Abdallah M’Hamed

439 total citations
12 papers, 274 citations indexed

About

Abdallah M’Hamed is a scholar working on Computer Networks and Communications, Computer Vision and Pattern Recognition and Information Systems. According to data from OpenAlex, Abdallah M’Hamed has authored 12 papers receiving a total of 274 indexed citations (citations by other indexed papers that have themselves been cited), including 9 papers in Computer Networks and Communications, 6 papers in Computer Vision and Pattern Recognition and 4 papers in Information Systems. Recurrent topics in Abdallah M’Hamed's work include Advanced Authentication Protocols Security (7 papers), Context-Aware Activity Recognition Systems (5 papers) and Cryptography and Data Security (3 papers). Abdallah M’Hamed is often cited by papers focused on Advanced Authentication Protocols Security (7 papers), Context-Aware Activity Recognition Systems (5 papers) and Cryptography and Data Security (3 papers). Abdallah M’Hamed collaborates with scholars based in France, Algeria and Lebanon. Abdallah M’Hamed's co-authors include Yasha Wang, Chao Chen, Xiao Han, Daqing Zhang, Leye Wang, Mounir Mokhtari, Jérôme Boudy, Daqing Zhang, Hossam Afifi and Ahmed Meddahi and has published in prestigious journals such as IEEE Communications Magazine, Chaos Solitons & Fractals and Personal and Ubiquitous Computing.

In The Last Decade

Abdallah M’Hamed

12 papers receiving 268 citations

Peers

Abdallah M’Hamed
Saurabh Nangia United States
Ulrich Sorger Luxembourg
Giacomo Benincasa United States
Guoxing Zhan United States
Dane Brown United States
Jeremy Martin United States
Erik C. Rye United States
Libo Song United States
Travis Mayberry United States
Saurabh Nangia United States
Abdallah M’Hamed
Citations per year, relative to Abdallah M’Hamed Abdallah M’Hamed (= 1×) peers Saurabh Nangia

Countries citing papers authored by Abdallah M’Hamed

Since Specialization
Citations

This map shows the geographic impact of Abdallah M’Hamed's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Abdallah M’Hamed with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Abdallah M’Hamed more than expected).

Fields of papers citing papers by Abdallah M’Hamed

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Abdallah M’Hamed. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Abdallah M’Hamed. The network helps show where Abdallah M’Hamed may publish in the future.

Co-authorship network of co-authors of Abdallah M’Hamed

This figure shows the co-authorship network connecting the top 25 collaborators of Abdallah M’Hamed. A scholar is included among the top collaborators of Abdallah M’Hamed based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Abdallah M’Hamed. Abdallah M’Hamed is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

12 of 12 papers shown
1.
Wang, Leye, Daqing Zhang, Yasha Wang, et al.. (2016). Sparse mobile crowdsensing: challenges and opportunities. IEEE Communications Magazine. 54(7). 161–167. 208 indexed citations
2.
M’Hamed, Abdallah, et al.. (2014). Behavior and Capability Based Access Control Model for Personalized TeleHealthCare Assistance. Mobile Networks and Applications. 19(3). 392–403. 8 indexed citations
3.
M’Hamed, Abdallah, et al.. (2013). A User Profile Based Access Control Model and Architecture. International journal of Computer Networks & Communications. 5(1). 171–181. 5 indexed citations
4.
M’Hamed, Abdallah, et al.. (2012). Trust-based authentication scheme with user rating for low-resource devices in smart environments. Personal and Ubiquitous Computing. 17(5). 1013–1023. 6 indexed citations
5.
M’Hamed, Abdallah, et al.. (2011). An Enhanced Authenticated Key Agreement Protocol with a Neural Network-based Model for Joining-Phase in Mobile Environments. SPIRE - Sciences Po Institutional REpository. 2(2). 103–112. 3 indexed citations
6.
M’Hamed, Abdallah, et al.. (2011). A Novel Trust-Based Authentication Scheme for Low-Resource Devices in Smart Environments. Procedia Computer Science. 5. 362–369. 2 indexed citations
7.
Zhang, Daqing, Abdallah M’Hamed, & Mounir Mokhtari. (2007). A trustworthy framework for impromptu service discovery with mobile devices. 254–260. 3 indexed citations
8.
M’Hamed, Abdallah, et al.. (2007). A Secure Authenticated Key Agreement Protocol For Wireless Security. 33–38. 9 indexed citations
9.
M’Hamed, Abdallah, et al.. (2007). A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography. 4 indexed citations
10.
M’Hamed, Abdallah, et al.. (2007). A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography. 12 indexed citations
11.
M’Hamed, Abdallah, et al.. (2006). Lorenz’s attractor applied to the stream cipher (Ali-Pacha generator). Chaos Solitons & Fractals. 33(5). 1762–1766. 13 indexed citations
12.
Meddahi, Ahmed, et al.. (2004). Enabling secure third party control on wireless home networks. 2725. 46–54. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026