Mohamed Hamdi

According to our database1, Mohamed Hamdi authored at least 129 papers between 2001 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Secure Emergency Framework in an IoT Based Patient Monitoring System.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

An Authentication Protocol for Healthcare Application: A Case Study of a Diabetic Patient.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
Keynote Speaker 4: Introducing Homomorphic Encryption in Blockchain-enabled Applications.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022

Safety Issues Investigation in Deep Learning Based Chatbots Answers to Medical Advice Requests.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

2021
A novel energy-efficient encryption algorithm for secure data in WSNs.
J. Supercomput., 2021

An Efficient and Privacy-Preserving Billing Protocol for Smart Metering.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Context-aware access control and anonymous authentication in WBAN.
Comput. Secur., 2020

2019
An identity-based cryptographic scheme for cloud storage applications.
Int. J. Grid Util. Comput., 2019

Game-based adaptive anomaly detection in wireless body area networks.
Comput. Networks, 2019

At the cross roads of lattice-based and homomorphic encryption to secure data aggregation in smart grid.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

A novel Approach for Privacy-Preserving Data Aggregation in Smart Grid.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

A new vehicular blackbox architecture based on searchable encryption.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

LTE QoS Parameters Prediction Using Multivariate Linear Regression Algorithm.
Proceedings of the 22nd Conference on Innovation in Clouds, 2019

WCDMA Mean User Throughput Prediction Using Linear Regression Algorithm.
Proceedings of the 22nd Conference on Innovation in Clouds, 2019

A New Trust Architecture for Smart Vehicular Systems.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Context-Aware Adaptive Authentication and Authorization in Internet of Things.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
IoT Based Tracking System For Supply Chain Management.
Proceedings of the 6th International Conference on Wireless Networks and Mobile Communications, 2018

Privacy Preserving Profile Matching Protocol for Human-Centric Social Internet of Things.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

A Key Management Scheme for IoT-Based Video Surveillance Systems Based on Fingerprints.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

A Fair Resource Allocation Approach in Cloud Computing Environments.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

Secured Distributed IoT Based Supply Chain Architecture.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

Biometric-based Per-Packet Authentication Techniques in Communication Networks.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

A Privacy-Preserving Scheme Using Chaos Theory for Wireless Body Area Network.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Adaptive Anonymous Authentication for Wearable Sensors in Wireless Body Area Networks.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Game-Based Adaptive Risk Management in Wireless Body Area Networks.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

An infrastructurless vehicle blackbox system.
Proceedings of the International Conference on Internet of Things, 2018

Context-Aware Authorization and Anonymous Authentication in Wireless Body Area Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Game-Based Adaptive Remote Access VPN for IoT: Application to e-Health.
Proceedings of the IEEE Global Communications Conference, 2018

A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2018

A stochastic game for adaptive security in constrained wireless body area networks.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

Chaotic Cryptosystems for Multimedia Transmission Opportunities, Challenge and Limitations.
Proceedings of the 15th International Multi-Conference on Systems, Signals & Devices, 2018

Security of RFID Based Internet of Things Applications: Requirements and Open Issues.
Proceedings of the 15th International Multi-Conference on Systems, Signals & Devices, 2018

2017
Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors.
Proceedings of the SCSS 2017, 2017

Scenario-based Vulnerability Analysis in IoT-based Patient Monitoring System.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

A privacy-preserving homomorphic encryption scheme for the Internet of Things.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Energy consumption comparison for mobile video streaming encryption algorithm.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Adaptive encryption for real time mobile multimedia services.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

A new biometric-based security framework for cloud storage.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

A secure data storage based on revocation game-theoretic approaches in cloud computing environments.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

A novel adaptive streaming approach for cloud-based mobile video games.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

A novel privacy technique for Augmented Reality cloud gaming based on image authentication.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Context aware middleware for RFID based pharmaceutical supply chain.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Video streaming strategy based on feedback control loop theory in cloud platform.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

Adaptive risk treatment for cloud computing based on Markovian game.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

