LTE authentication protocol (EPS-AKA) weaknesses solution MA Abdrabou, ADE Elbayoumy, E Abd El-Wanis 2015 IEEE seventh international conference on intelligent computing and …, 2015 | 48 | 2015 |
Stream or block cipher for securing VoIP? AD Elbayoumy, SJ Shepherd Int. J. Netw. Secur. 5 (2), 128-133, 2007 | 32 | 2007 |
A novel S-box of AES algorithm using variable mapping technique FY Mohammad, AE Rohiem, AD Elbayoumy International Conference on Aerospace Sciences and Aviation Technology 13 …, 2009 | 25 | 2009 |
QoS control using an end-point CPU capability detector in a secure VoIP system AD Elbayoumy 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005 | 20 | 2005 |
Handover optimization and user mobility prediction in LTE femtocells network M Mandour, F Gebali, AD Elbayoumy, GMA Hamid, A Abdelaziz 2019 IEEE international conference on consumer electronics (ICCE), 1-6, 2019 | 19 | 2019 |
A high grade secure VoIP system using the tiny encryption algorithm A Elbayoumy, S Shepherd Proceedings of the 7th Annual International Symposium on Advanced Radio …, 2005 | 12 | 2005 |
Design and implementation of BGP novel control mechanism (BGP-NCM) based on network performance parameters MT Moubarak, AD Elbayoumy, MH Megahed Ain Shams Engineering Journal 9 (4), 2079-2091, 2018 | 11 | 2018 |
A Comprehensive Secure VoIP Solution. AD Elbayoumy, SJ Shepherd Int. J. Netw. Secur. 5 (2), 233-240, 2007 | 9 | 2007 |
A code-matched collision-free S-random interleaver for turbo codes MS Omeira, GM Hamad, AD Elbayoumy 2015 IEEE Seventh International Conference on Intelligent Computing and …, 2015 | 6 | 2015 |
On the compound MIMO wiretap channel with mean feedback A Abdelaziz, CE Koksal, H El Gamal, AD Elbayoumy 2017 IEEE International Symposium on Information Theory (ISIT), 734-738, 2017 | 5 | 2017 |
Enhanced image encryption algorithm by quantum key distribution MA Mahmoud, T Mekkawy, AD Elbayoumy IOP Conference Series: Materials Science and Engineering 1172 (1), 012011, 2021 | 4 | 2021 |
Hardware Assisted Homomorphic Encryption in a Real Time VOIP Conference Application A Kamal, H Dahshan, A Diaa 2018 13th International Conference on Computer Engineering and Systems …, 2018 | 4 | 2018 |
Literature Survey for Cybersecurity for Internet of Things (IoT) AA Elshweikh, AM Mattar, M Hussein, AD Elbayoumy 2022 International Telecommunications Conference (ITC-Egypt), 1-5, 2022 | 2 | 2022 |
Secure Transmission of Space Images using Joint Encryption Compression E Abdelwanees, AD Bayoumy, AM Abdelaziz 2019 International Conference on Innovative Trends in Computer Engineering …, 2019 | 2 | 2019 |
A novel video compression scheme based on fast Curvelet transform AM Elmolla, GI Salama, AD Elbayoumy Int J Comput Sci Telecommun 6 (3), 7-10, 2015 | 2 | 2015 |
A Novel S-box of AES Algorithm Using Variable Mapping Technique FYMAE Rohiem, AD Elbayoumy Aerospace Sciences & Aviation Technology.-cairo: Military Technical College, 2009 | 2 | 2009 |
A new homomorphic message authentication code scheme for network coding A Kamal, H Dahshan, AD Elbayoumy 2020 3rd International Conference on Information and Computer Technologies …, 2020 | 1 | 2020 |
Enhancing the End-to-end Link Performance of Traditional Satellite Ground Networks via Software-Defined Networking Controllers (POX/RYU) EM El Sabbagh, M Hussein, AD Elbayoumy Int. J. Comput. Appl 975, 8887, 2020 | 1 | 2020 |
New scheme for CSFB improvement in LTE AD Elbayoumy, SF Al-Ashry 2016 12th International Computer Engineering Conference (ICENCO), 169-177, 2016 | 1 | 2016 |
Authenticated Key Management Scheme for Intra-Mme Handover over LTE Networks K Khairy, A Diaa Eldien, A Abdel-hafez, E Abd El-Wanis International Journal of Research in Engineering and Science. Vol, 19-28, 2016 | 1 | 2016 |