Mohamed G. Gouda
#154,718
Most Influential Person Now
American computer scientist
Mohamed G. Gouda's AcademicInfluence.com Rankings
Mohamed G. Goudacomputer-science Degrees
Computer Science
#8425
World Rank
#8858
Historical Rank
Database
#5432
World Rank
#5636
Historical Rank

Download Badge
Computer Science
Mohamed G. Gouda's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
- Bachelors Computer Science Cairo University
Similar Degrees You Can Earn
Why Is Mohamed G. Gouda Influential?
(Suggest an Edit or Addition)According to Wikipedia, Mohamed G. Gouda is an American computer scientist, currently the Mike A. Myers Centennial Professor at University of Texas at Austin.
Mohamed G. Gouda's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Secure group communications using key graphs (1998) (1093)
- Secure group communications using key graphs (2000) (1006)
- A line in the sand: a wireless sensor network for target detection, classification, and tracking (2004) (1005)
- ExScal: elements of an extreme scale wireless sensor network (2005) (370)
- Distributed Reset (1994) (324)
- Closure and Convergence: A Foundation of Fault-Tolerant Computing (1993) (314)
- Reliable bursty convergecast in wireless sensor networks (2005) (297)
- Batch rekeying for secure group communications (2001) (275)
- Firewall design: consistency, completeness, and compactness (2004) (218)
- Stabilizing Communication Protocols (1991) (215)
- Diverse Firewall Design (2004) (196)
- Structured firewall design (2007) (179)
- Memory requirements for silent stabilization (1996) (151)
- Token Systems that Self-Stabilize (1989) (144)
- NSF/IEEE-TCPP curriculum initiative on parallel and distributed computing: core topics for undergraduates (2011) (118)
- Elements of network protocol design (1998) (117)
- Complete Redundancy Detection in Firewalls (2005) (108)
- A model of stateful firewalls and its properties (2005) (105)
- Maintaining Digital Clocks in Step (1991) (104)
- A secure address resolution protocol (2003) (101)
- Adaptive Programming (1991) (98)
- Maximizable routing metrics (1998) (94)
- Protocol Validation by Maximal Progress State Exploration (1984) (90)
- Synthesis of Communicating Finite-State Machines with Guaranteed Progress (1984) (86)
- Stabilizing Unison (1990) (86)
- The alternator (1999) (79)
- The elusive atomic register revisited (1987) (77)
- Complete Redundancy Removal for Packet Classifiers in TCAMs (2010) (76)
- A Pursuer-Evader Game for Sensor Networks (2003) (75)
- Firewall Policy Queries (2009) (74)
- The Theory of Weak Stabilization (2001) (73)
- The Triumph and Tribulation of System Stabilization (1995) (73)
- Protocol Validation by Fair Progress State Exploration (1985) (70)
- Flow theory (1997) (59)
- A discipline for constructing multiphase communication protocols (1985) (58)
- Time-shift scheduling: fair scheduling of flows in high speed networks (1996) (55)
- The elusive atomic register (1994) (55)
- Closed Covers: To Verify Progress for Communicating Finite State Machines (1984) (54)
- Stabilization and pseudo-stabilization (1993) (54)
- Asynchronous unison (1992) (54)
- Deadlock Detection for a Class of Communicating Finite State Machine (1982) (50)
- Proving liveness for networks of communicating finite state machines (1986) (49)
- Constraint satisfaction as a basis for designing nonmasking fault-tolerance (1994) (49)
- Firewall Queries (2004) (47)
- On deadlock detection in systems of communicating finite state machines (1987) (46)
- Protocol Verification Made Simple: A Tutorial (1993) (46)
- Accelerated heartbeat protocols (1998) (45)
- A secure cookie protocol (2005) (45)
- On the Progress of Communications between Two Finite State Machines (1986) (45)
- Hop integrity in computer networks (2000) (42)
- Truth in advertising: lightweight verification of route integrity (2007) (41)