A new architecture for supply-chain management.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Adaptive Risk Management Framework for Cloud Computing.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Image compression with optimal traversal using wavelet and percolation theories.
Proceedings of the 24th International Conference on Software, 2016

A New Authentication Scheme for Cloud-based Storage Applications.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

AIDF: An identity as a service framework for the cloud.
Proceedings of the 2016 International Symposium on Networks, Computers and Communications, 2016

Chaotic construction of cryptographic keys based on biometric data.
Proceedings of the International Conference on High Performance Computing & Simulation, 2016

Secure data aggregation with homomorphic primitives in wireless sensor networks: A critical survey and open research issues.
Proceedings of the 13th IEEE International Conference on Networking, Sensing, and Control, 2016

On video stream encryption efficiency for mobile cloud system.
Proceedings of the 5th International Conference on Multimedia Computing and Systems, 2016

A new group Diffie-Hellman key generation proposal for secure VANET communications.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

A new security games based reaction algorithm against DOS attacks in VANETs.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

Real-Time User Experience Evaluation for Cloud-Based Mobile Video.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

A Novel Algorithm for Securing Data Aggregation in Wireless Sensor Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 15th International Conference, 2016

2015
An overview on coalitional game-theoretic approaches for resource allocation in cloud computing architectures.
Int. J. Cloud Comput., 2015

Toward Quality of Experience models of cloud-based mobile services.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

A novel efficient approach for protecting integrity of data aggregation in wireless sensor networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Recent advances in cryptographic solutions for vehicular networks.
Proceedings of the International Symposium on Networks, Computers and Communications, 2015

Energy efficient key management scheme for clustered hierarchical wireless sensor networks.
Proceedings of the 12th IEEE International Conference on Networking, Sensing and Control, 2015

A fuzzy UV-disparity based approach for following a leader mobile robot.
Proceedings of the International Conference on Advanced Robotics, 2015

2014
Survey on VANET security challenges and possible cryptographic solutions.
Veh. Commun., 2014

A multi-attribute decision model for intrusion response system.
Inf. Sci., 2014

A Fuzzy UV-disparity based approach for obstacles avoidance.
Proceedings of the International Conference on Systems, Signals and Image Processing, 2014

Forensic investigation in Mobile Cloud environment.
Proceedings of the International Symposium on Networks, Computers and Communications, 2014

Game-based adaptive security in the Internet of Things for eHealth.
Proceedings of the IEEE International Conference on Communications, 2014

A revocation game model for secure cloud storage.
Proceedings of the International Conference on High Performance Computing & Simulation, 2014

A Coalitional Game-Theoretic Approach for QoS-Based and Secure Data Storage in Cloud Environment.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

A Novel Approach for Fair and Secure Resource Allocation in Storage Cloud Architectures Based on DRF Mechanism.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

2013
A Comparative Study on Game Theoretic Approaches for Resource Allocation in Cloud Computing Architectures.
Proceedings of the 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2013

Adaptive security and privacy management for the internet of things (ASPI 2013).
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Secure cooperative physical-layer coding for the internet of things.
Proceedings of the International Workshop on Adaptive Security, 2013

A testbed for adaptive security for IoT in eHealth.
Proceedings of the International Workshop on Adaptive Security, 2013

2012
Unifying identity management for fourth generation wireless networks.
IET Commun., 2012

Web Services in Multimedia Communication.
Adv. Multim., 2012

A Dynamic Distributed Key Tunneling Protocol for Heterogeneous Wireless Sensor Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Space vector pulse width modulation of multilevel inverters: A new method for selecting the appropriate small hexagon.
Proceedings of the 38th Annual Conference on IEEE Industrial Electronics Society, 2012

Security of cloud computing, storage, and networking.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

2011
Coverage Assessment and Target Tracking in 3D Domains.
Sensors, 2011

Evolutionary strategies for non-uniform deployment in wireless sensor networks.
Int. J. Commun. Networks Distributed Syst., 2011

Game theory and iterated Voronoi diagrams for self-organized Wireless Sensor Networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

2010
Contention Resolution for Transmission Control Protocol over Optical Burst-Switching Networks Using Random Segment Dropping.
Simul., 2010

