Search Results - "Bin Muhaya, Fahad T."
-
1
Sensor based framework for secure multimedia communication in VANET
Published in Sensors (Basel, Switzerland) (01-11-2010)“…Secure multimedia communication enhances the safety of passengers by providing visual pictures of accidents and danger situations. In this paper we proposed a…”
Get full text
Journal Article -
2
Lattice-based signcryption
Published in Concurrency and computation (25-09-2013)“…SUMMARYSigncryption is a cryptographic primitive that performs simultaneously both the functions of digital signature and public‐key encryption, at a cost…”
Get full text
Journal Article -
3
Chaotic and AES cryptosystem for satellite imagery
Published in Telecommunication systems (01-02-2013)“…The rapid development, advancement, and growing use of satellite imagery and information technologies have made the security of data storage and transmission…”
Get full text
Journal Article -
4
Framework for Secure Wireless Communication in Wireless Sensor Networks
Published in International journal of distributed sensor networks (01-01-2013)“…With large-scale and rapid development in wireless sensor networks (WSNs), there is great demand to adopt security mechanisms for secure wireless…”
Get full text
Journal Article -
5
Cryptanalysis and security enhancement of Zhu's authentication scheme for Telecare medicine information system
Published in Security and communication networks (25-01-2015)“…ABSTRACT The concept of Telecare medicine information systems (TMISs) has evolved to provide better health care to the masses. So the control of access to…”
Get full text
Journal Article -
6
A Comprehensive Study of Email Spam Botnet Detection
Published in IEEE Communications surveys and tutorials (01-01-2015)“…The problem of email spam has grown significantly over the past few years. It is not just a nuisance for users but also it is damaging for those who fall for…”
Get full text
Journal Article -
7
An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography
Published in Wireless personal communications (01-11-2015)“…As the internet technology’s evolution, identity authentication in the network is becoming more and more significant. In 2014, Qu et al. proposed a two-factor…”
Get full text
Journal Article -
8
Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps
Published in Wireless personal communications (01-10-2015)“…In recent years, many anonymous password-based mobile user authentication techniques have been constructed for roaming service in global mobility networks…”
Get full text
Journal Article -
9
Selfish node detection in Wireless Mesh Networks
Published in 2010 International Conference on Networking and Information Technology (01-06-2010)“…Wireless Mesh Networks (WMNs) are multi-hop network in which each node communicates with each other to increase the performance of network. Security is a big…”
Get full text
Conference Proceeding -
10
Essentials for the e-government security
Published in International Conference on Information Society (i-Society 2011) (01-06-2011)“…In the modern digital age the world became a global village. Finger tips availability of all government services is the goal of every government. That's why…”
Get full text
Conference Proceeding -
11
Cryptanalysis of "an improved timestamp-based remote user authentication scheme"
Published in 2012 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (01-06-2012)“…With the popularity of Internet technology, remote user authentication is receiving more and more attention than before. Recently, Awasthi et al. analysed…”
Get full text
Conference Proceeding