Amr M. Youssef

Orcid: 0000-0002-4284-8646

Affiliations:
  • Concordia University, Montreal, Canada


According to our database1, Amr M. Youssef authored at least 236 papers between 1995 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Real-Time Congestion-Aware Charging Station Assignment Model for EVs.
IEEE Internet Things J., April, 2024

Cyber-Immune Line Current Differential Relays.
IEEE Trans. Ind. Informatics, March, 2024

Security Weaknesses in IoT Management Platforms.
IEEE Internet Things J., January, 2024

SKAFS: Symmetric Key Authentication Protocol With Forward Secrecy for Edge Computing.
IEEE Internet Things J., January, 2024

On Detecting and Measuring Exploitable JavaScript Functions in Real-world Applications.
ACM Trans. Priv. Secur., 2024

Privacy-Preserving Mutual Authentication Protocol With Forward Secrecy for IoT-Edge-Cloud.
IEEE Internet Things J., 2024

Enhancing Power Quality Event Classification with AI Transformer Models.
CoRR, 2024

2023
Mjolnir: Breaking the Glass in a Publicly Verifiable Yet Private Manner.
IEEE Trans. Netw. Serv. Manag., September, 2023

Management of Congestion in Distribution Networks Utilizing Demand Side Management and Reinforcement Learning.
IEEE Syst. J., September, 2023

Performance Analysis of Cellular Ultradense IoT Networks With Wireless Backhauls.
IEEE Internet Things J., September, 2023

Aegis: Privacy-Preserving Market for Non-Fungible Tokens.
IEEE Trans. Netw. Sci. Eng., 2023

GASE: A Lightweight Group Authentication Scheme With Key Agreement for Edge Computing Applications.
IEEE Internet Things J., 2023

An Observer-Based Key Agreement Scheme for Remotely Controlled Mobile Robots.
CoRR, 2023

All Your Shops Are Belong to Us: Security Weaknesses in E-commerce Platforms.
Proceedings of the ACM Web Conference 2023, 2023

Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

No Place to Hide: Privacy Exposure in Anti-stalkerware Apps and Support Websites.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023

Learning-Based Detection of Malicious Volt-VAr Control Parameters in Smart Inverters.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

Machine-Type Communications in mmWave Ultra-Dense Networks: Performance Analysis.
Proceedings of the IEEE International Conference on Communications, 2023

vPass: Publicly Verifiable Fair Exchange Protocol for Vehicle Passports.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

All Your IoT Devices Are Belong to Us: Security Weaknesses in IoT Management Platforms.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
A Key-Agreement Scheme for Cyber-Physical Systems.
IEEE Trans. Syst. Man Cybern. Syst., 2022

Anomaly-Based Detection of Cyberattacks on Line Current Differential Relays.
IEEE Trans. Smart Grid, 2022

Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management.
IEEE Trans. Ind. Informatics, 2022

Edge Computing and Multiple-Association in Ultra-Dense Networks: Performance Analysis.
IEEE Trans. Commun., 2022

Dispute-free Scalable Open Vote Network using zk-SNARKs.
IACR Cryptol. ePrint Arch., 2022

Encrypted Cloud-Based Set-Theoretic Model Predictive Control.
IEEE Control. Syst. Lett., 2022

Blindfold: Keeping private keys in PKIs and CDNs out of sight.
Comput. Secur., 2022

Et tu, Brute? Privacy Analysis of Government Websites and Mobile Apps.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly.
Proceedings of the Security and Privacy in Communication Networks, 2022

Got Sick and Tracked: Privacy Analysis of Hospital Websites.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

SAUSAGE: Security Analysis of Unix domain Socket usAGE in Android.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

A Privacy Preserving Solution for Cloud-Enabled Set-Theoretic Model Predictive Control.
Proceedings of the European Control Conference, 2022

No Salvation from Trackers: Privacy Analysis of Religious Websites and Mobile Apps.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022