- The Stabilizing Token Ring in Three Bits (1996) (41)
- SPP: An anti-phishing single password protocol (2007) (41)
- Asynchronous Unison (Extended Abstract). (1992) (38)
- Secret instantiation in ad-hoc networks (2006) (37)
- Composite routing protocols (1990) (36)
- Stabilization of General Loop-Free Routing (2002) (34)
- A Stabilizing Solution to the Stable Path Problem (2003) (34)
- The best keying protocol for sensor networks (2011) (33)
- Block acknowledgement: redesigning the window protocol (1989) (32)
- Distributed Reset (Extended Abstract) (1990) (31)
- Verification of Distributed Firewalls (2008) (31)
- The linear alternator (1997) (31)
- Optimal semijoin schedules for query processing in local distributed database systems (1981) (30)
- The mote connectivity protocol (2003) (29)
- Nash equilibria in stabilizing systems (2009) (28)
- Projection and Division: Linear-Space Verification of Firewalls (2010) (27)
- The Virtue of Patience: Concurrent Programming with and Without Waiting (1990) (26)
- Key trees and the security of interval multicast (2002) (25)
- Stabilization of Grid Routing in Sensor Networks (2006) (25)
- A new approach to modularity in rule-based programming (1994) (25)
- Stabilization of maximal metric trees (1999) (25)
- Routing on a Logical Grid in Sensor Networks (2004) (25)
- Firewall verification and redundancy checking are equivalent (2011) (23)
- Key Grids: A Protocol Family for Assigning Symmetric Keys (2006) (23)
- Certificate dispersal in ad-hoc networks (2004) (22)
- Correct implementation of network protocols (2004) (22)
- Whisper: Local Secret Maintenance in Sensor Networks (2003) (22)
- Closure and convergence: a formulation of fault-tolerant computing (1992) (21)
- Unboundedness Detection for a Class of Communicating Finite-State Machines (1983) (19)
- The Stabilizing Philosopher: Asymmetry by Memory and by Action (1987) (18)
- Properties of secure transaction protocols (1997) (18)
- HTTPI: An HTTP with Integrity (2011) (18)
- An exercise in constructing multi-phase communication protocols (1984) (17)
- Is That You? Authentication in a Network without Identities (2011) (17)
- A secure cookie scheme (2012) (16)
- On Deciding Progress for a Class of Communication Protocols (1983) (16)
- Optimal Dispersal of Certificate Chains (2004) (15)
- Linear-time verification of firewalls (2009) (15)
- On the Decidability of Livelock Detection in Networks of Communicating Finite State Machines (1984) (14)
- Distributed State Exploration for Protocol Validation (1981) (14)
- Priority Networks of Communicating Finite State Machines (1985) (14)
- DESAL alpha: An Implementation of the Dynamic Embedded Sensor-Actuator Language (2008) (14)
- Logarithmic Keying of Communication Networks (2006) (14)
- Removing Redundancy from Packet Classifiers (2004) (14)
- Zmail: zero-sum free market control of spam (2005) (14)
- Multiphase Stabilization (2002) (13)
- Firewall modules and modular firewalls (2010) (13)
- On "A Simple Protocol Whose Proof Isńt": The State Machine Approach (1985) (13)
- Convergence/response tradeoffs in concurrent systems (1990) (13)
- Vulnerability analysis of certificate graphs (2006) (13)
- Hop chains: Secure routing and the establishment of distinct identities (2006) (13)
- Maximal progress state exploration (1983) (13)
- Pursuer–Evader Tracking in Sensor Networks (2006) (13)
- Atomic Semantics of Nonatomic Programs (1988) (13)
- A protocol for secure transactions (1996) (13)
- Stabilization of Routing in Directed Networks (2001) (13)
- Hardness of Firewall Analysis (2014) (12)
- Implementation of the sentry system (1994) (12)
- Protocol Machines: A Concise Formal Model and its Automatic Implementation (1976) (12)
- Batch Updates of Key Trees (2000) (12)
- Anti-replay window protocols for secure IP (2000) (12)
- A technique for proving liveness of communicating finite state machines with examples (1984) (12)
