Mohamed Rasslan

Orcid: 0000-0001-7459-484X

According to our database1, Mohamed Rasslan authored at least 20 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Networking and cryptography library with a non-repudiation flavor for blockchain.
J. Comput. Virol. Hacking Tech., 2024

2022
An IoT Privacy-Oriented selective disclosure credential system.
J. Cybersecur., 2022

Ibn Sina: A patient privacy-preserving authentication protocol in medical internet of things.
Comput. Secur., 2022

2021
Comments On The Cryptanalysis Of An Identity-Based Strong Designated Verifier Signature Scheme.
Proceedings of the 12th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2021) / The 11th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2021), 2021

2019
Robust Hybrid-Security Protocol for HealthCare Systems.
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019

2018
On the Security of the Sensor Cloud Security Library (SCSlib).
J. Comput. Sci., 2018

Accelerating Digital Forensics through Parallel Computing.
J. Comput. Sci., 2018

New Generic Design to Expedite Asymmetric Cryptosystems Using Three-levels of Parallelism.
Int. J. Netw. Secur., 2018

2015
A Design of a Fast Parallel-Pipelined Implementation of AES: Advanced Encryption Standard.
CoRR, 2015

2014
Implementation, Comparison, and Enhancement of Secure Communication Designs.
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014

2013
On the security of two improved authenticated encryption schemes.
Int. J. Secur. Networks, 2013

A new multicast authentication protocol using erasure code functions and signcryption techniques.
Proceedings of the 2013 World Congress on Internet Security, 2013

Identification Protocols based on Discrete Log Representation Problem.
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013

On the Security of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes.
Proceedings of the 4th International Conference on Ambient Systems, 2013

2011
A Stamped Hidden-signature Scheme Utilizing The Elliptic Curve Discrete Logarithm Problem.
Int. J. Netw. Secur., 2011

Cryptanalysis of a Public Key Encryption Scheme Using Ergodic Matrices.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Comments on the security of Chen's authenticated encryption scheme.
Comput. Electr. Eng., 2011

2010
Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes.
IEICE Trans. Inf. Syst., 2010

A Bilinear Pairing Based Hidden-Signature Scheme.
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2010

2009
A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach.
Int. J. Netw. Secur., 2009


  Loading...