Essam Ghadafi

Orcid: 0000-0003-4897-0180

According to our database1, Essam Ghadafi authored at least 33 papers between 2009 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
UK Finfluencers: Exploring Content, Reach, and Responsibility.
CoRR, May, 2025

Cybersecurity Threats in Saudi Healthcare: Exploring Email Communication Practices to Enhance Cybersecurity Among Healthcare Employees in Saudi Arabia.
Comput., 2025

2024
A Survey on Emerging Blockchain Technology Platforms for Securing the Internet of Things.
Future Internet, August, 2024

Privacy-Preserving Mutual Authentication Protocol With Forward Secrecy for IoT-Edge-Cloud.
IEEE Internet Things J., 2024

2023
Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification.
J. Inf. Secur. Appl., 2023

2022
Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey.
J. Cybersecur. Priv., March, 2022

Leveraging Patient Information Sharing Using Blockchain-Based Distributed Networks.
IEEE Access, 2022

2021
Adventures of a Light Blockchain Protocol in a Forest of Transactions: A Subset of a Story.
IEEE Access, 2021

Feature Vulnerability and Robustness Assessment against Adversarial Machine Learning Attacks.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More.
Proceedings of the Applied Cryptography and Network Security, 2021

2019
Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019

2017
Attribute-Based Signatures with User-Controlled Linkability Without Random Oracles.
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017

Subset Signatures with Controlled Context-Hiding.
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017

How Low Can You Go? Short Structure-Preserving Signatures for Diffie-Hellman Vectors.
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017

Efficient Round-Optimal Blind Signatures in the Standard Model.
Proceedings of the Financial Cryptography and Data Security, 2017

More Efficient Structure-Preserving Signatures - Or: Bypassing the Type-III Lower Bounds.
Proceedings of the Computer Security - ESORICS 2017, 2017

Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Short Structure-Preserving Signatures.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

Foundations of Fully Dynamic Group Signatures.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Short Accountable Ring Signatures Based on DDH.
Proceedings of the Computer Security - ESORICS 2015, 2015

Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions.
Proceedings of the Topics in Cryptology, 2015

2014
Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

Decentralized Traceable Attribute-Based Signatures.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Attribute-Based Signatures with User-Controlled Linkability.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2013
Sub-linear Blind Ring Signatures without Random Oracles.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

Efficient Signatures of Knowledge and DAA in the Standard Model.
Proceedings of the Applied Cryptography and Network Security, 2013

Formalizing Group Blind Signatures and Practical Constructions without Random Oracles.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Efficient Two-Move Blind Signatures in the Common Reference String Model.
Proceedings of the Information Security - 15th International Conference, 2012

2011
Practical privacy-preserving cryptographic protocols.
PhD thesis, 2011

Anonymous attestation with user-controlled linkability.
IACR Cryptol. ePrint Arch., 2011

2010
Groth-Sahai Proofs Revisited.
Proceedings of the Public Key Cryptography, 2010

2009
Practical Zero-Knowledge Proofs for Circuit Evaluation.
Proceedings of the Cryptography and Coding, 2009


  Loading...