Mohamed Eldefrawy

Orcid: 0000-0001-6408-5152

According to our database1, Mohamed Eldefrawy authored at least 18 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Enhancing the Security of ISO/IEC 14443-3 and 4 RFID Authentication Protocols through Formal Analysis.
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2023

2020
Guest Editorial: Security, Privacy, and Trust for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020

A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT.
IEEE Internet Things J., 2020

Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges.
IEEE Access, 2020

2019
Key Distribution Protocol for Industrial Internet of Things Without Implicit Certificates.
IEEE Internet Things J., 2019

Formal security analysis of LoRaWAN.
Comput. Networks, 2019

Dynamic User Authentication Protocol for Industrial IoT without Timestamping.
Proceedings of the 15th IEEE International Workshop on Factory Communication Systems, 2019

2018
Challenges of Securing the Industrial Internet of Things Value Chain.
Proceedings of the 2018 Workshop on Metrology for Industry 4.0 and IoT, 2018

2015
Cryptanalysis and Enhancement of a Password-Based Authentication Scheme.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

2014
The Use of Two Authentication Factors to Enhance the Security of Mass Storage Devices.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

2012
Mobile one-time passwords: two-factor authentication using mobile phones.
Secur. Commun. Networks, 2012

Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes.
Proceedings of the 2012 International Symposium on Biometrics and Security Technologies, 2012

Detecting counterfeit-money using RFID-enabled mobile devices.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2011
Secure Instant Messaging Protocol for Centralized Communication Group.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

OTP-Based Two-Factor Authentication Using Mobile Phones.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

2010
Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem.
Sensors, 2010

One-Time Password System with Infinite Nested Hash Chains.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

NMACA Approach Used to Build a Secure Message Authentication Code.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010


  Loading...