Maged Hamada Ibrahim

According to our database1, Maged Hamada Ibrahim authored at least 15 papers between 2005 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Attribute-based authentication on the cloud for thin clients.
The Journal of Supercomputing, 2018

Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors.
Telecommunication Systems, 2018

2017
SecureCoin: A Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem.
I. J. Network Security, 2017

Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks.
Computer Networks, 2017

2016
Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks.
Security and Communication Networks, 2016

Octopus: An Edge-fog Mutual Authentication Scheme.
I. J. Network Security, 2016

Secure anonymous mutual authentication for star two-tier wireless body area networks.
Computer Methods and Programs in Biomedicine, 2016

2012
A Novel Approach to Fully Private and Secure Auction: A Sealed Bid Knapsack Auction
CoRR, 2012

2009
Resisting Traitors in Linkable Democratic Group Signatures.
I. J. Network Security, 2009

Receiver-deniable Public-Key Encryption.
I. J. Network Security, 2009

Efficient Dealer-Less Threshold Sharing of Standard RSA.
I. J. Network Security, 2009

A Method for Obtaining Deniable Public-Key Encryption.
I. J. Network Security, 2009

2008
Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing.
I. J. Network Security, 2008

2006
Two-Party Private Vector Dominance: The All-Or-Nothing Deal.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

2005
Verifiable Threshold Sharing of a Large Secret Safe-Prime.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005


  Loading...