Search Results - "Hamza, Rafik"

Refine Results
  1. 1

    Sensitive and Energetic IoT Access Control for Managing Cloud Electronic Health Records by Riad, Khaled, Hamza, Rafik, Yan, Hongyang

    Published in IEEE access (2019)
    “…Electronic health records (EHRs) replaced the old paper-based systems to make patient data more accurate, reliable, and more accessible. Yet, the EHRs system…”
    Get full text
    Journal Article
  2. 2

    A Survey of Intellectual Property Rights Protection in Big Data Applications by Hamza, Rafik, Pradana, Hilmil

    Published in Algorithms (01-11-2022)
    “…Big Data applications have the potential to transform any digital business platform by enabling the analysis of vast amounts of data. However, the biggest…”
    Get full text
    Journal Article
  3. 3

    Hash Based Encryption for Keyframes of Diagnostic Hysteroscopy by Hamza, Rafik, Muhammad, Khan, N., Arunkumar, Ramirez-Gonzalez, Gustavo

    Published in IEEE access (01-01-2018)
    “…In this paper, we address the problem of confidentiality of keyframes, which are extracted from diagnostic hysteroscopy data using video summarization. We…”
    Get full text
    Journal Article
  4. 4

    Research on privacy-preserving techniques in the era of the 5G applications by Rafik Hamza, Dao Minh-Son

    Published in Virtual Reality & Intelligent Hardware (01-06-2022)
    “…Augmented reality (AR) technologies enable people to observe the world in new ways. Generally, AR uses computer-generated graphics to overlay improvements on…”
    Get full text
    Journal Article
  5. 5

    Greedy Firefly Algorithm for Optimizing Job Scheduling in IoT Grid Computing by Yousif, Adil, Alqhtani, Samar M, Bashir, Mohammed Bakri, Ali, Awad, Hamza, Rafik, Hassan, Alzubair, Tawfeeg, Tawfeeg Mohmmed

    Published in Sensors (Basel, Switzerland) (23-01-2022)
    “…The Internet of Things (IoT) is defined as interconnected digital and mechanical devices with intelligent and interactive data transmission features over a…”
    Get full text
    Journal Article
  6. 6

    An Efficient Outsourced Privacy Preserving Machine Learning Scheme With Public Verifiability by Hassan, Alzubair, Hamza, Rafik, Yan, Hongyang, Li, Ping

    Published in IEEE access (2019)
    “…Cloud computing has been widely applied in numerous applications for storage and data analytics tasks. However, cloud servers engaged through a third party…”
    Get full text
    Journal Article
  7. 7

    An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment by Ke, Lishan, Huang, Teng, Hassan, Alzubair, Hamza, Rafik, Yan, Hongyang

    Published in Complexity (New York, N.Y.) (2019)
    “…Surveillance systems paradigm envisions the pervasive interconnection and cooperation of interactive devices over the Internet infrastructure. Nevertheless,…”
    Get full text
    Journal Article
  8. 8

    Design-Time Reliability Prediction Model for Component-Based Software Systems by Ali, Awad, Bashir, Mohammed Bakri, Hassan, Alzubair, Hamza, Rafik, Alqhtani, Samar M, Tawfeeg, Tawfeeg Mohmmed, Yousif, Adil

    Published in Sensors (Basel, Switzerland) (06-04-2022)
    “…Software reliability is prioritised as the most critical quality attribute. Reliability prediction models participate in the prevention of software failures…”
    Get full text
    Journal Article
  9. 9

    Security aspects related Intelligent e-Health Systems by Rafik, Hamza, Ettaoufik, Abdelaziz, Maizate, Abderrahim

    Published in ITM web of conferences (2023)
    “…Current health situations and crises require physicians and researchers to convert traditional healthcare services to a new generation of digital healthcare…”
    Get full text
    Journal Article
  10. 10

    Cloud Dynamic Load Balancing and Reactive Fault Tolerance Techniques: A Systematic Literature Review (SLR) by Tawfeeg, Tawfeeg Mohmmed, Yousif, Adil, Hassan, Alzubair, Alqhtani, Samar M., Hamza, Rafik, Bashir, Mohammed Bakri, Ali, Awad

