Ahmed Asimi

According to our database1, Ahmed Asimi authored at least 13 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Dynamic proof of retrievability based on public auditing for coded secure cloud storage.
Multim. Tools Appl., November, 2022

Secure Virtual Machine Image Storage Process into a Trusted Zone-based Cloud Storage.
Comput. Secur., 2022

2021
Mathematical validation of proposed machine learning classifier for heterogeneous traffic and anomaly detection.
Big Data Min. Anal., 2021

2019
A Global Intrusion Detection System using PcapSockS Sniffer and Multilayer Perceptron Classifier.
Int. J. Netw. Secur., 2019

2018
IaaS Cloud Model Security Issues on Behalf Cloud Provider and User Security Behaviors.
Proceedings of the 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops, 2018

Unpredictable cryptographic primitives for the Robust Wireless Network Security.
Proceedings of the 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops, 2018

2017
A New Mutuel Kerberos Authentication Protocol for Distributed Systems.
Int. J. Netw. Secur., 2017

Behavioral and Security Study of the OHFGC Hash Function.
Int. J. Netw. Secur., 2017

2016
Strong Zero-knowledge Authentication Based on Virtual Passwords.
Int. J. Netw. Secur., 2016

New Random Generator of a Safe Cryptographic Salt Per Session.
Int. J. Netw. Secur., 2016

2014
A Cryptographic Mutual Authentication Scheme for Web Applications.
CoRR, 2014

Short: A Lightweight and Secure Session Management Protocol.
Proceedings of the Networked Systems - Second International Conference, 2014

2013
A New Approch to Decoding of Rational Irreducible Goppa code
CoRR, 2013


  Loading...