Leaky Kits: The Increased Risk of Data Exposure from Phishing Kits.
Proceedings of the APWG Symposium on Electronic Crime Research, 2022

On Measuring Vulnerable JavaScript Functions in the Wild.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Efficient Inter-Cloud Authentication and Micropayment Protocol for IoT Edge Computing.
IEEE Trans. Netw. Serv. Manag., 2021

Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems.
IEEE Trans. Ind. Informatics, 2021

Threat Intelligence Generation Using Network Telescope Data for Industrial Control Systems.
IEEE Trans. Inf. Forensics Secur., 2021

Multiple-Association Supporting HTC/MTC in Limited-Backhaul Capacity Ultra-Dense Networks.
IEEE Trans. Commun., 2021

Covert channels in stochastic cyber-physical systems.
IET Cyper-Phys. Syst.: Theory & Appl., 2021

Parental Controls: Safer Internet Solutions or New Pitfalls?
IEEE Secur. Priv., 2021

On MILP-based Automatic Search for Bit-Based Division Property for Ciphers with (large) Linear Layers.
IACR Cryptol. ePrint Arch., 2021

Covert Channels in Cyber-Physical Systems.
IEEE Control. Syst. Lett., 2021

LSTM-based approach to detect cyber attacks on market-based congestion management methods.
CoRR, 2021

On Securing Cloud-hosted Cyber-physical Systems Using Trusted Execution Environments.
CoRR, 2021

Impact of Electric Vehicles Botnets on the Power Grid.
CoRR, 2021

Lightweight Authentication and Key Agreement Protocol for Edge Computing Applications.
Proceedings of the 7th IEEE World Forum on Internet of Things, 2021

Horus: A Security Assessment Framework for Android Crypto Wallets.
Proceedings of the Security and Privacy in Communication Networks, 2021

Ergodic Secrecy Rate Analysis of Ultra-Dense Networks with Multiple Antennas.
Proceedings of the ICC 2021, 2021

Publicly Verifiable and Secrecy Preserving Periodic Auctions.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

2020
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting
Advances in Information Security 78, Springer, ISBN: 978-3-030-34237-1, 2020

Uplink Coverage and Capacity Analysis of mMTC in Ultra-Dense Networks.
IEEE Trans. Veh. Technol., 2020

An Intrusion Detection Method for Line Current Differential Relays.
IEEE Trans. Inf. Forensics Secur., 2020

Lightweight Broadcast Authentication Protocol for Edge-Based Applications.
IEEE Internet Things J., 2020

Uplink Performance of NOMA-Based Combined HTC and MTC in Ultradense Networks.
IEEE Internet Things J., 2020

Wyner wiretap-like encoding scheme for cyber-physical systems.
IET Cyper-Phys. Syst.: Theory & Appl., 2020

Cyber-physical attacks on power distribution systems.
IET Cyper-Phys. Syst.: Theory & Appl., 2020

Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE.
IACR Cryptol. ePrint Arch., 2020

Scalable Open-Vote Network on Ethereum.
IACR Cryptol. ePrint Arch., 2020

Integral Cryptanalysis of Reduced-Round Tweakable TWINE.
IACR Cryptol. ePrint Arch., 2020

A cautionary note on the use of Gurobi for cryptanalysis.
IACR Cryptol. ePrint Arch., 2020

NOMA-Assisted Machine-Type Communications in UDN: State-of-the-Art and Challenges.
IEEE Commun. Surv. Tutorials, 2020

ByPass: Reconsidering the Usability of Password Managers.
Proceedings of the Security and Privacy in Communication Networks, 2020

Secrecy Performance in Ultra-Dense Networks with Multiple Associations.
Proceedings of the IEEE Globecom Workshops, 2020

A Hybrid NOMA/OMA Scheme for MTC in Ultra-Dense Networks.
Proceedings of the IEEE Global Communications Conference, 2020

Privacy Preserving Netting Protocol for Inter-bank Payments.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