    Published in IEEE access (2022)
    “…The computational cloud aims to move traditional computing from personal computers to cloud providers on the internet. Cloud security represents an important…”
    Get full text
    Journal Article
  11. 11

    Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms by Hamza, Rafik, Hassan, Alzubair, Ali, Awad, Bashir, Mohammed Bakri, Alqhtani, Samar M, Tawfeeg, Tawfeeg Mohmmed, Yousif, Adil

    Published in Entropy (Basel, Switzerland) (06-04-2022)
    “…Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption…”
    Get full text
    Journal Article
  12. 12

    A Secure User Authentication Protocol for Heterogeneous Mobile Environments by Hassan, Alzubair, Hamza, Rafik, Li, Fagen, Ali, Awad, Bashir, Mohammed Bakri, Alqhtani, Samar M., Tawfeeg, Tawfeeg Mohmmed, Yousif, Adil

    Published in IEEE access (2022)
    “…Recently, mobile devices have become extensively important to our daily needs. The user authentication protocols with the key agreement are required to solve…”
    Get full text
    Journal Article
  13. 13

    A novel pseudo random sequence generator for image-cryptographic applications by Hamza, Rafik

    “…In this paper, we propose a novel algorithm for pseudo random number sequence generator based on the samples of Chen chaotic system. The proposed algorithm can…”
    Get full text
    Journal Article
  14. 14

    Reliable secure Medical data sharing model based Private Blockchain structure by Rafik, Hamza, Ettaoufik, Abdelaziz, Maizate, Abderrahim

    “…The current e-health systems suffer from multiple difficulties due to their centralized system structure for managing Electronic Medical Records (EMR), this…”
    Get full text
    Conference Proceeding
  15. 15

    A privacy-preserving cryptosystem for IoT E-healthcare by Hamza, Rafik, Yan, Zheng, Muhammad, Khan, Bellavista, Paolo, Titouna, Faiza

    Published in Information sciences (01-07-2020)
    “…•An efficient probabilistic cryptosystem for protecting keyframe confidentiality and patient’s privacy.•A new chaos-based PRNG, relying on mixing and cascading…”
    Get full text
    Journal Article
  16. 16

    A novel image encryption algorithm based on hybrid chaotic maps using a key image by Benaissi, Sellami, Chikouche, Noureddine, Hamza, Rafik

    Published in Optik (Stuttgart) (01-02-2023)
    “…One of the most important data currently shared on the Internet is images of various sizes and types, gray and color, private and public, civilian and…”
    Get full text
    Journal Article
  17. 17

    A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map by Hamza, Rafik, Titouna, Faiza

    Published in Information security journal. (01-12-2016)
    “…In this article, a novel sensitive encryption scheme to secure the digital images based on the Zaslavsky chaotic map is proposed. We employ the Zaslavsky…”
    Get full text
    Journal Article
  18. 18

    Secure Surveillance Framework for IoT Systems Using Probabilistic Image Encryption by Muhammad, Khan, Hamza, Rafik, Ahmad, Jamil, Lloret, Jaime, Haoxiang Wang, Sung Wook Baik

    “…This paper proposes a secure surveillance framework for Internet of things (IoT) systems by intelligent integration of video summarization and image…”
    Get full text
    Journal Article
  19. 19

    Emas: an efficient MLWE-based authentication scheme for advanced metering infrastructure in smart grid environment by Chikouche, Noureddine, Mezrag, Fares, Hamza, Rafik

    “…Advanced metering infrastructure (AMI) plays a critical role in the smart grid by integrating metering systems with communication capabilities, especially for…”
    Get full text
    Journal Article
  20. 20

    Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts by Patil, Akash Suresh, Hamza, Rafik, Hassan, Alzubair, Jiang, Nan, Yan, Hongyang, Li, Jin

    Published in Computers & security (01-10-2020)
    “…The Internet of Things devices generates a huge amount of sensitive data. Machine learning is the standard processing paradigm for intelligently handling the…”
    Get full text
    Journal Article