Search Results - "Hassan, Alzubair"

Refine Results
  1. 1

    Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts by Patil, Akash Suresh, Hamza, Rafik, Hassan, Alzubair, Jiang, Nan, Yan, Hongyang, Li, Jin

    Published in Computers & security (01-10-2020)
    “…The Internet of Things devices generates a huge amount of sensitive data. Machine learning is the standard processing paradigm for intelligently handling the…”
    Get full text
    Journal Article
  2. 2

    Greedy Firefly Algorithm for Optimizing Job Scheduling in IoT Grid Computing by Yousif, Adil, Alqhtani, Samar M, Bashir, Mohammed Bakri, Ali, Awad, Hamza, Rafik, Hassan, Alzubair, Tawfeeg, Tawfeeg Mohmmed

    Published in Sensors (Basel, Switzerland) (23-01-2022)
    “…The Internet of Things (IoT) is defined as interconnected digital and mechanical devices with intelligent and interactive data transmission features over a…”
    Get full text
    Journal Article
  3. 3

    An Efficient Outsourced Privacy Preserving Machine Learning Scheme With Public Verifiability by Hassan, Alzubair, Hamza, Rafik, Yan, Hongyang, Li, Ping

    Published in IEEE access (2019)
    “…Cloud computing has been widely applied in numerous applications for storage and data analytics tasks. However, cloud servers engaged through a third party…”
    Get full text
    Journal Article
  4. 4

    Identity-Based User Authenticated Key Agreement Protocol for Multi-Server Environment with Anonymity by Hassan, Alzubair, Omala, Anyembe Andrew, Ali, Mohamed, Jin, Chunhua, Li, Fagen

    Published in Mobile networks and applications (01-06-2019)
    “…A multi-server environment is an important application paradigm in the Internet of Things (IoT). It enables a user access services from different vendors…”
    Get full text
    Journal Article
  5. 5

    PKE-ET-HS: Public Key Encryption with Equality Test for Heterogeneous Systems in IoT by Elhabob, Rashad, Zhao, Yanan, Hassan, Alzubair, Xiong, Hu

    Published in Wireless personal communications (01-07-2020)
    “…With the continuous development of the Internet of Things (IoT), a growing number of users choose to store the data collected from their smart devices on a…”
    Get full text
    Journal Article
  6. 6

    An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment by Ke, Lishan, Huang, Teng, Hassan, Alzubair, Hamza, Rafik, Yan, Hongyang

    Published in Complexity (New York, N.Y.) (2019)
    “…Surveillance systems paradigm envisions the pervasive interconnection and cooperation of interactive devices over the Internet infrastructure. Nevertheless,…”
    Get full text
    Journal Article
  7. 7

    Design-Time Reliability Prediction Model for Component-Based Software Systems by Ali, Awad, Bashir, Mohammed Bakri, Hassan, Alzubair, Hamza, Rafik, Alqhtani, Samar M, Tawfeeg, Tawfeeg Mohmmed, Yousif, Adil

    Published in Sensors (Basel, Switzerland) (06-04-2022)
    “…Software reliability is prioritised as the most critical quality attribute. Reliability prediction models participate in the prevention of software failures…”
    Get full text
    Journal Article
  8. 8

    Expert Finding Systems: A Systematic Review by Husain, Omayma, Salim, Naomie, Alias, Rose Alinda, Abdelsalam, Samah, Hassan, Alzubair

    Published in Applied sciences (01-10-2019)
    “…The data overload problem and the specific nature of the experts’ knowledge can hinder many users from finding experts with the expertise they required. There…”
    Get full text
    Journal Article
  9. 9

    Cloud Dynamic Load Balancing and Reactive Fault Tolerance Techniques: A Systematic Literature Review (SLR) by Tawfeeg, Tawfeeg Mohmmed, Yousif, Adil, Hassan, Alzubair, Alqhtani, Samar M., Hamza, Rafik, Bashir, Mohammed Bakri, Ali, Awad

    Published in IEEE access (2022)
    “…The computational cloud aims to move traditional computing from personal computers to cloud providers on the internet. Cloud security represents an important…”
    Get full text
    Journal Article
  10. 10

    Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms by Hamza, Rafik, Hassan, Alzubair, Ali, Awad, Bashir, Mohammed Bakri, Alqhtani, Samar M, Tawfeeg, Tawfeeg Mohmmed, Yousif, Adil

    Published in Entropy (Basel, Switzerland) (06-04-2022)
    “…Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption…”
    Get full text
    Journal Article
  11. 11

    A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme by Huang, Teng, Ke, Lishan, Yan, Hongyang, Li, Shengjun, Li, Ping, Hassan, Alzubair

    Published in Complexity (New York, N.Y.) (2020)
    “…Secret sharing has been study for many years and has had a number of real-word applications. There are several methods to construct the secret-sharing schemes…”
    Get full text
    Journal Article
  12. 12

    A Secure User Authentication Protocol for Heterogeneous Mobile Environments by Hassan, Alzubair, Hamza, Rafik, Li, Fagen, Ali, Awad, Bashir, Mohammed Bakri, Alqhtani, Samar M., Tawfeeg, Tawfeeg Mohmmed, Yousif, Adil

    Published in IEEE access (2022)
    “…Recently, mobile devices have become extensively important to our daily needs. The user authentication protocols with the key agreement are required to solve…”
    Get full text
    Journal Article
  13. 13

    Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey by Ali, Ikram, Hassan, Alzubair, Li, Fagen

    Published in Vehicular Communications (01-04-2019)
    “…The intelligent transportation system (ITS) is made possible and practical due to vehicular ad hoc networks (VANETs) that helps improve drivers safeties and…”
    Get full text
    Journal Article
  14. 14

    A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud by Eltayieb, Nabeil, Elhabob, Rashad, Hassan, Alzubair, Li, Fagen

    Published in Journal of systems architecture (01-01-2020)
    “…Traditional cloud data sharing schemes have relied on the architecture of the network and large storage providers. However, these storage providers work as…”
    Get full text
    Journal Article
  15. 15

    An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid by Eltayieb, Nabeil, Elhabob, Rashad, Hassan, Alzubair, Li, Fagen

    Published in Journal of systems architecture (01-09-2019)
    “…Recently the cloud computing popularity is becoming high, and most of the organizations turned to outsource their sensitive data and maintenance to the cloud…”
    Get full text
    Journal Article
  16. 16

    Multiple-level threshold load balancing in distributed SDN controllers by Mokhtar, Hamza, Di, Xiaoqiang, Zhou, Ying, Hassan, Alzubair, Ma, Ziyi, Musa, Shafiu

    “…The distributed Software-Defined Networking (SDN) approach has been adopted to address the scalability issue linked to the use of a single SDN controller,…”
    Get full text
    Journal Article
  17. 17

    A privacy preserving federated learning scheme using homomorphic encryption and secret sharing by Shi, Zhaosen, Yang, Zeyu, Hassan, Alzubair, Li, Fagen, Ding, Xuyang

    Published in Telecommunication systems (01-03-2023)
    “…The performance of machine learning models largely depends on the amount of data. However, with the improvement of privacy awareness, data sharing has become…”
    Get full text
    Journal Article
  18. 18

    Secure mobile health system supporting search function and decryption verification by Eltayieb, Nabeil, Elhabob, Rashad, Hassan, Alzubair, Li, Fagen

    “…In order to protect the privacy of the data, the data owners encrypt their sensitive data before transferring it to cloud servers. This method leads to the…”
    Get full text
    Journal Article
  19. 19

    An efficient certificateless user authentication and key exchange protocol for client-server environment by Hassan, Alzubair, Eltayieb, Nabeil, Elhabob, Rashad, Li, Fagen

    “…Identity-based user authentication protocols have been presented to be applicable to resource-constrained devices such as mobile phones. Unfortunately, the…”
    Get full text
    Journal Article
  20. 20

    ASDS: Attribute‐based secure data sharing scheme for reliable cloud environment by Eltayieb, Nabeil, Wang, Ping, Hassan, Alzubair, Elhabob, Rashad, Li, Fagen

    Published in Security and privacy (01-03-2019)
    “…Cloud computing is a new revolution of information technology which provides many benefits to customers such as scalability, on‐demand, 24 × 7 × 365 support,…”
    Get full text
    Journal Article