Hassan N. Noura

Orcid: 0000-0003-1768-9193

Affiliations:
  • University of Franche-Comté, Institut FEMTO-ST, France
  • American University of Beirut (AUB), Department of Electrical and Computer Engineering, Lebanon (former)


According to our database1, Hassan N. Noura authored at least 111 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Simultaneous encryption and authentication of messages over GPUs.
Multim. Tools Appl., January, 2024

Efficient Communication Protocol for Programmable Matter.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
The internet of modular robotic things: Issues, limitations, challenges, & solutions.
Internet Things, October, 2023

Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms.
J. Inf. Secur. Appl., August, 2023

Homomorphic additive lightweight block cipher scheme for securing IoT applications.
J. Inf. Secur. Appl., August, 2023

LESCA: LightwEight Stream Cipher Algorithm for emerging systems.
Ad Hoc Networks, 2023

A deep learning scheme for efficient multimedia IoT data compression.
Ad Hoc Networks, 2023

2022
LoRCA: Lightweight round block and stream cipher algorithms for IoV systems.
Veh. Commun., 2022

DKEMA: GPU-based and dynamic key-dependent efficient message authentication algorithm.
J. Supercomput., 2022

ORSCA-GPU: one round stream cipher algorithm for GPU implementation.
J. Supercomput., 2022

An efficient and secure cipher scheme for MIMO-OFDM systems based on physical layer security.
Telecommun. Syst., 2022

Towards a fully homomorphic symmetric cipher scheme resistant to plain-text/cipher-text attacks.
Multim. Tools Appl., 2022

Novel one round message authentication scheme for constrained IoT devices.
J. Ambient Intell. Humaniz. Comput., 2022

Network coding and MPTCP: Enhancing security and performance in an SDN environment.
J. Inf. Secur. Appl., 2022

Efficient binary diffusion matrix structures for dynamic key-dependent cryptographic algorithms.
J. Inf. Secur. Appl., 2022

A Single-Pass and One-Round Message Authentication Encryption for Limited IoT Devices.
IEEE Internet Things J., 2022

Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations.
Internet Things, 2022

Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations.
Int. J. Inf. Sec., 2022

Efficient and secure selective cipher scheme for MIoT compressed images.
Ad Hoc Networks, 2022

Distributed Gateway-based Security Scheme for Guaranteeing LoRaWAN Networks Availability.
Proceedings of the 16th International Conference on Signal-Image Technology & Internet-Based Systems, 2022

A Novel Lightweight and Robust Source-Channel Coding Solution for MIoT Communication Based on DL Denoising/Super Resolution Model.
Proceedings of the 16th International Conference on Signal-Image Technology & Internet-Based Systems, 2022

Machine Learning for Physical Layer Security: Limitations, Challenges and Recommendation.
Proceedings of the 16th International Conference on Signal-Image Technology & Internet-Based Systems, 2022

An Efficient and Robust MIoT Communication Solution using a Deep Learning Approach.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

ACiS: Lightweight and Robust Homomorphic Block Cipher Additive Scheme.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

2021
TRESC: Towards redesigning existing symmetric ciphers.
Microprocess. Microsystems, November, 2021

Secure MIMO D2D communication based on a lightweight and robust PLS cipher scheme.
Wirel. Networks, 2021

Message authentication algorithm for OFDM communication systems.
Telecommun. Syst., 2021

A User-Centric Data Protection Method for Cloud Storage Based on Invertible DWT.
IEEE Trans. Cloud Comput., 2021

Efficient data confidentiality scheme for 5G wireless NOMA communications.
J. Inf. Secur. Appl., 2021

Security of Power Line Communication systems: Issues, limitations and existing solutions.
Comput. Sci. Rev., 2021

A Deep Learning Scheme for Efficient Multimedia IoT Data Compression.
CoRR, 2021

A Deep Learning Object Detection Method for an Efficient Clusters Initialization.
CoRR, 2021

Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations.
CoRR, 2021

A Survey on Ethical Hacking: Issues and Challenges.
CoRR, 2021

Efficient and robust data availability solution for hybrid PLC/RF systems.
Comput. Networks, 2021

Physical layer security for NOMA: limitations, issues, and recommendations.
Ann. des Télécommunications, 2021

Efficient and Robust Keyed Hash Function Based on Artificial Neural Networks.
Proceedings of the International Symposium on Networks, Computers and Communications, 2021

2020
Physical layer security schemes for MIMO systems: an overview.
Wirel. Networks, 2020

Efficient & secure image availability and content protection.
Multim. Tools Appl., 2020

An efficient fully homomorphic symmetric encryption algorithm.
Multim. Tools Appl., 2020

ESSENCE: GPU-based and dynamic key-dependent efficient stream cipher for multimedia contents.
Multim. Tools Appl., 2020

Cyber-physical systems security: Limitations, issues and future trends.
Microprocess. Microsystems, 2020

Towards a secure ITS: Overview, challenges and solutions.
J. Inf. Secur. Appl., 2020

Security analysis of drones systems: Attacks, limitations, and recommendations.
Internet Things, 2020

LoRaWAN security survey: Issues, threats and possible mitigation techniques.
Internet Things, 2020

Lightweight multi-factor mutual authentication protocol for IoT devices.
Int. J. Inf. Sec., 2020

Securing internet of medical things systems: Limitations, issues and recommendations.
Future Gener. Comput. Syst., 2020

Efficient and secure multi-homed systems based on binary random linear network coding.
Comput. Electr. Eng., 2020

DistLog: A distributed logging scheme for IoT forensics.
Ad Hoc Networks, 2020

Efficient and Secure Statistical Port Scan Detection Scheme.
Proceedings of the Mobile, Secure, and Programmable Networking, 2020

Overview of Efficient Symmetric Cryptography: Dynamic vs Static Approaches.
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020

Overview of Digital Forensics and Anti-Forensics Techniques.
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020

Efficient and Secure Keyed Hash Function Scheme Based on RC4 Stream Cipher.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Efficient and Secure Cipher Scheme for Limited IoT Devices.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

An Efficient and Secure Cipher Scheme for Filter Bank Multi-Carrier Systems.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Efficient and Secure Statistical DDoS Detection Scheme.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Towards Securing LoRaWAN ABP Communication System.
Proceedings of the 10th International Conference on Cloud Computing and Services Science, 2020

2019
Efficient & secure cipher scheme with dynamic key-dependent mode of operation.
Signal Process. Image Commun., 2019

A survey on OFDM physical layer security.
Phys. Commun., 2019

Efficient and secure cipher scheme for multimedia contents.
Multim. Tools Appl., 2019

Lightweight, dynamic and efficient image encryption scheme.
Multim. Tools Appl., 2019

A Physical Encryption Scheme for Low-Power Wireless M2M Devices: a Dynamic Key Approach.
Mob. Networks Appl., 2019

An Efficient OFDM-Based Encryption Scheme Using a Dynamic Key Approach.
IEEE Internet Things J., 2019

Efficient Chaotic Encryption Scheme with OFB Mode.
Int. J. Bifurc. Chaos, 2019

Design and realization of efficient & secure multi-homed systems based on random linear network coding.
Comput. Networks, 2019

Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks.
Ann. des Télécommunications, 2019

Preserving data security in distributed fog computing.
Ad Hoc Networks, 2019

A robust image-encryption approach against transmission errors in Communicating Things Networks.
Ad Hoc Networks, 2019

Lightweight Stream Cipher Scheme for Resource-Constrained IoT Devices.
Proceedings of the 2019 International Conference on Wireless and Mobile Computing, 2019

Lightweight Dynamic Key-Dependent and Flexible Cipher Scheme for IoT Devices.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

