Search Results - "Hamza, Rafik"
-
1
Sensitive and Energetic IoT Access Control for Managing Cloud Electronic Health Records
Published in IEEE access (2019)“…Electronic health records (EHRs) replaced the old paper-based systems to make patient data more accurate, reliable, and more accessible. Yet, the EHRs system…”
Get full text
Journal Article -
2
A Survey of Intellectual Property Rights Protection in Big Data Applications
Published in Algorithms (01-11-2022)“…Big Data applications have the potential to transform any digital business platform by enabling the analysis of vast amounts of data. However, the biggest…”
Get full text
Journal Article -
3
Hash Based Encryption for Keyframes of Diagnostic Hysteroscopy
Published in IEEE access (01-01-2018)“…In this paper, we address the problem of confidentiality of keyframes, which are extracted from diagnostic hysteroscopy data using video summarization. We…”
Get full text
Journal Article -
4
Research on privacy-preserving techniques in the era of the 5G applications
Published in Virtual Reality & Intelligent Hardware (01-06-2022)“…Augmented reality (AR) technologies enable people to observe the world in new ways. Generally, AR uses computer-generated graphics to overlay improvements on…”
Get full text
Journal Article -
5
Greedy Firefly Algorithm for Optimizing Job Scheduling in IoT Grid Computing
Published in Sensors (Basel, Switzerland) (23-01-2022)“…The Internet of Things (IoT) is defined as interconnected digital and mechanical devices with intelligent and interactive data transmission features over a…”
Get full text
Journal Article -
6
An Efficient Outsourced Privacy Preserving Machine Learning Scheme With Public Verifiability
Published in IEEE access (2019)“…Cloud computing has been widely applied in numerous applications for storage and data analytics tasks. However, cloud servers engaged through a third party…”
Get full text
Journal Article -
7
An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment
Published in Complexity (New York, N.Y.) (2019)“…Surveillance systems paradigm envisions the pervasive interconnection and cooperation of interactive devices over the Internet infrastructure. Nevertheless,…”
Get full text
Journal Article -
8
Design-Time Reliability Prediction Model for Component-Based Software Systems
Published in Sensors (Basel, Switzerland) (06-04-2022)“…Software reliability is prioritised as the most critical quality attribute. Reliability prediction models participate in the prevention of software failures…”
Get full text
Journal Article -
9
Security aspects related Intelligent e-Health Systems
Published in ITM web of conferences (2023)“…Current health situations and crises require physicians and researchers to convert traditional healthcare services to a new generation of digital healthcare…”
Get full text
Journal Article -
10
Cloud Dynamic Load Balancing and Reactive Fault Tolerance Techniques: A Systematic Literature Review (SLR)
Published in IEEE access (2022)“…The computational cloud aims to move traditional computing from personal computers to cloud providers on the internet. Cloud security represents an important…”
Get full text
Journal Article -
11
Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms
Published in Entropy (Basel, Switzerland) (06-04-2022)“…Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption…”
Get full text
Journal Article -
12
A Secure User Authentication Protocol for Heterogeneous Mobile Environments
Published in IEEE access (2022)“…Recently, mobile devices have become extensively important to our daily needs. The user authentication protocols with the key agreement are required to solve…”
Get full text
Journal Article -
13
A novel pseudo random sequence generator for image-cryptographic applications
Published in Journal of information security and applications (01-08-2017)“…In this paper, we propose a novel algorithm for pseudo random number sequence generator based on the samples of Chen chaotic system. The proposed algorithm can…”
Get full text
Journal Article -
14
Reliable secure Medical data sharing model based Private Blockchain structure
Published in 2023 14th International Conference on Intelligent Systems: Theories and Applications (SITA) (22-11-2023)“…The current e-health systems suffer from multiple difficulties due to their centralized system structure for managing Electronic Medical Records (EMR), this…”
Get full text
Conference Proceeding -
15
A privacy-preserving cryptosystem for IoT E-healthcare
Published in Information sciences (01-07-2020)“…•An efficient probabilistic cryptosystem for protecting keyframe confidentiality and patient’s privacy.•A new chaos-based PRNG, relying on mixing and cascading…”
Get full text
Journal Article -
16
A novel image encryption algorithm based on hybrid chaotic maps using a key image
Published in Optik (Stuttgart) (01-02-2023)“…One of the most important data currently shared on the Internet is images of various sizes and types, gray and color, private and public, civilian and…”
Get full text
Journal Article -
17
A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map
Published in Information security journal. (01-12-2016)“…In this article, a novel sensitive encryption scheme to secure the digital images based on the Zaslavsky chaotic map is proposed. We employ the Zaslavsky…”
Get full text
Journal Article -
18
Secure Surveillance Framework for IoT Systems Using Probabilistic Image Encryption
Published in IEEE transactions on industrial informatics (01-08-2018)“…This paper proposes a secure surveillance framework for Internet of things (IoT) systems by intelligent integration of video summarization and image…”
Get full text
Journal Article -
19
Emas: an efficient MLWE-based authentication scheme for advanced metering infrastructure in smart grid environment
Published in Journal of ambient intelligence and humanized computing (01-11-2024)“…Advanced metering infrastructure (AMI) plays a critical role in the smart grid by integrating metering systems with communication capabilities, especially for…”
Get full text
Journal Article -
20
Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts
Published in Computers & security (01-10-2020)“…The Internet of Things devices generates a huge amount of sensitive data. Machine learning is the standard processing paradigm for intelligently handling the…”
Get full text
Journal Article