A Lightweight Authentication and Inter-Cloud Payment Protocol for Edge Computing.
Proceedings of the 9th IEEE International Conference on Cloud Networking, 2020

Set-Theoretic Control for Active Detection of Replay Attacks with Applications to Smart Grid.
Proceedings of the 2020 IEEE Conference on Control Technology and Applications, 2020

Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Joint Detection and Mitigation of False Data Injection Attacks in AGC Systems.
IEEE Trans. Smart Grid, 2019

Playing With Danger: A Taxonomy and Evaluation of Threats to Smart Toys.
IEEE Internet Things J., 2019

Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum.
IACR Cryptol. ePrint Arch., 2019

An Efficient Micropayment Channel on Ethereum.
IACR Cryptol. ePrint Arch., 2019

Related-key Differential Cryptanalysis of Full Round CRAFT.
IACR Cryptol. ePrint Arch., 2019

On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T.
IACR Cryptol. ePrint Arch., 2019

Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management<sup>1</sup>.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Capacity Analysis of Downlink NOMA-Based Coexistent HTC/MTC in UDN.
Proceedings of the International Conference on Communications, 2019

Short Paper: Deploying PayWord on Ethereum.
Proceedings of the Financial Cryptography and Data Security, 2019

On Privacy Risks of Public WiFi Captive Portals.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019

Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

AppVeto: mobile application self-defense through resource access veto.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Attack Detection for Load Frequency Control Systems Using Stochastic Unknown Input Estimators.
IEEE Trans. Inf. Forensics Secur., 2018

Impossible Differential Attack on Reduced Round SPARX-128/256.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Related-Key Differential Attack on Round-Reduced Bel-T-256.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Verifiable Sealed-Bid Auction on the Ethereum Blockchain.
IACR Cryptol. ePrint Arch., 2018

The Sorry State of TLS Security in Enterprise Interception Appliances.
CoRR, 2018

Smart But Unsafe: Experimental Evaluation of Security and Privacy Practices in Smart Toys.
CoRR, 2018

OpenStack-Based Evaluation Framework for Smart Grid Cyber Security.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Integral Attacks on Round-Reduced Bel-T-256.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

Detection of false data injection attacks in smart grids using Recurrent Neural Networks.
Proceedings of the 2018 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2018

Uplink Coverage of Machine-Type Communications in Ultra-Dense Networks.
Proceedings of the IEEE Global Communications Conference, 2018

Fault Analysis of the New Ukrainian Hash Function Standard: Kupyna.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

Succinctly Verifiable Sealed-Bid Auction Smart Contract.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

To Intercept or Not to Intercept: Analyzing TLS Interception in Network Appliances.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Physical Layer Security in Ultra-Dense Networks.
IEEE Wirel. Commun. Lett., 2017

MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics.
IACR Trans. Symmetric Cryptol., 2017

Security, Privacy, and Safety Aspects of Civilian Drones: A Survey.
ACM Trans. Cyber Phys. Syst., 2017

Performance Analysis of Multiple Association in Ultra-Dense Networks.
IEEE Trans. Commun., 2017

Fault analysis on Kalyna.
Inf. Secur. J. A Glob. Perspect., 2017

Improved Multiple Impossible Differential Cryptanalysis of Midori128.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Lelantos: A Blockchain-based Anonymous Physical Delivery System.
IACR Cryptol. ePrint Arch., 2017

Towards a comprehensive analytical framework for smart toy privacy practices.
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, 2017

Multidimensional Zero-Correlation Linear Cryptanalysis of Reduced Round SPARX-128.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

Downlink coverage and average cell load of M2M and H2H in ultra-dense networks.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Fault analysis-resistant implementation of Rainbow Signature scheme.
Proceedings of the 29th International Conference on Microelectronics, 2017

A power analysis resistant FPGA implementation of NTRUEncrypt.
Proceedings of the 29th International Conference on Microelectronics, 2017

Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

Average downlink rate in Ultra-Dense Networks.
Proceedings of the IEEE International Conference on Communications, 2017

