Ali M. Sagheer

Orcid: 0000-0003-2589-5317

According to our database1, Ali M. Sagheer authored at least 17 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Valid Blockchain-Based E-Voting Using Elliptic Curve and Homomorphic Encryption.
Int. J. Interact. Mob. Technol., October, 2022

2021
MagRing-SASB: Static Authentication of Magnetism Sensor Using Semi-Biometric Interaction Magnetic Ring.
Proceedings of the 11th IEEE International Conference on System Engineering and Technology, 2021

2019
Design of Public-Key Algorithms Based on Partial Homomorphic Encryptions.
Int. J. Inf. Secur. Priv., 2019

Design and Implementation of a Secure Mobile Banking System Based on Elliptic Curve Integrated Encryption Schema.
Proceedings of the Applied Computing to Support Industry: Innovation and Technology, 2019

2018
A Survey on Secure Safety Applications in VANET.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Design Large Symmetric Algorithm for Securing Big Data.
Proceedings of the 11th International Conference on Developments in eSystems Engineering, 2018

2015
Visual Secret Sharing Without Pixel Expansion.
Int. J. Digit. Crime Forensics, 2015

2013
RC4 Stream Cipher with a Random Initial State.
Proceedings of the Information Technology Convergence, 2013

RC4-2S: RC4 Stream Cipher with Two State Tables.
Proceedings of the Information Technology Convergence, 2013

Ensure Security of Compressed Data Transmission.
Proceedings of the Sixth International Conference on Developments in eSystems Engineering, 2013

SMS Security for Smartphone.
Proceedings of the Sixth International Conference on Developments in eSystems Engineering, 2013

2012
Improved scatter search for 4-colour mapping problem.
Int. J. Reason. based Intell. Syst., 2012

Improvement of scatter search using Bees Algorithm.
Proceedings of the 6th International Conference on Signal Processing and Communication Systems, 2012

Elliptic curves cryptographic techniques.
Proceedings of the 6th International Conference on Signal Processing and Communication Systems, 2012

2011
Proposing of Developed Advance Encryption Standard.
Proceedings of the 2011 Developments in E-systems Engineering, 2011

Visual Cryptography Technique Based on FFT.
Proceedings of the 2011 Developments in E-systems Engineering, 2011

Video Encryption Based on Special Huffman Coding and Rabbit Stream Cipher.
Proceedings of the 2011 Developments in E-systems Engineering, 2011


  Loading...