关注
Saif Al-Kuwari
Saif Al-Kuwari
Hamd Bin Khalifa University
在 al-kuwari.net 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Artificial intelligence in the fight against COVID-19: scoping review
A Abd-Alrazaq, M Alajlani, D Alhuwail, J Schneider, S Al-Kuwari, Z Shah, ...
Journal of medical Internet research 22 (12), e20756, 2020
912020
Cryptographic hash functions: Recent design trends and security notions
S Al-Kuwari, JH Davenport, RJ Bradford
Cryptology ePrint Archive, 2011
812011
Probabilistic vehicular trace reconstruction based on RF-visual data fusion
S Al-Kuwari, SD Wolthusen
Communications and Multimedia Security: 11th IFIP TC 6/TC 11 International …, 2010
112010
Attribute-based proxy re-encryption from standard lattices
F Luo, S Al-Kuwari, F Wang, K Chen
Theoretical Computer Science 865, 52-62, 2021
102021
Attribute-based proxy re-signature from standard lattices and its applications
F Luo, S Al-Kuwari, W Susilo, DH Duong
Computer Standards & Interfaces 75, 103499, 2021
102021
Forensic tracking and mobility prediction in vehicular networks
S Al-Kuwari, S Wolthusen
Advances in Digital Forensics VIII: 8th IFIP WG 11.9 International …, 2012
102012
On the feasibility of carrying out live real-time forensics for modern intelligent vehicles
S Al-Kuwari, SD Wolthusen
Forensics in Telecommunications, Information, and Multimedia: Third …, 2011
102011
A survey of forensic localization and tracking mechanisms in short-range and cellular networks
S Al-Kuwari, SD Wolthusen
Digital Forensics and Cyber Crime: First International ICST Conference …, 2010
92010
Chosen-ciphertext secure homomorphic proxy re-encryption
F Luo, S Al-Kuwari, W Susilo, DH Duong
IEEE Transactions on Cloud Computing 10 (4), 2398-2408, 2020
82020
Security of underwater and air–water wireless communication: State-of-the-art, challenges and outlook
W Aman, S Al-Kuwari, M Muzzammil, MMU Rahman, A Kumar
Ad Hoc Networks 142, 103114, 2023
72023
Fuzzy trace validation: Toward an offline forensic tracking framework
S Al-Kuwari, SD Wolthusen
2011 Sixth IEEE International Workshop on Systematic Approaches to Digital …, 2011
72011
Security performance analysis of a noma-assisted underwater vlc system under imprecise channel estimations
A Kumar, S Al-Kuwari, DNK Jayakody, R Alkanhel
IEEE Access 10, 117021-117032, 2022
62022
Revocable attribute-based proxy re-encryption
F Luo, S Al-Kuwari
Journal of Mathematical Cryptology 15 (1), 465-482, 2021
62021
Design space exploration of hybrid quantum–classical neural networks
M Kashif, S Al-Kuwari
Electronics 10 (23), 2980, 2021
52021
Attack specification language: Domain specific language for dynamic training in cyber range
S Arshad, M Alam, S Al-Kuwari, MHA Khan
2021 IEEE Global Engineering Education Conference (EDUCON), 873-879, 2021
52021
Algorithmic approach for clandestine localisation and tracking in short-range environments
S Al-Kuwari, SD Wolthusen
International Journal of Communication Networks and Distributed Systems 9 (3 …, 2012
52012
SVFL: Efficient secure aggregation and verification for cross-silo federated learning
F Luo, S Al-Kuwari, Y Ding
IEEE Transactions on Mobile Computing, 2022
42022
Security analysis of merging control for connected and automated vehicles
A Jarouf, N Meskin, S Al-Kuwari, M Shakerpour, CG Cassanderas
2022 IEEE Intelligent Vehicles Symposium (IV), 1739-1744, 2022
42022
Algorithms for advanced clandestine tracking in short-range ad hoc networks
S Al-Kuwari, SD Wolthusen
Security and Privacy in Mobile Information and Communication Systems: Second …, 2010
42010
Physical unclonable functions (PUF) for IoT devices
A Al-Meer, S Al-Kuwari
ACM Computing Surveys 55 (14s), 1-31, 2023
32023
系统目前无法执行此操作,请稍后再试。
文章 1–20