- The K-observer problem in computer networks (2011) (12)
- A state-based model of sensor protocols (2005) (12)
- A state-based language for sensor-actuator networks (2007) (12)
- Balanced routing (1997) (12)
- Project ExScal (Short Abstract) (2005) (11)
- Modularity and Rule-Based Programming (1995) (11)
- An anti-replay window protocol with controlled shift (2001) (11)
- Using semiouterjoins to process queries in multidatabase systems (1984) (11)
- A Theory of Network Tracing (2009) (11)
- On the modelling, analysis and design of protocols - a special class of software structures (1976) (11)
- An Example for Constructing Communicating Machines by Step-Wise Refinement (1983) (11)
- Flow theory: Verification of rate-reservation protocols (1993) (11)
- Antireplay Protocols for Sensor Networks (2005) (11)
- Elements of security: Closure, convergence, and protection (2001) (11)
- On the Hardness of Topology Inference (2011) (10)
- Convergence of iteration systems (1993) (10)
- Toward a theory for self-stabilizing protocols (1989) (10)
- Flow routing in computer networks (1997) (10)
- Logarithmic keying (2008) (10)
- The Austin Protocol Compiler (2004) (10)
- Livelock Detection in Networks of Communicating Finite State Machines (1984) (10)
- Memory Requirements for Silent Stabilization (Extended Abstract). (1996) (9)
- Stabilization of max-min fair networks without per-flow state (2008) (9)
- Fault Masking in Tri-redundant Systems (2006) (9)
- The instability of self-stabilization (1990) (9)
- Inter-stream adaptation for collaborative multimedia applications (1996) (9)
- Self-Stabilization by Tree Correction (1997) (9)
- The sentry system (1992) (9)
- MULTIPLE PROCESSOR SCHEDULING POLICIES. (1979) (8)
- Sentries and Sleepers in Sensor Networks (2004) (8)
- Protocol machines: towards a logical theory of communication protocols. (1977) (8)
- A new explanation of the glitch phenomenon (1991) (8)
- Bounded-time fault-tolerant rule-based systems (1990) (8)
- Key bundles and parcels: Secure communication in many groups (2003) (7)
- A criterion for atomicity (1990) (7)
- Single Password , Multiple Accounts (2005) (7)
- The Request Reply Family of Group Routing Protocols (1997) (7)
- Stabilization of maximum flow trees (1994) (7)
- Dependable Systems - Whisper: Local Secret Maintenance in Sensor Networks (2003) (7)
- Stabilizing Certificate Dispersal (2005) (6)
- A hierarchical controller for concurrent accessing of distributed databases (1978) (6)
- The Weak Network Tracing Problem (2010) (6)
- DECIDING PROGRESS FOR A CLASS OF COMMUNICATING FINITE STATE MACHINES. (1984) (6)
- Modeling physical layer protocols using communicating finite state machines (1985) (6)
- Load Balancing: An Exercise in Constrainted Convergence (1995) (6)
- A secure credit card protocol over NFC (2016) (6)
- A new explanation of the glitch phenomenon (1992) (5)
- Ranking in distributed systems (1989) (5)
- On Constructing Multi-Phase Communication Protocols (1984) (5)
- On the progress of communication between two machines (1980) (5)
- Pharewell to Phishing (2008) (5)
- The Austin Protocol Compiler (Advances in Information Security) (2004) (5)
- Key Bundels and Parcels: Secure Communication in Many Groups (2003) (5)
- Hop Integrity in the Internet (2005) (5)
- State checksum and its role in system stabilization (2005) (5)
- Analysis of real-time control systems by the model of packet nets (1979) (5)
- The Implication Problem of Computing Policies (2015) (4)
- The Truth System: Can a System of Lying Processes Stabilize? (2007) (4)
- Sources and Monitors: A Trust Model for Peer-to-Peer Networks (2008) (4)
- Group routing without group routing tables: an exercise in protocol design (1996) (4)
- A Stabilizing Deactivation/Reactivation Protocol (2007) (4)
- Flow Timestamps (1995) (4)
