Essam Ghadafi
Orcid: 0000-0003-4897-0180
According to our database1,
Essam Ghadafi
authored at least 33 papers
between 2009 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Cybersecurity Threats in Saudi Healthcare: Exploring Email Communication Practices to Enhance Cybersecurity Among Healthcare Employees in Saudi Arabia.
Comput., 2025
2024
A Survey on Emerging Blockchain Technology Platforms for Securing the Internet of Things.
Future Internet, August, 2024
Privacy-Preserving Mutual Authentication Protocol With Forward Secrecy for IoT-Edge-Cloud.
IEEE Internet Things J., 2024
2023
Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification.
J. Inf. Secur. Appl., 2023
2022
Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey.
J. Cybersecur. Priv., March, 2022
IEEE Access, 2022
2021
Adventures of a Light Blockchain Protocol in a Forest of Transactions: A Subset of a Story.
IEEE Access, 2021
Feature Vulnerability and Robustness Assessment against Adversarial Machine Learning Attacks.
Proceedings of the International Conference on Cyber Situational Awareness, 2021
Proceedings of the Applied Cryptography and Network Security, 2021
2019
Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019
2017
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017
How Low Can You Go? Short Structure-Preserving Signatures for Diffie-Hellman Vectors.
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
More Efficient Structure-Preserving Signatures - Or: Bypassing the Type-III Lower Bounds.
Proceedings of the Computer Security - ESORICS 2017, 2017
Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016
Proceedings of the Applied Cryptography and Network Security, 2016
2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions.
Proceedings of the Topics in Cryptology, 2015
2014
Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
2013
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
Formalizing Group Blind Signatures and Practical Constructions without Random Oracles.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
Proceedings of the Information Security - 15th International Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
2010
2009
Proceedings of the Cryptography and Coding, 2009