Efficient spam and phishing emails filtering based on deep learning S Magdy, Y Abouelseoud, M Mikhail Computer Networks 206, 108826, 2022 | 66 | 2022 |
Two‐Phase Image Encryption Scheme Based on FFCT and Fractals M Mikhail, Y Abouelseoud, G ElKobrosy Security and Communication Networks 2017 (1), 7367518, 2017 | 28 | 2017 |
Extension and application of El-Gamal encryption scheme M Mikhail, Y Abouelseoud, G Elkobrosy 2014 World Congress on Computer Applications and Information Systems (WCCAIS …, 2014 | 21 | 2014 |
Privacy preserving search index for image databases based on SURF and order preserving encryption S Magdy, Y Abouelseoud, M Mikhail IET Image Processing 14 (5), 874-881, 2020 | 10 | 2020 |
Effect of chosen features on performance of privacy preserving image retrieval systems S Magdy, Y Abouelseoud, M Mikhail Computers & Electrical Engineering 76, 411-424, 2019 | 3 | 2019 |
Robust watermark based on Schur decomposition and dynamic weighting factors R Nasser, Y Abouelseoud, M Mikhail The Visual Computer 40 (5), 3249-3269, 2024 | 2 | 2024 |
A Survey of Cryptographic Protocols M Mikhail, Y Abouelsoud, G El Kobrosy The 3rd International Conference on Design Engineering and Science, ICDES 2014, 2014 | 2 | 2014 |
Text Hiding in a Digital Cover Image using Two Dimensional Indexing based on Chaotic Maps M Mikhail, Y Abouelseoud, G Elkobrosy International Journal of Computer Applications 975, 8887, 2016 | 1 | 2016 |
Recommended articles M Felderer, A Pretschner, GDLT Parra, N Beebe, PP Kumar, V Rajendran, ... Advances in Computers 101, 1-51, 2016 | | 2016 |
Tripartite & Multi-Receiver and E-voting encryption schemes based on El-Gamal M Mikhail, Y Abouelseoud, G Elkobrosy | | 2014 |