Content-based network filtering of encrypted image data.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

A new tracking-aware gossiping scheme for Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Secure Wearable and Implantable Body Sensor Networks in Hazardous Environments.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010

A Novel Modular Black-box Architecture for Secure Vehicular Networks.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010

Mobility and Security Models for Wireless Sensor Networks using Voronoi Tessellations.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010

Optimizing area coverage in Wireless Sensor Networks.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

On the impact of irregular radio propagation on coverage control and sleep scheduling in wireless sensor networks.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

2009
Multi-target Tracking Using Wireless Sensor Networks Based on Higher-Order Voronoi Diagrams.
J. Networks, 2009

Multilayer Statistical Intrusion Detection in Wireless Networks.
EURASIP J. Adv. Signal Process., 2009

Coverage control and irregular radio propagation in eireless sensor networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

A new genetic algorithm approach for intrusion response system in computer networks.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

A public key algorithm for optical communication based on lattice cryptography.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Efficient coverage criterion for accurate target tracking using cooperative wireless sensor networks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

A platform for secure multi-service vehicular communication.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

An image-based tracking algorithm for hybrid Wireless Sensor Networks using epipolar geometry.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

A Progressive Chaotic MPEG-4 Video Encryption Scheme for Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2009

Efficient Resource Reservation for Optical Burst Switching Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

A Dynamic Mobile Grid System for 4G Networks.
Proceedings of the Grid and Distributed Computing, 2009

ReAlSec: A Relational Language for Advanced Security Engineering.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

Intrusion-tolerant framework for heterogeneous Wireless Sensor Networks.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

2008
Bandwidth-Effective Design of a Satellite-Based Hybrid Wireless Sensor Network for Mobile Target Detection and Tracking.
IEEE Syst. J., 2008

Heterogeneous Security Policy Validation: From Formal to Executable Specifications.
J. Networks, 2008

WHOMoVeS: An optimized broadband sensor network for military vehicle tracking.
Int. J. Commun. Syst., 2008

Energy-Efficient Routing in Wireless Sensor Networks Using Probabilistic Strategies.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Fault Analysis Attack on an FPGA AES Implementation.
Proceedings of the NTMS 2008, 2008

Voronoi-Based Sensor Network Engineering for Target Tracking Using Wireless Sensor Networks.
Proceedings of the NTMS 2008, 2008

Four dimensional chaotic ciphers for secure image transmission.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

An elliptic threshold signature framework for k-security in wireless sensor networks.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008

Chaotic Progressive Access Control for JPEG2000 Images Repositories.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

DPRMM: A Novel Coverage-Invariant Mobility Model for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Automated Intrusion Response System: Surveys and Analysis.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
A decisional framework system for computer network intrusion detection.
Eur. J. Oper. Res., 2007

Detecting Denial-of-Service attacks using the wavelet transform.
Comput. Commun., 2007

Security policy validation using temporal executable specifications.
Proceedings of the IEEE International Conference on Systems, 2007

Structuring a Multi-violation Detectors Database for an Efficient Intrusion Detection.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

Doppler Effect on Location-Based Tracking in Mobile Sensor Networks.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

Sensor Activity Scheduling for Efficient WSN-based Tracking.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

2006
Designing a Wireless Sensor Network for Mobile Target Localization and Tracking.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Towards a Relational Calculus for Security Library Management.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Computer and network security risk management: theory, challenges, and countermeasures.
Int. J. Commun. Syst., 2005

Detecting distributed computer network attacks: A multi-dimensional wavelet approach.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

2004
Collective computer incident response using cognitive maps.
Proceedings of the IEEE International Conference on Systems, 2004

An Abstract Reduction Model for Computer Security Risk.
Proceedings of the Security and Protection in Information Processing Systems, 2004

2003
Algebraic specification of network security risk management.
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003

2002
Vector-lifting schemes for lossless coding and progressive archival of multispectral images.
IEEE Trans. Geosci. Remote. Sens., 2002

2001
Lossless coding for progressive archival of multispectral images.
Proceedings of the IEEE International Conference on Acoustics, 2001


  Loading...