A digital image encryption algorithm based a composition of two chaotic logistic maps. IA Ismail, M Amin, H Diab Int. J. Netw. Secur. 11 (1), 1-10, 2010 | 147 | 2010 |
How to repair the Hill cipher IA Ismail, M Amin, H Diab Journal of Zhejiang University-Science A 7, 2022-2030, 2006 | 129 | 2006 |
BP-AODV: Blackhole protected AODV routing protocol for MANETs based on chaotic map AM El-Semary, H Diab IEEE Access 7, 95197-95211, 2019 | 109 | 2019 |
An efficient chaotic image cryptosystem based on simultaneous permutation and diffusion operations H Diab IEEE access 6, 42227-42244, 2018 | 108 | 2018 |
A cryptosystem based on elementary cellular automata AA Abdo, S Lian, IA Ismail, M Amin, H Diab Communications in Nonlinear Science and Numerical Simulation 18 (1), 136-147, 2013 | 108 | 2013 |
Secure image cryptosystem with unique key streams via hyper-chaotic system H Diab, AM El-semary Signal Processing 142, 53-68, 2018 | 32 | 2018 |
An efficient image encryption scheme based chaotic logistic maps IA Ismail, M Amin, H Diab International Journal of Soft Compution 2 (2), 285-29, 2007 | 23 | 2007 |
Cryptanalysis and improvement of the image cryptosystem reusing permutation matrix dynamically H Diab, AM El-semary Signal Processing 148, 172-192, 2018 | 17 | 2018 |
Chaos encryption algorithm using key generation from biometric images AM Meligy, H Diab, MS El-Danaf International Journal of Computer Applications 149 (11), 2016 | 11 | 2016 |
An efficient modified Hill Cipher adapted to image encryption IA Ismail, M Amin, H Diab ICGSTCNIR Journal 5 (2), 53-62, 2006 | 8 | 2006 |
An efficient adaptive ergodic matrix and chaotic system for image encryption IA Ismail, M Amin, H Diab International Journal of Computers and Applications 32 (3), 381-388, 2010 | 5 | 2010 |
A Selective Self-adaptive Image Cryptosystem Based on Bit-planes Decomposition. H Diab Int. J. Netw. Secur. 21 (1), 47-61, 2019 | 2 | 2019 |
SPCBC: A secure parallel cipher block chaining mode of operation based on logistic chaotic map AM El-Semary, MMA Azim, H Diab KSII Transactions on Internet and Information Systems (TIIS) 11 (7), 3608-3628, 2017 | 2 | 2017 |
Security requirements engineering using outsourcing A Meligy, H Diab, M Tork Journal of Information Security Research 3 (3), 103-115, 2012 | 2 | 2012 |
Self-Adaptive Image Encryption Based on Memory Cellular Automata IA Ismail, AA Abdo, M Amin, H Diab International Journal of Information Acquisition 8 (03), 227-241, 2011 | 1 | 2011 |
Advancing Cryptographic Security with a New Delannoy-Derived Chaotic S-Box B Alabdullah, A Banga, N Iqbal, A Ikram, H Diab IEEE Access, 2024 | | 2024 |
Year of Publication: 2016 AM Meligy, HA Diab, MS El-Danaf | | 2016 |
An Access Control Model for Avoiding Outsourcing Risks A Meligy, H Diab, M Torky International Journal of Computer Applications 55 (9), 2012 | | 2012 |
AN EFFICIENT ADAPTIVE ERGODIC MATRIX AND CHAOTIC SYSTEM FOR IMAGE ENCRYPTION IA Ismail M Amin, H Diab International Journal of Computers and Applications 32 (3), 2010 | | 2010 |