An Efficient and Secure Variant of RC4 Stream Cipher Scheme for Emerging Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Secure and Lightweight Mutual Multi-Factor Authentication for IoT Communication Systems.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Lightweight and Secure D2D Authentication & Key Management Based on PLS.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Efficient & Secure Physical Layer Cipher Scheme for VLC Systems.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Massive Planar Antenna Arrays for Physical Layer Security.
Proceedings of the Fourth International Conference on Advances in Computational Tools for Engineering Applications, 2019

2018
A new efficient lightweight and secure image cipher scheme.
Multim. Tools Appl., 2018

A dynamic approach for a lightweight and secure cipher for medical images.
Multim. Tools Appl., 2018

One round cipher algorithm for multimedia IoT devices.
Multim. Tools Appl., 2018

Securing JPEG-2000 images in constrained environments: a dynamic approach.
Multim. Syst., 2018

A secure client-side framework for protecting the privacy of health data stored on the cloud.
Proceedings of the IEEE Middle East and North Africa Communications Conference, 2018

S-DES: An efficient & secure DES variant.
Proceedings of the IEEE Middle East and North Africa Communications Conference, 2018

Efficient and Secure Physical Encryption Scheme for Low-Power Wireless M2M Devices.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

A Simple Approach for Securing IoT Data Transmitted over Multi-RATs.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

2017
Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications.
J. Inf. Secur. Appl., 2017

A Revision of a New Chaos-Based Image Encryption System: Weaknesses and Limitations.
CoRR, 2017

An Efficient Keyless Fragmentation Algorithm for Data Protection.
CoRR, 2017

Lightweight format-compliant encryption algorithm for JPEG 2000 images.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Secure and resilient scheme for data protection in unattended wireless sensor networks.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

An Efficient Secure Storage Scheme Based on Information Fragmentation.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

Design and Realization of a Fully Homomorphic Encryption Algorithm for Cloud Applications.
Proceedings of the Risks and Security of Internet and Systems, 2017

2016
An efficient and secure cipher scheme for images confidentiality preservation.
Signal Process. Image Commun., 2016

POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
A variant of Baptista's encryption scheme.
Secur. Commun. Networks, 2015

HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network.
IACR Cryptol. ePrint Arch., 2015

An integrated multimedia data reduction and content confidentiality approach for limited networked devices.
Ad Hoc Networks, 2015

ERDIA: An efficient and robust data integrity algorithm for mobile and wireless networks.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Secure and Error Resilient Approach for Multimedia Data Transmission in Constrained Networks.
Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2015

Lightweight, Dynamic, and Flexible Cipher Scheme for Wireless and Mobile Networks.
Proceedings of the Ad Hoc Networks, 2015

2014
An image encryption scheme based on irregularly decimated chaotic maps.
Signal Process. Image Commun., 2014

ERSS-RLNC: Efficient and robust secure scheme for random linear network coding.
Comput. Networks, 2014

EDCA: Efficient diffusion cipher and authentication scheme for Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

An Efficient Lightweight Security Algorithm for Random Linear Network Coding.
Proceedings of the SECRYPT 2014, 2014

COGITO: Code Polymorphism to Secure Devices.
Proceedings of the SECRYPT 2014, 2014

Efficient and Secure Visual Data Transmission Approach for Wireless Multimedia Sensor Networks.
Proceedings of the IEEE 22nd International Symposium on Modelling, 2014

2013
E3SN - Efficient Security Scheme for Sensor Networks.
Proceedings of the SECRYPT 2013, 2013

ERCA: efficient and robust cipher algorithm for LTE data confidentiality.
Proceedings of the 16th ACM International Conference on Modeling, 2013

Key dependent cipher scheme for sensor networks.
Proceedings of the 12th Annual Mediterranean Ad Hoc Networking Workshop, 2013

A New Efficient Secure Coding Scheme for Random Linear Network Coding.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

2012
Enhanced Adaptive Data Hiding in Spatial LSB Domain by using Chaotic Sequences.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

How to guarantee secured transactions with QoS and real-time constraints.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2011
An efficient and secure SPN cryptosystem based on chaotic control parameters.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011


  Loading...