Security analysis of reverse encryption algorithm for databases A Mousa, OS Faragallah, S El-Rabaie, EM Nigm International Journal of Computer Applications 66 (14), 2013 | 31 | 2013 |
Query Processing Performance on Encrypted Databases by Using the REA Algorithm. A Mousa, E Nigm, ES El-Rabaie, OS Faragallah Int. J. Netw. Secur. 14 (5), 280-288, 2012 | 15 | 2012 |
Evaluating the Performance of Reverse Encryption Algorithm (REA) on the Databases. A Mousa, OS Faragallah, ES El-Rabaie, E Nigm Int. Arab J. Inf. Technol. 10 (6), 563-570, 2013 | 7 | 2013 |
Query optimization based on time scheduling approach W Gharibi, A Mousa East-West Design & Test Symposium (EWDTS 2013), 1-7, 2013 | 4 | 2013 |
Images cryptosystem based on chaotic maps for databases security A Mousa, ESM El-Rabaie, EM Nigm, OS Faragallah 2013 Second International Japan-Egypt Conference on Electronics …, 2013 | 3 | 2013 |
Cryptography and Database Security: Concepts, Compliance Risks, and Technical Challenges EM Nigm, S El-Rabaie, OS Faragallah, A Mousa | 1 | 2010 |
Cryptography and Database Security: Concepts, Compliance Risks, and Technical Challenges OF Ayman Mousa, E.M.Nigm, S.El-Rabaie Ninth International Conference on ORDERED STATISTICAL DATA AND THEIR …, 2010 | | 2010 |
The Effect of Cryptography Methods on Database Security EM Nigm, S El-Rabaie, OS Faragallah, A Mousa | | |
Query Optimization Based on Time Scheduling Approach A Mousa, M Amin, HM Abdull-Kader, N El Ramaly | | |