Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey I Ali, A Hassan, F Li Vehicular Communications 16, 45-61, 2019 | 215 | 2019 |
A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud N Eltayieb, R Elhabob, A Hassan, F Li Journal of Systems Architecture 102, 101653, 2020 | 99 | 2020 |
Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts AS Patil, R Hamza, A Hassan, N Jiang, H Yan, J Li Computers & Security 97, 101958, 2020 | 71 | 2020 |
An Efficient Attribute-based Online/Offline Searchable Encryption and Its Application in Cloud-Based Reliable Smart Grid N Eltayieb, R Elhabob, A Hassan, F Li Journal of Systems Architecture, 2019 | 66 | 2019 |
Expert Finding Systems: A Systematic Review O Husain, N Salim, RA Alias, S Abdelsalam, A Hassan Applied Sciences, 2019 | 39 | 2019 |
An Efficient Outsourced Privacy Preserving Machine Learning Scheme With Public Verifiability A Hassan, R Hamza, H Yan, P Li IEEE Access 7, 146322-146330, 2019 | 37 | 2019 |
An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment R Hamza, A Hassan, T Huang, L Ke, H Yan Complexity 2019, 2019 | 34 | 2019 |
Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms R Hamza, A Hassan, A Ali, MB Bashir, SM Alqhtani, TM Tawfeeg, A Yousif Entropy 24 (4), 519, 2022 | 30 | 2022 |
An efficient certificateless user authentication and key exchange protocol for client-server environment A Hassan, N Eltayieb, R Elhabob, F Li Journal of Ambient Intelligence and Humanized Computing, 1-15, 2017 | 30 | 2017 |
Multiple-level threshold load balancing in distributed SDN controllers H Mokhtar, X Di, Y Zhou, A Hassan, Z Ma, S Musa Computer Networks 198, 108369, 2021 | 22 | 2021 |
Identity-based user authenticated key agreement protocol for multi-server environment with anonymity A Hassan, AA Omala, M Ali, C Jin, F Li Mobile Networks and Applications 24 (3), 890-902, 2019 | 22 | 2019 |
Blockchain-PUF-based Secure Authentication Protocol for Internet of Things A Patil, H Rafik, H Yan, A Hassan, J Li 19th International Conference on Algorithms and Architectures for Parallel …, 2019 | 16 | 2019 |
Greedy Firefly Algorithm for Optimizing Job Scheduling in IoT Grid Computing A Yousif, SM Alqhtani, MB Bashir, A Ali, R Hamza, A Hassan, TM Tawfeeg Sensors 22 (3), 850, 2022 | 15 | 2022 |
PKE-ET-HS: public key encryption with equality test for heterogeneous systems in IoT R Elhabob, Y Zhao, A Hassan, H Xiong Wireless Personal Communications 113 (1), 313-335, 2020 | 15 | 2020 |
A Lightweight Secure IoT Surveillance Framework Based on DCT-DFRT Algorithms R Hamza, A Hassan, AS Patil International Conference on Machine Learning for Cyber Security, 271-278, 2019 | 14 | 2019 |
ASDS: Attribute‐based secure data sharing scheme for reliable cloud environment N Eltayieb, P Wang, A Hassan, R Elhabob, F Li Security and Privacy 2 (2), e57, 2019 | 13 | 2019 |
A privacy preserving federated learning scheme using homomorphic encryption and secret sharing Z Shi, Z Yang, A Hassan, F Li, X Ding Telecommunication Systems 82 (3), 419-433, 2023 | 12 | 2023 |
Cloud Dynamic Load Balancing and Reactive Fault Tolerance Techniques: A Systematic Literature Review (SLR) TM Tawfeeg, A Yousif, A Hassan, SM Alqhtani, R Hamza, MB Bashir, A Ali IEEE Access, 2022 | 10 | 2022 |
Machine Learning for Cyber Security: Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings X Chen, X Huang, J Zhang Springer Nature, 2019 | 8 | 2019 |
The Analysis of MATE Attack in SDN Based on STRIDE Model AEW Eldewahi, A Hassan, K Elbadawi, BIA Barry Advances in Internet, Data & Web Technologies 17, 901--910, 2018 | 7 | 2018 |