Walid I. Khedr

Orcid: 0000-0002-4707-0861

Affiliations:
  • Zagazig University, Egypt


According to our database1, Walid I. Khedr authored at least 14 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
FMDADM: A Multi-Layer DDoS Attack Detection and Mitigation Framework Using Machine Learning for Stateful SDN-Based IoT Networks.
IEEE Access, 2023

2020
Prediction-based secured handover authentication for mobile cloud computing.
Wirel. Networks, 2020

A novel Bloom-filter-based scheme for secure text ownership protection.
Wirel. Networks, 2020

A Lightweight Android Malware Classifier Using Novel Feature Selection Methods.
Symmetry, 2020

A new efficient and configurable image encryption structure for secure transmission.
Multim. Tools Appl., 2020

An Efficient Neural Network-Based Prediction Scheme for Heterogeneous Networks.
Int. J. Sociotechnology Knowl. Dev., 2020

2019
Cryptographic Accumulator-Based Scheme for Critical Data Integrity Verification in Cloud Storage.
IEEE Access, 2019

2018
Improved keylogging and shoulder-surfing resistant visual two-factor authentication protocol.
J. Inf. Secur. Appl., 2018

Robust image hashing using exact Gaussian-Hermite moments.
IET Image Process., 2018

Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication.
Circuits Syst. Signal Process., 2018

2016
Improved Lightweight Authentication Scheme for IEEE 802.11p Vehicle-to-Infrastructure Communication.
Ad Hoc Sens. Wirel. Networks, 2016

2015
Enhanced inter-access service network handover authentication scheme for IEEE 802.16m network.
IET Inf. Secur., 2015

2014
On the Security of Moessner's and Khan's Authentication Scheme for Passive EPCglobal C1G2 RFID Tags.
Int. J. Netw. Secur., 2014

2009
Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks.
Proceedings of the SECRYPT 2009, 2009


  Loading...