default search action
Daouda Ahmat
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c14]Mahamat Ismael Hassan, Daouda Ahmat, Samuel Ouya:
Technologies Behind the Humanitarian Demining: A Review. SmartNets 2024: 1-7 - 2023
- [c13]Mahamat Ismael Hassan, Daouda Ahmat, Samuel Ouya, Mahamat Charfadine Salim, Mahamat Borgour Hassan:
Latest Generation Technologies for Network Coverage in Infrastructure-Less Areas. ISNCC 2023: 1-6 - 2022
- [c12]Mahamat Abdouna, Daouda Ahmat, Tegawendé F. Bissyandé:
Virtual Fences: A Systematic Literature Review. AFRICOMM 2022: 115-148 - [c11]Adoum Youssouf, Daouda Ahmat, Mahamat Borgou:
Disjoint Routing Algorithms: A Systematic Literature Review. AFRICOMM 2022: 160-192
2010 – 2019
- 2019
- [j4]Daouda Ahmat, Marayi Choroma, Tegawendé F. Bissyandé:
Multipath Key Exchange Scheme Based on the Diffie-Hellman Protocol and the Shamir Threshold. Int. J. Netw. Secur. 21(3): 418-427 (2019) - 2018
- [j3]Daouda Ahmat, Damien Magoni:
A Survey on Secure and Resilient Session Schemes: Technical Comparison and Assessment. EAI Endorsed Trans. Ubiquitous Environ. 4(13): e1 (2018) - [c10]Sankalp Ghatpande, Hadja Ouattara, Daouda Ahmat, Zakaria Sawadogo, Tegawendé F. Bissyandé:
Secure, Transparent and Uniform Mobile Money for Internet-Underserved Areas Using Sporadically-Synchronized Blockchain. AFRICOMM 2018: 120-130 - 2017
- [c9]Hadja F. Ouattara, Daouda Ahmat, Frédéric Tounwendyam Ouédraogo, Tegawendé F. Bissyandé, Oumarou Sié:
Blockchain Consensus Protocols - Towards a Review of Practical Constraints for Implementation in Developing Countries. AFRICOMM 2017: 304-314 - 2016
- [c8]Daouda Ahmat, Mahamat Barka, Damien Magoni:
Mobile VPN Schemes: Technical Analysis and Experiments. AFRICOMM 2016: 88-97 - [c7]Daouda Ahmat, Mahamat Barka, Damien Magoni:
SEMOS: A Middleware for Providing Secure and Mobility-Aware Sessions over a P2P Overlay Network. AFRICOMM 2016: 111-121 - 2015
- [j2]Daouda Ahmat, Damien Magoni, Tegawendé F. Bissyandé:
End-to-End Key Exchange through Disjoint Paths in P2P Networks. EAI Endorsed Trans. Security Safety 2(3): e3 (2015) - [c6]Tegawendé F. Bissyandé, Jonathan Ouoba, Daouda Ahmat, Frédéric Tounwendyam Ouédraogo, Cedric Béré, Moustapha Bikienga, Abdoulaye Séré, Mesmin Dandjinou, Oumarou Sié:
Vulnerabilities of Government Websites in a Developing Country - the Case of Burkina Faso. AFRICOMM 2015: 123-135 - 2014
- [j1]Telesphore Tiendrebeogo, Daouda Ahmat, Damien Magoni:
Évaluation de la fiabilité d'une table de hachage distribuée construite dans un plan hyperbolique. Tech. Sci. Informatiques 33(4): 311-341 (2014) - [c5]Tegawendé F. Bissyandé, Jonathan Ouoba, Daouda Ahmat, Arthur D. Sawadogo, Zakaria Sawadogo:
Bootstrapping Software Engineering Training in Developing Countries - Return on Experience at the University of Ouagadougou. AFRICOMM 2014: 261-268 - 2013
- [c4]Daouda Ahmat, Tegawendé F. Bissyandé, Damien Magoni:
Towards Securing Communications in Infrastructure-Poor Areas. AFRICOMM 2013: 59-69 - [c3]Tegawendé F. Bissyandé, Daouda Ahmat, Jonathan Ouoba, Gertjan van Stam, Jacques Klein, Yves Le Traon:
Sustainable ICT4D in Africa: Where Do We Go from Here? AFRICOMM 2013: 95-103 - 2012
- [c2]Telesphore Tiendrebeogo, Daouda Ahmat, Damien Magoni:
Reliable and Scalable Distributed Hash Tables Harnessing Hyperbolic Coordinates. NTMS 2012: 1-6 - [c1]Daouda Ahmat, Damien Magoni:
MUSeS: Mobile User Secured Session. Wireless Days 2012: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-24 20:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint