Badiea Abdulkarem Mohammed

Orcid: 0000-0003-3539-4161

According to our database1, Badiea Abdulkarem Mohammed authored at least 16 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficient Blockchain-Based Pseudonym Authentication Scheme Supporting Revocation for 5G-Assisted Vehicular Fog Computing.
IEEE Access, 2024

HAFC: Handover Authentication Scheme Based on Fog Computing for 5G-Assisted Vehicular Blockchain Networks.
IEEE Access, 2024

2023
Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing.
Sensors, April, 2023

Hybrid Techniques for Diagnosing Endoscopy Images for Early Detection of Gastrointestinal Disease Based on Fusion Features.
Int. J. Intell. Syst., 2023

FC-PA: Fog Computing-Based Pseudonym Authentication Scheme in 5G-Enabled Vehicular Networks.
IEEE Access, 2023

2022
VLMOO: A framework for benchmarking Variable-length Multiobjective Optimization problems with WSN focus.
Softw. Impacts, 2022

CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks.
Sensors, 2022

Phishing Websites Detection by Using Optimized Stacking Ensemble Model.
Comput. Syst. Sci. Eng., 2022

2021
A Lightweight Authentication With Privacy-Preserving Scheme for Vehicular Ad Hoc Networks Based on Elliptic Curve Cryptography.
IEEE Access, 2021

Optimized Stacking Ensemble Model to Detect Phishing Websites.
Proceedings of the Advances in Cyber Security - Third International Conference, 2021

Using Genetic Algorithms to Optimized Stacking Ensemble Model for Phishing Websites Detection.
Proceedings of the Advances in Cyber Security - Third International Conference, 2021

2020
An Efficient Conditional Privacy-Preserving Authentication Scheme for the Prevention of Side-Channel Attacks in Vehicular Ad Hoc Networks.
IEEE Access, 2020

Conditional Privacy-Preserving Authentication Scheme Without Using Point Multiplication Operations Based on Elliptic Curve Cryptography (ECC).
IEEE Access, 2020

Desynchronization Traveling Wave Pulse-Coupled-Oscillator Algorithm Using a Self-Organizing Scheme for Energy-Efficient Wireless Sensor Networks.
IEEE Access, 2020

A New Fast Local Laplacian Completed Local Ternary Count (FLL-CLTC) for Facial Image Classification.
IEEE Access, 2020

2013
Handoff and Route Optimization in Mobile Networks over IEEE 802.16e.
Int. J. Mob. Comput. Multim. Commun., 2013


  Loading...