Coverage and Capacity Analysis with Stretched Exponential Path Loss in Ultra-Dense Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Impossible Differential Attack on Reduced Round SPARX-64/128.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2017, 2017

2016
Generalized MitM attacks on full TWINE.
Inf. Process. Lett., 2016

A Meet in the Middle Attack on Reduced Round Kiasu-BC.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

A Meet-in-the-Middle Attack on Reduced-Round Kalyna-<i>b</i>/2<i>b</i>.
IEICE Trans. Inf. Syst., 2016

Impossible Differential Cryptanalysis of Reduced-Round SKINNY.
IACR Cryptol. ePrint Arch., 2016

Ultra-Dense Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2016

Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices.
IEEE Access, 2016

Detection techniques for data-level spoofing in GPS-based phasor measurement units.
Proceedings of the International Conference on Selected Topics in Mobile & Wireless Networking, 2016

Truncated and Multiple Differential Cryptanalysis of Reduced Round Midori128.
Proceedings of the Information Security - 19th International Conference, 2016

Improved Linear Cryptanalysis of Round-Reduced ARIA.
Proceedings of the Information Security - 19th International Conference, 2016

Multiple association in ultra-dense networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Watch your constants: malicious Streebog.
IET Inf. Secur., 2015

A Meet in the Middle Attack on Reduced Round Kuznyechik.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Meet in the Middle Attacks on Reduced Round Kuznyechik.
IACR Cryptol. ePrint Arch., 2015

Fault Analysis of Kuznyechik.
IACR Cryptol. ePrint Arch., 2015

A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b.
IACR Cryptol. ePrint Arch., 2015

Meet-in-the-Middle Attacks on Round-Reduced Khudra.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

Preimage Analysis of the Maelstrom-0 Hash Function.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

Meet-in-the-Middle Attacks on Reduced Round Piccolo.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2015

Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015

Differential Fault Analysis of Streebog.
Proceedings of the Information Security Practice and Experience, 2015

A Higher Order Key Partitioning Attack with Application to LBlock.
Proceedings of the Codes, Cryptology, and Information Security, 2015

Impossible Differential Properties of Reduced Round Streebog.
Proceedings of the Codes, Cryptology, and Information Security, 2015

2014
Integral distinguishers for reduced-round Stribog.
Inf. Process. Lett., 2014

Preimage attacks on Reduced-round Stribog.
IACR Cryptol. ePrint Arch., 2014

Characterization of Covert Channels in DNS.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2014

Detection of malicious payload distribution channels in DNS.
Proceedings of the IEEE International Conference on Communications, 2014

Second Preimage Analysis of Whirlwind.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

2013
Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks.
J. Cryptogr. Eng., 2013

A Markov Decision Process Model for High Interaction Honeypots.
Inf. Secur. J. A Glob. Perspect., 2013

Cryptanalysis of Álvarez et al. key exchange scheme.
Inf. Sci., 2013

Second order collision for the 42-step reduced DHA-256 hash function.
Inf. Process. Lett., 2013

A heuristic for finding compatible differential paths with application to HAS-160.
IACR Cryptol. ePrint Arch., 2013

Rebound attacks on Stribog.
IACR Cryptol. ePrint Arch., 2013

A Privacy Preserving Approach to Smart Metering.
Proceedings of the Advances in Security of Information and Communication Networks, 2013

A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
A Water-Filling Based Scheduling Algorithm for the Smart Grid.
IEEE Trans. Smart Grid, 2012

Dempster-Shafer Evidence Combining for (Anti)-Honeypot Technologies.
Inf. Secur. J. A Glob. Perspect., 2012

Cryptanalysis of a <i>GL</i>(<i>r</i>, <i>Z<sub>n</sub></i>)-Based Public Key System.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Boomerang and Slide-Rotational Analysis of the SM3 Hash Function.
IACR Cryptol. ePrint Arch., 2012

Mining criminal networks from unstructured text documents.
Digit. Investig., 2012

Fault analysis of the NTRUSign digital signature scheme.
Cryptogr. Commun., 2012

Cryptanalysis of a key exchange protocol based on the endomorphisms ring End (ℤ<sub>p</sub> × ℤ<sub>p<sup>2</sup></sub>).
Appl. Algebra Eng. Commun. Comput., 2012

Boomerang and Slide-Rotational Analysis of the SM3 Hash Function.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Cryptanalysis of the Loiss Stream Cipher.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

On the Sosemanuk Related Key-IV Sets.
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012

A game theoretic investigation for high interaction honeypots.
Proceedings of IEEE International Conference on Communications, 2012

An Obfuscated Implementation of RC4.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

On the Weak State in GGHN-like Ciphers.
Proceedings of the Seventh International Conference on Availability, 2012

A Scan-Based Side Channel Attack on the NTRUEncrypt Cryptosystem.
Proceedings of the Seventh International Conference on Availability, 2012

2011
On the sliding property of SNOW 3 G and SNOW 2.0.
IET Inf. Secur., 2011

Cooperative relaying protocol for energy-constrained ad hoc networks.
IET Commun., 2011

Cryptanalysis of a Public Key Encryption Scheme Using Ergodic Matrices.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Fault Analysis of the NTRUEncrypt Cryptosystem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Cryptanalysis of a quadratic knapsack cryptosystem.
Comput. Math. Appl., 2011

Comments on the security of Chen's authenticated encryption scheme.
Comput. Electr. Eng., 2011

Differential Fault Analysis of Hummingbird.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Towards discovering criminal communities from textual data.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Differential Fault Analysis of Sosemanuk.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

2010
A Channel-Estimation and Data-Detection Scheme for Multiuser MIMO-CDMA Systems in Fading Channels.
IEEE Trans. Veh. Technol., 2010

EM-Based Joint Channel Estimation and Data Detection for MIMO-CDMA Systems.
IEEE Trans. Veh. Technol., 2010

Improved channel access protocol for cooperative ad hoc networks.
IET Commun., 2010

Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes.
IEICE Trans. Inf. Syst., 2010

Applications of SAT Solvers to AES key Recovery from Decayed Key Schedule Images.
IACR Cryptol. ePrint Arch., 2010

Speaker recognition from encrypted VoIP communications.
Digit. Investig., 2010

Cryptanalysis of Boolean permutation-based key escrow scheme.
Comput. Electr. Eng., 2010

On the structural weakness of the GGHN stream cipher.
Cryptogr. Commun., 2010

A Bilinear Pairing Based Hidden-Signature Scheme.
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2010

EM Channel Estimation and Data Detection for MIMO-CDMA Systems over Slow-Fading Channels.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

On the analysis of the Zeus botnet crimeware toolkit.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

A framework to strengthen password authentication using mobile devices and browser extensions.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2010

On the security of image encryption schemes based on Multiple Parameters Transforms.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2010

A New Rate Control Technique for cdma2000 1xEV.
Proceedings of the Global Communications Conference, 2010

Joint Iterative Channel Estimation and Data Detection for MIMO-CDMA Systems over Frequency-Selective Fading Channels.
Proceedings of the Global Communications Conference, 2010

Differential Fault Analysis of HC-128.
Proceedings of the Progress in Cryptology, 2010

2009
On the Existence of (10, 2, 7, 488) Resilient Functions.
IEEE Trans. Inf. Theory, 2009

Cryptanalysis of a knapsack-based probabilistic encryption scheme.
Inf. Sci., 2009

BER analysis of space-time diversity in CDMA systems over frequency-selective fading channels.
IET Commun., 2009

A new distinguishing and key recovery attack on NGG stream cipher.
Cryptogr. Commun., 2009

A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Differential Fault Analysis of Rabbit.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

A rotary PIN entry scheme resilient to shoulder-surfing.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

