Artificial intelligence in the fight against COVID-19: scoping review A Abd-Alrazaq, M Alajlani, D Alhuwail, J Schneider, S Al-Kuwari, Z Shah, ... Journal of medical Internet research 22 (12), e20756, 2020 | 91 | 2020 |
Cryptographic hash functions: Recent design trends and security notions S Al-Kuwari, JH Davenport, RJ Bradford Cryptology ePrint Archive, 2011 | 81 | 2011 |
Probabilistic vehicular trace reconstruction based on RF-visual data fusion S Al-Kuwari, SD Wolthusen Communications and Multimedia Security: 11th IFIP TC 6/TC 11 International …, 2010 | 11 | 2010 |
Attribute-based proxy re-encryption from standard lattices F Luo, S Al-Kuwari, F Wang, K Chen Theoretical Computer Science 865, 52-62, 2021 | 10 | 2021 |
Attribute-based proxy re-signature from standard lattices and its applications F Luo, S Al-Kuwari, W Susilo, DH Duong Computer Standards & Interfaces 75, 103499, 2021 | 10 | 2021 |
Forensic tracking and mobility prediction in vehicular networks S Al-Kuwari, S Wolthusen Advances in Digital Forensics VIII: 8th IFIP WG 11.9 International …, 2012 | 10 | 2012 |
On the feasibility of carrying out live real-time forensics for modern intelligent vehicles S Al-Kuwari, SD Wolthusen Forensics in Telecommunications, Information, and Multimedia: Third …, 2011 | 10 | 2011 |
A survey of forensic localization and tracking mechanisms in short-range and cellular networks S Al-Kuwari, SD Wolthusen Digital Forensics and Cyber Crime: First International ICST Conference …, 2010 | 9 | 2010 |
Chosen-ciphertext secure homomorphic proxy re-encryption F Luo, S Al-Kuwari, W Susilo, DH Duong IEEE Transactions on Cloud Computing 10 (4), 2398-2408, 2020 | 8 | 2020 |
Security of underwater and air–water wireless communication: State-of-the-art, challenges and outlook W Aman, S Al-Kuwari, M Muzzammil, MMU Rahman, A Kumar Ad Hoc Networks 142, 103114, 2023 | 7 | 2023 |
Fuzzy trace validation: Toward an offline forensic tracking framework S Al-Kuwari, SD Wolthusen 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital …, 2011 | 7 | 2011 |
Security performance analysis of a noma-assisted underwater vlc system under imprecise channel estimations A Kumar, S Al-Kuwari, DNK Jayakody, R Alkanhel IEEE Access 10, 117021-117032, 2022 | 6 | 2022 |
Revocable attribute-based proxy re-encryption F Luo, S Al-Kuwari Journal of Mathematical Cryptology 15 (1), 465-482, 2021 | 6 | 2021 |
Design space exploration of hybrid quantum–classical neural networks M Kashif, S Al-Kuwari Electronics 10 (23), 2980, 2021 | 5 | 2021 |
Attack specification language: Domain specific language for dynamic training in cyber range S Arshad, M Alam, S Al-Kuwari, MHA Khan 2021 IEEE Global Engineering Education Conference (EDUCON), 873-879, 2021 | 5 | 2021 |
Algorithmic approach for clandestine localisation and tracking in short-range environments S Al-Kuwari, SD Wolthusen International Journal of Communication Networks and Distributed Systems 9 (3 …, 2012 | 5 | 2012 |
SVFL: Efficient secure aggregation and verification for cross-silo federated learning F Luo, S Al-Kuwari, Y Ding IEEE Transactions on Mobile Computing, 2022 | 4 | 2022 |
Security analysis of merging control for connected and automated vehicles A Jarouf, N Meskin, S Al-Kuwari, M Shakerpour, CG Cassanderas 2022 IEEE Intelligent Vehicles Symposium (IV), 1739-1744, 2022 | 4 | 2022 |
Algorithms for advanced clandestine tracking in short-range ad hoc networks S Al-Kuwari, SD Wolthusen Security and Privacy in Mobile Information and Communication Systems: Second …, 2010 | 4 | 2010 |
Physical unclonable functions (PUF) for IoT devices A Al-Meer, S Al-Kuwari ACM Computing Surveys 55 (14s), 1-31, 2023 | 3 | 2023 |