Hatem Bettahar

608 total citations
17 papers, 258 citations indexed

About

Hatem Bettahar is a scholar working on Computer Networks and Communications, Artificial Intelligence and Electrical and Electronic Engineering. According to data from OpenAlex, Hatem Bettahar has authored 17 papers receiving a total of 258 indexed citations (citations by other indexed papers that have themselves been cited), including 16 papers in Computer Networks and Communications, 6 papers in Artificial Intelligence and 4 papers in Electrical and Electronic Engineering. Recurrent topics in Hatem Bettahar's work include Security in Wireless Sensor Networks (9 papers), Cryptography and Data Security (6 papers) and Mobile Ad Hoc Networks (6 papers). Hatem Bettahar is often cited by papers focused on Security in Wireless Sensor Networks (9 papers), Cryptography and Data Security (6 papers) and Mobile Ad Hoc Networks (6 papers). Hatem Bettahar collaborates with scholars based in France, United Kingdom and United States. Hatem Bettahar's co-authors include Yacine Challal, Abdelmadjid Bouabdallah, Abdelmadjid Bouabdallah, Imed Romdhani, Mounir Kellil, J. Muñoz, Djamel Tandjaoui, Nadjib Badache, Hamida Seba and Aaron Striegel and has published in prestigious journals such as IEEE Communications Surveys & Tutorials, ACM SIGCOMM Computer Communication Review and Computer Networks.

In The Last Decade

Hatem Bettahar

17 papers receiving 239 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Hatem Bettahar France 8 223 81 79 37 35 17 258
Cullen Jennings United States 9 272 1.2× 55 0.7× 100 1.3× 31 0.8× 64 1.8× 30 313
José Ruíz-Mas Spain 9 236 1.1× 44 0.5× 114 1.4× 20 0.5× 34 1.0× 43 282
Naganand Doraswamy 2 130 0.6× 76 0.9× 41 0.5× 38 1.0× 18 0.5× 4 174
Dan Harkins 4 150 0.7× 82 1.0× 58 0.7× 53 1.4× 13 0.4× 5 192
Jeffrey Undercoffer United States 7 167 0.7× 82 1.0× 28 0.4× 44 1.2× 25 0.7× 9 203
Martin Stiemerling Germany 8 271 1.2× 79 1.0× 107 1.4× 63 1.7× 16 0.5× 27 301
J. Girão Portugal 6 347 1.6× 187 2.3× 44 0.6× 35 0.9× 14 0.4× 15 405
Mirja Kühlewind Switzerland 9 205 0.9× 52 0.6× 102 1.3× 22 0.6× 8 0.2× 34 227
Dominik Schatzmann Switzerland 8 221 1.0× 121 1.5× 35 0.4× 36 1.0× 21 0.6× 16 276
Avinash Srinivasan United States 7 227 1.0× 35 0.4× 55 0.7× 21 0.6× 40 1.1× 20 246

Countries citing papers authored by Hatem Bettahar

Since Specialization
Citations

This map shows the geographic impact of Hatem Bettahar's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Hatem Bettahar with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Hatem Bettahar more than expected).

Fields of papers citing papers by Hatem Bettahar

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Hatem Bettahar. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Hatem Bettahar. The network helps show where Hatem Bettahar may publish in the future.

Co-authorship network of co-authors of Hatem Bettahar

This figure shows the co-authorship network connecting the top 25 collaborators of Hatem Bettahar. A scholar is included among the top collaborators of Hatem Bettahar based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Hatem Bettahar. Hatem Bettahar is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

17 of 17 papers shown
1.
Bettahar, Hatem, et al.. (2012). An efficient key management scheme for content access control for linear hierarchies. Computer Networks. 56(8). 2107–2118. 18 indexed citations
2.
Bettahar, Hatem, et al.. (2011). A new Application-Level Multicast technique for stable, robust and efficient overlay tree construction. Computer Networks. 55(15). 3332–3350. 6 indexed citations
3.
4.
Bettahar, Hatem, et al.. (2009). TKS: a transition key management scheme for secure application level multicast. International Journal of Security and Networks. 4(4). 210–210. 7 indexed citations
5.
Challal, Yacine, et al.. (2008). Adaptive clustering for scalable key management in dynamic group communications. International Journal of Security and Networks. 3(2). 133–133. 14 indexed citations
6.
Bettahar, Hatem, et al.. (2007). Efficient Key Management Scheme for Secure Application Level Multicast. HAL (Le Centre pour la Communication Scientifique Directe). 489–494. 1 indexed citations
7.
Bouabdallah, Abdelmadjid, et al.. (2007). Key management for content access control in a hierarchy. Computer Networks. 51(11). 3197–3219. 34 indexed citations
8.
Romdhani, Imed, J. Muñoz, Hatem Bettahar, & Abdelmadjid Bouabdallah. (2006). Mobile Multicast Route Optimisation. 2006 IEEE International Conference on Communications. 1977–1983. 3 indexed citations
9.
Bouabdallah, Abdelmadjid, et al.. (2005). Hi-KD : Hash-based hierarchical Key Distribution for Group Communication. Kent Academic Repository (University of Kent). 1 indexed citations
10.
Challal, Yacine, Hatem Bettahar, & Abdelmadjid Bouabdallah. (2004). SAKM. ACM SIGCOMM Computer Communication Review. 34(2). 55–70. 29 indexed citations
11.
Challal, Yacine, Abdelmadjid Bouabdallah, & Hatem Bettahar. (2004). H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming. Computers & Security. 24(1). 57–68. 7 indexed citations
12.
Challal, Yacine, Hatem Bettahar, & Abdelmadjid Bouabdallah. (2004). A taxonomy of multicast data origin authentication: Issues and solutions. IEEE Communications Surveys & Tutorials. 6(3). 34–57. 48 indexed citations
13.
Romdhani, Imed, et al.. (2004). IP mobile multicast: Challenges and solutions. IEEE Communications Surveys & Tutorials. 6(1). 18–41. 79 indexed citations
14.
Striegel, Aaron, et al.. (2003). EBM: Edge-Based Multicasting in DiffServ Networks. HAL (Le Centre pour la Communication Scientifique Directe). 1 indexed citations
15.
Seba, Hamida, et al.. (2003). Gestion de clés et sécurité multipoint: étude et perspectives. Annals of Telecommunications. 58(7-8). 1090–1129. 1 indexed citations
16.
Tandjaoui, Djamel, Nadjib Badache, Hatem Bettahar, Abdelmadjid Bouabdallah, & Hamida Seba. (2002). Towards a smooth handoff for TCP and real time applications in wireless network. HAL (Le Centre pour la Communication Scientifique Directe). 1 indexed citations
17.
Bettahar, Hatem & Abdelmadjid Bouabdallah. (2002). A new approach for delay-constrained routing. Computer Communications. 25(18). 1751–1764. 3 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026