On Reducing Blocking Probability in Cooperative Ad-hoc Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Performance of Superimposed Training-Based Channel Estimation in MIMO-CDMA Systems.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Performance of a MANET directional MAC protocol with angle-of-arrival estimation.
Wirel. Commun. Mob. Comput., 2008

An Attack Against the Revised Murthy-Swamy Cryptosystem.
IEEE Trans. Circuits Syst. II Express Briefs, 2008

On the Security of a Cryptosystem Based on Multiple-Parameters Discrete Fractional Fourier Transform.
IEEE Signal Process. Lett., 2008

Cryptanalysis of the parameterized improved fast encryption algorithm for multimedia.
IEEE Commun. Lett., 2008

Joint Decorrelating Channel and Data Estimation for Space-Time Spreading Systems.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

A Related-Key Attack on TREYFER.
Proceedings of the Second International Conference on Emerging Security Information, 2008

2007
A Comment on "Cryptographic Applications of Brahmagupta-Bhãskara Equation".
IEEE Trans. Circuits Syst. I Regul. Pap., 2007

Space-time spreading and diversity in asynchronous CDMA systems over frequency-selective fading channels.
Proceedings of the 9th International Symposium on Signal Processing and Its Applications, 2007

Incremental Hessian Locally Linear Embedding algorithm.
Proceedings of the 9th International Symposium on Signal Processing and Its Applications, 2007

ESPRIT-Based Directional MAC Protocol for Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2007

Performance of Space-Time Diversity in CDMA Over Frequency-Selective Fading Channels.
Proceedings of the Global Communications Conference, 2007

Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
On the existence of (9, 3, 5, 240) resilient functions.
IEEE Trans. Inf. Theory, 2006

On linear complexity of sequences over <i>GF</i>(2<sup><i>n</i></sup>).
Theor. Comput. Sci., 2006

On some probabilistic approximations for AES-like s-boxes.
Discret. Math., 2006

AIS TLS-ESPRIT feature selection for prostate tissue characterization.
Proceedings of the Medical Imaging 2006: Image Processing, 2006

Prostate Tissue Characterization Using TRUS Image Spectral Features.
Proceedings of the Image Analysis and Recognition, Third International Conference, 2006

Artificial life feature selection techniques for spam e-mail filters.
Proceedings of the Second IASTED International Conference on Computational Intelligence, 2006

Performance of Directional MAC Protocols in Ad-Hoc Networks over Fading Channels.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Cryptanalysis of Simple Substitution Ciphers Using Particle Swarm Optimization.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

On Some Feature Selection Strategies for Spam Filter Design.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

On the Use of Spectral Clustering for Prostate Tissue Characterization.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

2005
Affine equivalence in the AES round function.
Discret. Appl. Math., 2005

Artificial Life Feature Selection Techniques for Prostrate Cancer Diagnosis Using TRUS Images.
Proceedings of the Image Analysis and Recognition, Second International Conference, 2005

2003
Comments on the security of fast encryption algorithm for multimedia (FEA-M).
IEEE Trans. Consumer Electron., 2003

2002
Cryptographic properties of the Welch-Gong transformation sequence generators.
IEEE Trans. Inf. Theory, 2002

On Some Algebraic Structures in the AES Round Function.
IACR Cryptol. ePrint Arch., 2002

2001
Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem.
Proceedings of the Progress in Cryptology, 2001

Hyper-bent Functions.
Proceedings of the Advances in Cryptology, 2001

Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

On Welch-Gong Transformation Sequence Generators.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

On the Interpolation Attacks on Block Ciphers.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

1996
Comment on "Bounds on the Number of Functions Satisfying the Strict Avalanche Criterion".
Inf. Process. Lett., 1996

1995
Resistance of Balanced s-Boxes to Linear and Differential Cryptanalysis.
Inf. Process. Lett., 1995

Information Leakage of a Randomly Selected Boolean Function.
Proceedings of the Information Theory and Applications II, 1995


  Loading...