, HK Aslan
Proceedings IEEE International Symposium on Computers and Communications …, 1999
81999
Logic-based analysis of a new hybrid encryption protocol for authentication and key distribution
MT El-Hadidi, NH Hegazi, HK Aslan
SEC'98: international conference on information security, 173-183, 1998
81998
Performance evaluation of IEEE 802.11-based wireless LANs under finite-load conditions
AN Zaki, MT El-Hadidi
AEU-International Journal of Electronics and Communications 62 (5), 327-337, 2008
72008
The Bayes' optimal receiver for digital fibre optic communication systems
MT El-Hadidi, B Hirosaki
Optical and Quantum Electronics 13 (6), 469-486, 1981
71981
Effect of user mobility on the QoS parameters for the guard channel policy
MM Abdallah, MT El-Hadidi, KM El-Sayed
Proceedings IEEE International Symposium on Computers and Communications …, 1999
61999
GALS-based LPSP: Implementation of a novel architecture for low power high performance security processors
HA Farouk, MT El-Hadidi, AA El Farag
2011 IEEE International Symposium on Parallel and Distributed Processing …, 2011
52011
Implementing globally asynchronous locally synchronous processor pipeline on commercial synchronous fpgas
HA Farouk, MT El-Hadidi
2010 17th International Conference on Telecommunications, 989-994, 2010
52010
Performance evaluation of a new learning automata based routing algorithm for calls in telephone networks
MT El-Hadidi, HM El-Sayed, AY Bilal
ITC-11, 1985
51985
A modified secure remote password (SRP) protocol for key initialization and exchange in bluetooth systems
AA Sayegh, MT El-Hadidi
First International Conference on Security and Privacy for Emerging Areas in …, 2005
32005
The system can't perform the operation now. Try again later.
Articles 1–20