Deep CNN model based on VGG16 for breast cancer classification

D Albashish, R Al-Sayyed, A Abdullah… - 2021 International …, 2021 - ieeexplore.ieee.org
Deep learning (DL) technologies are becoming a buzzword these days, especially for breast
histopathology image tasks, such as diagnosing, due to the high performance obtained in …

On the security of the standardized MQV protocol and its based Evolution Protocols

Z Mohammad, V Nyangaresi… - 2021 International …, 2021 - ieeexplore.ieee.org
The MQV is an authenticated key agreement protocol which does not use any one-way hash
functions in its block design, and it is standardized in (IEEE, ANSI, and ISO). However, its …

Implication of lightweight and robust hash function to support key exchange in health sensor networks

M Al-Zubaidie - Symmetry, 2023 - mdpi.com
Internet of Things (IoT) applications are critical for the fast delivery of health information/data
in different environments. The wireless sensor network (WSN) can be used within IoT …

Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service

J Du, C Gao, T Feng - Future Internet, 2022 - mdpi.com
The Data Distribution Service (DDS) for real-time systems is an industrial Internet
communication protocol. Due to its distributed high reliability and the ability to transmit …

PUFDCA: A Zero‐Trust‐Based IoT Device Continuous Authentication Protocol

S Alshomrani, S Li - Wireless Communications and Mobile …, 2022 - Wiley Online Library
It is very challenging to secure the Internet of Things (IoT) systems, which demands an end‐
to‐end approach from the edge devices to cloud or hybrid service. The exponential growth …

An authenticated, secure, and mutable multiple‐session‐keys protocol based on elliptic curve cryptography and text‐to‐image encryption algorithm

A Abusukhon, Z Mohammad… - … Practice and Experience, 2022 - Wiley Online Library
Most of the key agreement protocols (eg, Menezes–Qu–Vanstone [MQV] family) generate
one common key per session. This leaves the session key vulnerable against various …

Pubic cloud computing: Big three vendors

A Alkhatib, A Al Sabbagh… - … Conference on Information …, 2021 - ieeexplore.ieee.org
There has been a significant increase in the adoption of cloud computing, and Azure, AWS
and Google Cloud are striving to become the best cloud providers. Various extraordinary …

Towards more secure EMV purchase transactions: A new security protocol formally analyzed by the Scyther tool

N El Madhoun, E Bertin, M Badra, G Pujolle - Annals of …, 2021 - Springer
EMV is the protocol implemented to secure the communication, between a client's payment
device and a merchant's payment device, during a contact or an NFC purchase transaction …

Cryptanalysis of a Tightly-Secure Authenticated Key Exchange without NAXOS Approach Based on Decision Linear Problem

Z Mohammad, AAA Alkhatib, M Lafi… - 2021 International …, 2021 - ieeexplore.ieee.org
Authenticated key exchange protocols are a fundamental cryptography building block for
establishing a secret shared key among participating parties over an open network model …

Remotely Controlled Smart Home System using GSM and IOT

MA Obeidat, AM Mansour, T Hamadneh… - 2021 International …, 2021 - ieeexplore.ieee.org
Smart homes provide an easier and more comfortable life by controlling lighting,
entertainment, temperature, and creating a safety system that can open doors, communicate …