- Alert communication primitives above TCP (2000) (4)
- Alternating parallelism and the stabilization of distributed systems (1999) (4)
- IP Fast Reroute in Networks with Shared Risk Links (2010) (3)
- Protocol synchronization with sparse timestraps (1995) (3)
- Formal Specification and Verification of a Secure Micropayment Protocol (2008) (3)
- Flow theory and the analysis of timed-flow protocols (1996) (3)
- Brief announcement: the theory of network tracing (2009) (3)
- Stabilization of Flood Sequencing Protocols in Sensor Networks (2007) (3)
- Serializable programs, parallelizable assertions: a basis for interleaving (1989) (3)
- On the Security and Vulnerability of PING (2001) (3)
- Proving Liveness and Termination of Systolic Arrays Using Communicating Finite State Machines (1985) (3)
- Correctness Preserving Transformations for Network Protocol Compilers (2001) (3)
- Incremental Verification of Computing Policies (2014) (3)
- Policy expressions and the bottom-up design of computing policies (2017) (3)
- A periodic state exchange protocol and its verification (1995) (3)
- Analysis of Computing Policies Using SAT Solvers (2016) (2)
- Distributed Data Processing Technology. Volume IV. Application of DDP Technology to BMD: Architectures and Algorithms. (1977) (2)
- Stabilizing Observers (1994) (2)
- Communicating Finite State Machines with Priority Channnels (1984) (2)
- Atomicity of concurrent programs (1990) (2)
- Independent Recovery (1987) (2)
- THEORY OF CLOSED COVERS: TO DECIDE PROGRESS OF COMMUNICATING FINITE STATE MACHINES. (1985) (2)
- Keynote Talk: Communication Without Repudiation: The Unanswered Question (2014) (2)
- Erratum to "Secret instantiation in ad-hoc networks" [Computer Communications 29 (2006) 200-215] (2006) (2)
- BROADCASTING FINITE STATE MACHINES: FOR MODELING LAN PROTOCOLS. (1986) (2)
- Optimal dispersal of special certificate graphs (2004) (2)
- Delivery and discrimination: the Seine protocol (1988) (2)
- Delay-insensitive stabilization (1997) (2)
- Systems of Recall Broadcast (1996) (1)
- Rankers: A Classification of Synchronization Problems (1993) (1)
- Formal specification and verification of a micropayment protocol (2004) (1)
- Reliable Bursty Convergecast in Multi-hop Wireless Sensor Networks (1)
- 2019 IEEE International Symposium on a World of Wireless, Mobile, and Multimedia Networks (2019) (1)
- INTERACTIVE VERIFICATION AND CONSTRUCTION OF COMMUNICATION PROTOCOLS IN PROSPEC. (1986) (1)
- Universal mobile addressing (1994) (1)
- System Simulation and the Sensitivity of Self-Stabilization (1989) (1)
- Universal Mobile Addressing in the Internet (1994) (1)
- Group routing without group routing tables (1996) (1)
- Pharewell to Phishing : Secure Direction and Redirection over the Web (2008) (1)
- Convergence of IPsec in presence of resets (2003) (1)
- Convergence of Iteration Systems (Extended Abstract) (1990) (1)
- Hello again: Stabilization of the Hello protocol in OSPF (2005) (1)
- Analysis of Computing Policies Using SAT Solvers (Short Paper) (2016) (1)
- Security Instantiation for Mobile Networks (1)
- Sentries for the execution of concurrent programs (1996) (1)
- Alert Communication Primitives in TCP (2006) (1)
- Structured firewall design q (2006) (1)
- Nonrepudiation Protocols Without a Trusted Party (2016) (1)
- Self-Stabilizing Systems, Part 1 (2005) (1)
- A Finite State Model for Protocol Processes and Services (1982) (1)
- Two-phase Nonrepudiation Protocols (2016) (1)
- Whisper : A Local Secret Maintenance Protocol (1)
- Securing NFC Credit Card Payments Against Malicious Retailers (2016) (1)
- On the Minimum Requirements for Independent Recovery in Distributed Systems (1991) (1)
- Policy expressions and the bottom-up design of computing policies (2018) (1)
- Ordered Delivery over One-way Virtual Circuits (1995) (1)
- Hop Integrity and the Security of Routing Protocols (2002) (1)
