Heba K. Aslan

Orcid: 0000-0002-0821-5378

Affiliations:
  • Nile University, Giza, Egypt


According to our database1, Heba K. Aslan authored at least 32 papers between 1995 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks.
Cryptogr., March, 2024

Networking and cryptography library with a non-repudiation flavor for blockchain.
J. Comput. Virol. Hacking Tech., 2024

Lightweight Computational Complexity Stepping Up the NTRU Post-Quantum Algorithm Using Parallel Computing.
Symmetry, 2024

2023
New weighted BERT features and multi-CNN models to enhance the performance of MOOC posts classification.
Neural Comput. Appl., August, 2023

Smart Automotive Diagnostic and Performance Analysis Using Blockchain Technology.
J. Sens. Actuator Networks, April, 2023

Intrusion Detection for Electric Vehicle Charging Systems (EVCS).
Algorithms, February, 2023

2022
Cross-Layer Distributed Attack Detection Model for the IoT.
Int. J. Ambient Comput. Intell., 2022

An IoT Privacy-Oriented selective disclosure credential system.
J. Cybersecur., 2022

Ibn Sina: A patient privacy-preserving authentication protocol in medical internet of things.
Comput. Secur., 2022

2021
DADEM: Distributed Attack Detection Model Based on Big Data Analytics for the Enhancement of the Security of Internet of Things (IoT).
Int. J. Ambient Comput. Intell., 2021

2020
A novel deep learning framework for copy-moveforgery detection in images.
Multim. Tools Appl., 2020

2018
Accelerating Digital Forensics through Parallel Computing.
J. Comput. Sci., 2018

New Generic Design to Expedite Asymmetric Cryptosystems Using Three-levels of Parallelism.
Int. J. Netw. Secur., 2018

2015
A Design of a Fast Parallel-Pipelined Implementation of AES: Advanced Encryption Standard.
CoRR, 2015

Structured Design Approach for an Optimal Programmable Synchronous Security Processor.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

2013
On the security of two improved authenticated encryption schemes.
Int. J. Secur. Networks, 2013

Design of a High Performance Implementation of a Tree-Based Multicast Key Distribution Protocol.
Int. J. Netw. Secur., 2013

A new multicast authentication protocol using erasure code functions and signcryption techniques.
Proceedings of the 2013 World Congress on Internet Security, 2013

2012
Efficient Design for the Implementation of Wong-Lam Multicast Authentication Protocol Using Two-Levels of Parallelism
CoRR, 2012

2011
New Real Time Multicast Authentication Protocol.
Int. J. Netw. Secur., 2011

2009
A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach.
Int. J. Netw. Secur., 2009

2008
WiMax Security.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2005
Two-level controllers hierarchy for a scalable and distributed multicast security protocol.
Comput. Secur., 2005

2004
A hybrid scheme for multicast authentication over lossy networks.
Comput. Secur., 2004

A scalable and distributed multicast security protocol using a subgroup-key hierarchy.
Comput. Secur., 2004

Logical analysis of AUTHMAC_DH: a new protocol for authentication and key distribution.
Comput. Secur., 2004

2003
AUTHMAC_DH: A New Protocol for Authentication and Key Distribution.
Proceedings of the Communications and Multimedia Security, 2003

2002
A Detection Scheme for the SK Virus.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

1999
Performance Evaluation of a New Hybrid Encryption Protocol for Authentication and Key Distribution.
Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 1999

1997
Performance analysis of the Kerberos protocol in a distributed environment.
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997

1996
A new hybrid encryption scheme for computer networks.
Proceedings of the Information Systems Security, 1996

1995
Implementation of a hybrid encryption scheme for Ethernet.
Proceedings of the Proceedings IEEE Symposium on Computers and Communications, 1995


  Loading...