Ali Alkhalifah

Orcid: 0000-0001-5581-5336

According to our database1, Ali Alkhalifah authored at least 15 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Provable and Privacy-Preserving Authentication Scheme for UAV-Enabled Intelligent Transportation Systems.
IEEE Trans. Ind. Informatics, 2022

Evaluating knowledge-based security questions for fallback authentication.
PeerJ Comput. Sci., 2022

Enhancement of E-commerce Service by Designing Last Mile Delivery Platform.
Comput. Syst. Sci. Eng., 2022

Predicting Mobile Cross-Platform Adaptation Using a Hybrid Sem-ANN Approach.
Comput. Syst. Sci. Eng., 2022

2021
Cost-Effective Proxy Signcryption Scheme for Internet of Things.
Mob. Inf. Syst., 2021

Evaluating fallback authentication research: A systematic literature review.
Comput. Secur., 2021

An Anonymous Certificateless Signcryption Scheme for Internet of Health Things.
IEEE Access, 2021

Exploring the Influence of Direct and Indirect Factors on Information Security Policy Compliance: A Systematic Literature Review.
IEEE Access, 2021

Children's Behavior on the Internet: Conceptualizing the Synergy of Privacy and Information Disclosure.
Proceedings of the ICCCM 2021: 9th International Conference on Computer and Communications Management, Singapore, July 16, 2021

2017
Understanding the Effect of Privacy Concerns on User Adoption of Identity Management Systems.
J. Comput., 2017

2015
Identity Management Systems Research: Frameworks, Emergemce, and Future Opportunities.
Proceedings of the 23rd European Conference on Information Systems, 2015

2013
Factors affecting user adoption of identity management systems : an empirical study.
PhD thesis, 2013

2012
Factors Effecting User Adoption Of I Dentity Management Systems: An Empi Rical Study.
Proceedings of the 16th Pacific Asia Conference on Information Systems, 2012

The Role of Trust in the Initial Adoption of Identity Management Systems.
Proceedings of the Building Sustainable Information Systems, 2012

The role of Identity Management Systems in enhancing protection of user privacy.
Proceedings of the 2012 International Conference on Cyber Security, 2012


  Loading...