A robust threshold elliptic curve digital signature providing a new verifiable secret sharing scheme MH Ibrahim, IA Ali, II Ibrahim, AH El-Sawi 2003 46th Midwest Symposium on Circuits and Systems 1, 276-280, 2003 | 48 | 2003 |
An improved technique for increasing availability in Big Data replication MR Kaseb, MH Khafagy, IA Ali, ESM Saad Future generation computer systems 91, 493-505, 2019 | 24 | 2019 |
Matched-filter-based spectrum sensing for secure cognitive radio network communications FM Salem, MH Ibrahim, IA Ali, II Ibrahim International Journal of Computer Applications 87 (18), 2014 | 23 | 2014 |
A Novel Dispersion Compensation Model using an Efficient CFBG Reflectors for WDM Optical Networks IAA Ahmed F.Sayed, Tamer M. Barakat INTERNATIONAL JOURNAL OF MICROWAVE AND OPTICAL TECHNOLOGY 12 (3), 230-238, 2017 | 20 | 2017 |
A Novel Trust-Based Cross-Layer Model for Wireless Sensor Networks SIS Hosam A. Rahhal, Ihab A. Ali 28th NATIONAL RADIO SCIENCE CONFERENCE (NRSC 2011), 2011 | 18 | 2011 |
Efficient zero-knowledge identification scheme with secret key exchange AM Allam, II Ibrahim, IA Ali, AEH Elsawy 2003 46th Midwest Symposium on Circuits and Systems 1, 516-519, 2003 | 18 | 2003 |
Intravenous iron supplementation treats anemia and reduces blood transfusion requirements in patients undergoing coronary artery bypass grafting—a prospective randomized trial H Shokri, I Ali Annals of Cardiac Anaesthesia 25 (2), 141-147, 2022 | 16 | 2022 |
Evaluation of the analgesic efficacy of bilateral ultrasound-guided transversus thoracic muscle plane block on post-sternotomy pain: a randomized controlled trial H Shokri, I Ali, AA Kasem Local and Regional Anesthesia, 145-152, 2021 | 15 | 2021 |
An Improved LTE RACH Protocol for M2M Applications IA Ahmed Samir, Mahmoud M. Elmesalawy, A. S. Ali Mobile Information Systems, 2016 | 14* | 2016 |
Privacy-preserving data mining (ppdm) method for horizontally partitioned data MA Ouda, SA Salem, IA Ali, ESM Saad Int. J. Comput. Sci 9 (5), 339-347, 2012 | 14 | 2012 |
TRIUMF: Trust-based routing protocol with controlled degree of selfishness for securing MANET against packet dropping attack AM Abd El-Haleem, IA Ali International Journal of Computer Science Issues (IJCSI) 8 (4), 99, 2011 | 14 | 2011 |
Fast fully distributed and threshold RSA function sharing MH Ibrahim, IA Ali, II Ibrahim, AH El-Sawy Proceedings of the Information Systems: New Generations (ISNG-2004 …, 2004 | 13 | 2004 |
Error analysis and detection procedures for elliptic curve cryptography NF Saudy, IA Ali, R Al Barkouky Ain Shams Engineering Journal 10 (3), 587-597, 2019 | 11 | 2019 |
Wi-Fi protected access for secure power network protection scheme MM Eissa, IA Ali, KM Abdel-Latif International Journal of Electrical Power & Energy Systems 46, 414-424, 2013 | 10 | 2013 |
TRIDNT: The Trust-Based Routing Protocol with Controlled Degree of Node Selfishness for MANET AM Abd El-Haleem, IA Ali International Journal of Network Security & Its Applications (IJNSA) 3 (3 …, 2011 | 9 | 2011 |
A provably secure certificateless organizational signature schemes AM Allam, IA Ali, SM Mahgoub International Journal of Communication Systems 30 (5), e3038, 2017 | 8 | 2017 |
Redundant independent files (RIF): a technique for reducing storage and resources in big data replication MR Kaseb, MH Khafagy, IA Ali, ESM Saad Trends and Advances in Information Systems and Technologies: Volume 1 6, 182-193, 2018 | 7 | 2018 |
TRIDNT: Isolating Dropper nodes with some degree of Selfishness in MANET AM Abd El-Haleem, IA Ali, II Ibrahim, ARH El-Sawy Advances in Computer Science and Information Technology: First International …, 2011 | 7 | 2011 |
Trust model for TRIDNT trust based routing Protocol AM Abd El-Haleem, IA Ali, II Ibrahim, ARH El-Sawy 2010 2nd International Conference on Computer Technology and Development …, 2010 | 7 | 2010 |
A dynamic routing protocol for broadband networks IA Ali, HT Mouftah, AH El-Sawi Proceedings Second IEEE Symposium on Computer and Communications, 495-500, 1997 | 5 | 1997 |