Imed El Fray

Orcid: 0000-0002-3060-488X

Affiliations:
  • West Pomeranian University of Technology, Szczecin, Poland


According to our database1, Imed El Fray authored at least 21 papers between 2005 and 2022.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
User Authentication Protocol Based on the Location Factor for a Mobile Environment.
IEEE Access, 2022

A new approach to the NFC payment authorization performed on the user's application side.
Proceedings of the 26th Pacific Asia Conference on Information Systems, 2022

2021
Concept of an electronic form based on XML that ensures a high level of interoperability and security.
Proceedings of the 25th Pacific Asia Conference on Information Systems, 2021

2020
New XML Signature Scheme That is Resistant to Some Attacks.
IEEE Access, 2020

Towards Most Efficient Method for Untimed Security Protocols Verification.
Proceedings of the 24th Pacific Asia Conference on Information Systems, 2020

Securing Event Logs with Blockchain for IoT.
Proceedings of the Computer Information Systems and Industrial Management, 2020

2019
Multifactor Authentication Protocol in a Mobile Environment.
IEEE Access, 2019

2018
Model of Secure Data Storage in the Cloud for Mobile Devices.
Proceedings of the Computer Information Systems and Industrial Management, 2018

Electronic Document Interoperability in Transactions Executions.
Proceedings of the Advances in Soft and Hard Computing, 2018

2017
Load-balanced Integrated Information Security Monitoring System.
Proceedings of the Communication Papers of the 2017 Federated Conference on Computer Science and Information Systems, 2017

The Implementation of Electronic Document in Transaction Execution.
Proceedings of the Computer Information Systems and Industrial Management, 2017

2016
An Electronic Document for Distributed Electronic Services.
Proceedings of the Computer Information Systems and Industrial Management, 2016

Data Scheme Conversion Proposal for Information Security Monitoring Systems.
Proceedings of the Hard and Soft Computing for Artificial Intelligence, 2016

2015
Verification of Mutual Authentication Protocol for MobInfoSec System.
Proceedings of the Computer Information Systems and Industrial Management, 2015

2014
Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile Devices.
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014

Protection Profile for Secure Sensitive Information System on Mobile Devices.
Proceedings of the Computer Information Systems and Industrial Management, 2014

2012
Long-term preservation of digital signatures for multiple groups of related documents.
IET Inf. Secur., 2012

A Comparative Study of Risk Assessment Methods, MEHARI & CRAMM with a New Formal Model of Risk Assessment (FoMRA) in Information Systems.
Proceedings of the Computer Information Systems and Industrial Management, 2012

2007
Deniable File System--Application of Deniable Storage to Protection of Private Keys.
Proceedings of the 6th International Conference on Computer Information Systems and Industrial Management Applications, 2007

2005
Some methods of the analysis and risk assessment in the PKI system services providers.
Proceedings of the Enhanced Methods in Computer Security, 2005

Integrated Payment System for Public Key Infrastructure Services.
Proceedings of the Enhanced Methods in Computer Security, 2005


  Loading...