Ali A. Yassin

Orcid: 0000-0003-4425-0071

According to our database1, Ali A. Yassin authored at least 26 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Omicron virus emotions understanding system based on deep learning architecture.
J. Ambient Intell. Humaniz. Comput., July, 2023

2022
EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment.
Peer-to-Peer Netw. Appl., 2022

2021
A Secure and Lightweight Three-Factor Remote User Authentication Protocol for Future IoT Applications.
J. Sensors, 2021

2020
VPPCS: VANET-Based Privacy-Preserving Communication Scheme.
IEEE Access, 2020

Multi-factor Authentication for an Administrator's Devices in an IoT Environment.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020

2019
Robust Conditional Privacy-Preserving Authentication based on Pseudonym Root with Cuckoo Filter in Vehicular Ad Hoc Networks.
KSII Trans. Internet Inf. Syst., 2019

Efficient and Flexible Multi-Factor Authentication Protocol Based on Fuzzy Extractor of Administrator's Fingerprint and Smart Mobile Device.
Cryptogr., 2019

Low-Overhead Remote User Authentication Protocol for IoT Based on a Fuzzy Extractor and Feature Extraction.
IEEE Access, 2019

Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network.
IEEE Access, 2019

Authentication and Revocation Scheme for VANETs Based on Chinese Remainder Theorem.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
Flexible and Efficient Authentication of IoT Cloud Scheme Using Crypto Hash Function.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

2017
Privacy preserving search over multiple servers.
Int. J. Auton. Adapt. Commun. Syst., 2017

2016
Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors.
Comput., 2016

Robust scheme to protect authentication code of message/image documents in cloud computing.
Proceedings of the 2016 International Conference on Computing, 2016

Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2015
Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

2014
Towards Efficient Yet Privacy-Preserving Approximate Search in Cloud Computing.
Comput. J., 2014

Secure Third Party Auditor for Ensuring Data Integrity in Cloud Storage.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

2012
Encrypted Remote User Authentication Scheme by Using Smart Card.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

Approximate Keyword-based Search over Encrypted Cloud Data.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012

Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

Towards Privacy Preserving Mining over Distributed Cloud Databases.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

Secure Rank-Ordered Search of Multi-keyword Trapdoor over Encrypted Cloud Data.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012


  Loading...