关注
Heba Aslan
Heba Aslan
Professor of Information Security, ITCS, Nile University. Electronics Research Institute
在 nu.edu.eg 的电子邮件经过验证
标题
引用次数
引用次数
年份
A novel deep learning framework for copy-moveforgery detection in images
MA Elaskily, HA Elnemr, A Sedik, MM Dessouky, GM El Banby, ...
Multimedia Tools and Applications 79, 19167-19192, 2020
622020
WiMax security
M Nasreldin, H Aslan, M El-Hennawy, A El-Hennawy
22nd International Conference on Advanced Information Networking and …, 2008
572008
A survey of IoT security threats and defenses
HI Ahmed, AA Nasr, S Abdel-Mageid, HK Aslan
International Journal of Advanced Computer Research 9 (45), 325-350, 2019
342019
New real time multicast authentication protocol
R Abdellatif, HK Aslan, SH Elramly
2008 International Conference on Computer Engineering & Systems, 245-250, 2008
242008
DADEM: Distributed attack detection model based on big data analytics for the enhancement of the security of internet of things (IoT)
HI Ahmed, AA Nasr, SM Abdel-Mageid, HK Aslan
International Journal of Ambient Computing and Intelligence (IJACI) 12 (1 …, 2021
232021
Comparative study of copy-move forgery detection techniques
MA Elaskily, HK Aslan, OA Elshakankiry, OS Faragallah, FE Abd El-Samie, ...
2017 Intl Conf on advanced control circuits systems (ACCS) Systems & 2017 …, 2017
222017
A scalable and distributed multicast security protocol using a subgroup-key hierarchy
HK Aslan
Computers & Security 23 (4), 320-329, 2004
212004
A hybrid scheme for multicast authentication over lossy networks
HK Aslan
Computers & Security 23 (8), 705-713, 2004
202004
Digital forensics evidence acquisition and chain of custody in cloud computing
MM Nasreldin, M El-Hennawy, HK Aslan, A El-Hennawy
IJCSI International Journal of Computer Science Issues 12 (1), 153-160, 2015
172015
Implementation of a hybrid encryption scheme for Ethernet
MT El-Hadidi, NH Hegazi, HK Aslan
Proceedings IEEE Symposium on Computers and Communications, 150-156, 1995
161995
A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach.
MMN Rasslan, YH Dakroury, HK Aslan
Int. J. Netw. Secur. 8 (1), 75-89, 2009
142009
A design of a fast parallel-pipelined implementation of AES: Advanced Encryption Standard
GF Elkabbany, HK Aslan, MN Rasslan
arXiv preprint arXiv:1501.01427, 2015
122015
Logical analysis of AUTHMAC_DH: a new protocol for authentication and key distribution
HK Aslan
Computers & Security 23 (4), 290-299, 2004
122004
Security in the information society: visions and perspectives
MA Ghonaimy, MT El-Hadidi, HK Aslan
Springer, 2012
112012
Logic-based analysis of a new hybrid encryption protocol for authentication and key distribution
MT El-Hadidi, NH Hegazi, HK Aslan
Global IT security (Vienna, Budapest, 31 August-2 September 1998), 173-183, 1998
91998
Performance evaluation of a new hybrid encryption protocol for authentication and key distribution
MT El-Hadidi, NH Hegazi, HK Aslan
Proceedings IEEE International Symposium on Computers and Communications …, 1999
81999
Performance analysis of the Kerberos protocol in a distributed environment
MT El-Hadidi, NH Hegazi, HK Aslan
Proceedings Second IEEE Symposium on Computer and Communications, 235-239, 1997
81997
On the security of two improved authenticated encryption schemes
M Rasslan, HK Aslan
International Journal of Security and Networks 8 (4), 194-199, 2013
72013
Enhanced Fiilltterr-based SIFT Apprroach fforr Copy-Move Forrgerry Dettecttiion
M Elaskily, H Aslan, M Dessouky, A El-Samie, O Faragallah, ...
Menoufia Journal of Electronic Engineering Research 28 (1), 159-182, 2019
52019
Two-level controllers hierarchy for a scalable and distributed multicast security protocol
HK Aslan
Computers & Security 24 (5), 399-408, 2005
52005
系统目前无法执行此操作,请稍后再试。
文章 1–20