Sherif El-Kassas

Affiliations:
  • Department of Computer Science and Engineering, American University in Cairo, Cairo, Egypt


According to our database1, Sherif El-Kassas authored at least 28 papers between 1989 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
Limited Proxying for Content Filtering Based on X.509 Proxy Certificate Profile.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

2011
Applying Scrum Framework in the IT Service Support Domain.
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011

2010
Formal analysis and design for engineering security automated derivation of formal software security specifications from goal-oriented security requirements.
IET Softw., 2010

An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2010

2009
Enhancement of Error Correction in Quantum Cryptography BB84 Protocol.
Egypt. Comput. Sci. J., 2009

A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks
CoRR, 2009

Security in Ad Hoc Networks: From Vulnerability to Risk Management.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Preventing Wormhole Attack in Wireless Ad Hoc Networks using Cost-based Schemes.
Proceedings of the SECRYPT 2009, 2009

Integrating Formal Analysis and Design to Preserve Security Properties.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

A Rigorous Methodology for Security Architecture Modeling and Verification.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Goal-Oriented Software Security Engineering: The Electronic Smart Card Case Study.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Formal derivation of security design specifications from security requirements.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

A rigorous methodology for security architecture modeling and verification.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

Challenges for Security Typed Web Scripting Languages Design.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

Developing a Security Typed Java Servlet.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements.
Proceedings of the The Third International Conference on Availability, 2008

A Survey on Trust and Reputation Schemes in Ad Hoc Networks.
Proceedings of the The Third International Conference on Availability, 2008

Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme.
Proceedings of the The Third International Conference on Availability, 2008

2007
Certification and Revocation Schemes in Ad Hoc Networks Survey and Challenges.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

Threshold Cryptography and Authentication in Ad Hoc Networks Survey and Challenges.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

Tracing DDoS attacks using VPNs and mobile agents.
Proceedings of the ISCA 20th International Conference on Parallel and Distributed Computing Systems, 2007

2006
Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection.
Proceedings of the SECRYPT 2006, 2006

Securing the AODV protocol using specification-based intrusion detection.
Proceedings of the Q2SWinet'06, 2006

2005
Reputed authenticated routing for ad hoc networks protocol (reputed-ARAN).
Proceedings of the 2nd ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2005

Nedgty: Web Services Firewall.
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005

2002
An Efficient Hybrid Sealed Bid Auction Protocol.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

1992
HIRG: A Model for Defining Hierarchical Visual Languages.
Proceedings of the 1992 IEEE Workshop on Visual Languages, 1992

1989
Problems and Peculiarities of Arabic Databases.
IEEE Data Eng. Bull., 1989


  Loading...