Spremljaj
Maged Hamada Ibrahim
Maged Hamada Ibrahim
Associate Professor of Cryprography and Communication Security, Helwan University
Preverjeni e-poštni naslov na h-eng.helwan.edu.eg
Naslov
Navedeno
Navedeno
Leto
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks
X Li, MH Ibrahim, S Kumari, AK Sangaiah, V Gupta, KKR Choo
Computer Networks 129, 429-443, 2017
3032017
OCTOPUS: An edge-fog mutual authentication scheme.
MH Ibrahim
Int. J. Netw. Secur. 18 (6), 1089-1101, 2016
1942016
Secure anonymous mutual authentication for star two-tier wireless body area networks
MH Ibrahim, S Kumari, AK Das, M Wazid, V Odelu
Computer methods and programs in biomedicine 135, 37-50, 2016
1392016
A Method for Obtaining Deniable Public-Key Encryption.
MH Ibrahim
Int. J. Netw. Secur. 8 (1), 1-9, 2009
822009
Receiver-deniable Public-Key Encryption.
MH Ibrahim
Int. J. Netw. Secur. 8 (2), 159-165, 2009
692009
Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors
X Li, MH Ibrahim, S Kumari, R Kumar
Telecommunication Systems 67, 323-348, 2018
522018
A robust threshold elliptic curve digital signature providing a new verifiable secret sharing scheme
MH Ibrahim, IA Ali, II Ibrahim, AH El-Sawi
2003 46th Midwest Symposium on Circuits and Systems 1, 276-280, 2003
462003
SecureCoin: A Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem
MH Ibrahim
International Journal of Network Security 19 (2), 295-312, 2017
442017
Non-interactive authentication scheme providing privacy among drivers in vehicle-to-vehicle networks
FM Salem, MH Ibrahim, II Ibrahim
2010 Sixth International Conference on Networking and Services, 156-161, 2010
322010
Matched-filter-based spectrum sensing for secure cognitive radio network communications
FM Salem, MH Ibrahim, IA Ali, II Ibrahim
International Journal of Computer Applications 87 (18), 2014
252014
Resisting Traitors in Linkable Democratic Group Signatures.
MH Ibrahim
Int. J. Netw. Secur. 9 (1), 51-60, 2009
242009
Efficient Dealer-Less Threshold Sharing of Standard RSA.
MH Ibrahim
Int. J. Netw. Secur. 8 (2), 139-150, 2009
202009
The Weibull probabilities analysis on the single kenaf fiber
I Ibrahim, S Sarip, NA Bani, MH Ibrahim, MZ Hassan
AIP Conference Proceedings 1958 (1), 2018
172018
Jamming resistant non‐interactive anonymous and unlinkable authentication scheme for mobile satellite networks
MH Ibrahim, S Kumari, AK Das, V Odelu
Security and Communication Networks 9 (18), 5563-5580, 2016
162016
Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing.
MH Ibrahim
Int. J. Netw. Secur. 7 (1), 106-113, 2008
142008
Two-party private vector dominance: The all-or-nothing deal
MH Ibrahim
Third International Conference on Information Technology: New Generations …, 2006
122006
Fast fully distributed and threshold RSA function sharing
MH Ibrahim, IA Ali, II Ibrahim, AH El-Sawy
Proceedings of the Information Systems: New Generations (ISNG’04), 13-18, 2004
122004
Fast three-party shared generation of RSA keys without distributed primality tests
MH Ibrahim, II Ibrahim, AH El-Sawy
Proceedings of the Information Systems: New Generations (ISNG’04), 7-12, 2004
112004
Attribute-based authentication on the cloud for thin clients
MH Ibrahim, S Kumari, AK Das, V Odelu
The Journal of Supercomputing 74, 5813-5845, 2018
102018
Secure and robust enterprise digital rights management protocol with efficient storage
MH Ibrahim
International journal on information (information-Tokyo) 18 (2), 625-640, 2015
102015
Sistem trenutno ne more izvesti postopka. Poskusite znova pozneje.
Članki 1–20