- A wireless link protocol: design by refinement (1995) (1)
- Recall broadcast (1993) (1)
- On the Notion of Equivalence for Communicating Finite State Machines (1984) (1)
- How to Assign Symmetric Keys in a Network of Small Computers (2006) (0)
- Fault Masking of Stabilizing Systems (2007) (0)
- Flow scheduling protocols without real-time clocks (1997) (0)
- The Disciplined Flood Protocol in Sensor Networks (2006) (0)
- Self-stabilization by Tree Correction (info) Self-stabilization by Tree Correction (info) Self-stabilization by Tree Correction (1995) (0)
- Proceedings - International Conference on Network Protocols, ICNP: Message from the general chairs (2008) (0)
- ConvergencelResponse Tradeoffs in Concurrent Systems Extended Abstract (1990) (0)
- Consistent Fixed Points and Negative Gain (2009) (0)
- Protocol engineering (panel session) (1991) (0)
- Nash Equilibria in Distributed Systems (2009) (0)
- Brief Announcement: Consistent Fixed Points and Negative Gain (2009) (0)
- The Two-Dimensional Window Protocol (1992) (0)
- Balanced Peer Lists: Towards a Collusion-Resistant BGP (2009) (0)
- Contract in electronic commerce (2005) (0)
- Authentication by name or by registration (2008) (0)
- Authentication by Name or by Registration In vited Talk (2008) (0)
- Brief Announcement: A Conjecture on Traceability, and a New Class of Traceable Networks (2011) (0)
- Universal mobile addressing in the Internet (1994) (0)
- Brief Announcement: On the Hardness of Topology Inference (2010) (0)
- Firewall Outsourcing : Efficiency , Verifiability , Privacy (2018) (0)
- General and scalable state feedback for multimedia systems (1999) (0)
- Executing Firewalls in Public Clouds (2019) (0)
- A new journal is born (1986) (0)
- On the Power of Non-spoofing Adversaries (2010) (0)
- A General Alternator (2005) (0)
- Global and Local Models for the Specification and Verification of Distributed Systems (1979) (0)
- Rankers: A Panacea for Synchronization (1989) (0)
- Brief announcement: RedRem: a parallel redundancy remover (2011) (0)
- MODULAR MISSILE BORNE COMPUTER (MMBC) SOFTWARE STRUCTURE AND IMPLEMENTATION. (1979) (0)
- W.C. Carter Award (2005) (0)
- Nonrepudiation Protocols in Cloud Systems (2016) (0)
- Mission critical networking [Guest editorial] (2010) (0)
- Hop integrity: a defense against denial-of-service attacks (2005) (0)
- The Blocking Option in Routing Protocols (2009) (0)
- Stabilizing Client/Server Protocols without the Tears (1995) (0)
- Necessary and Sufficient Conditions to Detect Message Duplication in Protocol Hierarchies (1982) (0)
- Dispersability and vulnerability analysis of certificate systems (2006) (0)
- Rating Certificates (2006) (0)
- Proceedings 19th IEEE International Conference on Distributed Computing Systems May 31-June 4, 1999 Austin, Texas (1999) (0)
- Network protocols between exact specifications and pragmatic implementations (1996) (0)
- Guest Editorial: Mission critical networking (2010) (0)
- Veri fi cation of Distributed Firewalls (2009) (0)
- A Methodology to Design Deadlock-free and Banded Protocols (1981) (0)
- TPP: The Two-Way Password Protocol (2011) (0)
- Message recall in electronic mail systems (1994) (0)
- Message from the Technical Committee Co-chairs (2005) (0)
- Design and analysis of self-stabilizing sensor network protocols (2007) (0)
- Proceedings of the 2nd ACM workshop on Assurable and usable security configuration (2009) (0)
- Message FROM THE ICNP 2014 technical program chairs (2014) (0)
- The Granularity of Waiting (Extended Abstract) (1992) (0)
- A hierarchical controller for concurrent accessing of distributed databases (1978) (0)
This paper list is powered by the following services:
Other Resources About Mohamed G. Gouda
What Schools Are Affiliated With Mohamed G. Gouda?
Mohamed G. Gouda is affiliated with the following schools: