フォロー
Maged Hamada Ibrahim
Maged Hamada Ibrahim
Associate Professor of Cryprography and Communication Security, Helwan University
確認したメール アドレス: h-eng.helwan.edu.eg
タイトル
引用先
引用先
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks
X Li, MH Ibrahim, S Kumari, AK Sangaiah, V Gupta, KKR Choo
Computer Networks 129, 429-443, 2017
2392017
OCTOPUS: An edge-fog mutual authentication scheme.
MH Ibrahim
Int. J. Netw. Secur. 18 (6), 1089-1101, 2016
1582016
Secure anonymous mutual authentication for star two-tier wireless body area networks
MH Ibrahim, S Kumari, AK Das, M Wazid, V Odelu
Computer methods and programs in biomedicine 135, 37-50, 2016
1052016
A Method for Obtaining Deniable Public-Key Encryption.
MH Ibrahim
Int. J. Netw. Secur. 8 (1), 1-9, 2009
802009
Receiver-deniable Public-Key Encryption.
MH Ibrahim
Int. J. Netw. Secur. 8 (2), 159-165, 2009
722009
Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors
X Li, MH Ibrahim, S Kumari, R Kumar
Telecommunication Systems 67 (2), 323-348, 2018
372018
SecureCoin: A Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem
MH Ibrahim
International Journal of Network Security 19 (2), 295-312, 2017
372017
A robust threshold elliptic curve digital signature providing a new verifiable secret sharing scheme
MH Ibrahim, IA Ali, II Ibrahim, AH El-Sawi
2003 46th Midwest Symposium on Circuits and Systems 1, 276-280, 2003
372003
Non-interactive authentication scheme providing privacy among drivers in vehicle-to-vehicle networks
FM Salem, MH Ibrahim, II Ibrahim
2010 Sixth International Conference on Networking and Services, 156-161, 2010
302010
Resisting Traitors in Linkable Democratic Group Signatures.
MH Ibrahim
Int. J. Netw. Secur. 9 (1), 51-60, 2009
232009
Efficient Dealer-Less Threshold Sharing of Standard RSA.
MH Ibrahim
Int. J. Netw. Secur. 8 (2), 139-150, 2009
202009
Matched-filter-based spectrum sensing for secure cognitive radio network communications
FM Salem, MH Ibrahim, IA Ali, II Ibrahim
International Journal of Computer Applications 87 (18), 2014
192014
Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing.
MH Ibrahim
Int. J. Netw. Secur. 7 (1), 106-113, 2008
132008
The Weibull probabilities analysis on the single kenaf fiber
I Ibrahim, S Sarip, NA Bani, MH Ibrahim, MZ Hassan
AIP Conference Proceedings 1958 (1), 020009, 2018
122018
Jamming resistant non‐interactive anonymous and unlinkable authentication scheme for mobile satellite networks
MH Ibrahim, S Kumari, AK Das, V Odelu
Security and Communication Networks 9 (18), 5563-5580, 2016
122016
Two-party private vector dominance: The all-or-nothing deal
MH Ibrahim
Third International Conference on Information Technology: New Generations …, 2006
122006
Fast fully distributed and threshold RSA function sharing
MH Ibrahim, IA Ali, II Ibrahim, AH El-Sawy
Proceedings of the Information Systems: New Generations (ISNG’04), 13-18, 2004
122004
Fast three-party shared generation of RSA keys without distributed primality tests
MH Ibrahim, II Ibrahim, AH El-Sawy
Proceedings of the Information Systems: New Generations (ISNG’04), 7-12, 2004
102004
Attribute-based authentication on the cloud for thin clients
MH Ibrahim, S Kumari, AK Das, V Odelu
The Journal of Supercomputing 74 (11), 5813-5845, 2018
82018
Secure and robust enterprise digital rights management protocol with efficient storage
MH Ibrahim
International Journal on Information 18 (2), 625-640, 2015
82015
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20