Seguir
Maged Hamada Ibrahim
Maged Hamada Ibrahim
Associate Professor of Cryprography and Communication Security, Helwan University
Email confirmado em h-eng.helwan.edu.eg
Título
Citado por
Citado por
Ano
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks
X Li, MH Ibrahim, S Kumari, AK Sangaiah, V Gupta, KKR Choo
Computer Networks 129, 429-443, 2017
3032017
OCTOPUS: An edge-fog mutual authentication scheme.
MH Ibrahim
Int. J. Netw. Secur. 18 (6), 1089-1101, 2016
1982016
Secure anonymous mutual authentication for star two-tier wireless body area networks
MH Ibrahim, S Kumari, AK Das, M Wazid, V Odelu
Computer methods and programs in biomedicine 135, 37-50, 2016
1372016
A Method for Obtaining Deniable Public-Key Encryption.
MH Ibrahim
Int. J. Netw. Secur. 8 (1), 1-9, 2009
832009
Receiver-deniable Public-Key Encryption.
MH Ibrahim
Int. J. Netw. Secur. 8 (2), 159-165, 2009
692009
Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors
X Li, MH Ibrahim, S Kumari, R Kumar
Telecommunication Systems 67, 323-348, 2018
522018
A robust threshold elliptic curve digital signature providing a new verifiable secret sharing scheme
MH Ibrahim, IA Ali, II Ibrahim, AH El-Sawi
2003 46th Midwest Symposium on Circuits and Systems 1, 276-280, 2003
472003
SecureCoin: A Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem
MH Ibrahim
International Journal of Network Security 19 (2), 295-312, 2017
442017
Non-interactive authentication scheme providing privacy among drivers in vehicle-to-vehicle networks
FM Salem, MH Ibrahim, II Ibrahim
2010 Sixth International Conference on Networking and Services, 156-161, 2010
332010
Resisting Traitors in Linkable Democratic Group Signatures.
MH Ibrahim
Int. J. Netw. Secur. 9 (1), 51-60, 2009
252009
Matched-filter-based spectrum sensing for secure cognitive radio network communications
FM Salem, MH Ibrahim, IA Ali, II Ibrahim
International Journal of Computer Applications 87 (18), 2014
242014
Efficient Dealer-Less Threshold Sharing of Standard RSA.
MH Ibrahim
Int. J. Netw. Secur. 8 (2), 139-150, 2009
212009
The Weibull probabilities analysis on the single kenaf fiber
I Ibrahim, S Sarip, NA Bani, MH Ibrahim, MZ Hassan
AIP Conference Proceedings 1958 (1), 2018
172018
Jamming resistant non‐interactive anonymous and unlinkable authentication scheme for mobile satellite networks
MH Ibrahim, S Kumari, AK Das, V Odelu
Security and Communication Networks 9 (18), 5563-5580, 2016
162016
Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing.
MH Ibrahim
Int. J. Netw. Secur. 7 (1), 106-113, 2008
152008
Fast fully distributed and threshold RSA function sharing
MH Ibrahim, IA Ali, II Ibrahim, AH El-Sawy
Proceedings of the Information Systems: New Generations (ISNG-2004 …, 2004
132004
Two-party private vector dominance: The all-or-nothing deal
MH Ibrahim
Third International Conference on Information Technology: New Generations …, 2006
122006
Fast three-party shared generation of RSA keys without distributed primality tests
MH Ibrahim, II Ibrahim, AH El-Sawy
Proceedings of the Information Systems: New Generations (ISNG’04), 7-12, 2004
122004
Attribute-based authentication on the cloud for thin clients
MH Ibrahim, S Kumari, AK Das, V Odelu
The Journal of Supercomputing 74, 5813-5845, 2018
102018
AATCT: Anonymously authenticated transmission on the cloud with traceability
MH Ibrahim
International Journal of Advanced Computer Science and Applications (IJACSA …, 2015
102015
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20