Zaid Alaa Hussien

Orcid: 0000-0002-4852-9785

According to our database1, Zaid Alaa Hussien authored at least 14 papers between 2015 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Web application database protection from SQLIA using permutation encoding.
Proceedings of the ICISS 2021: The 4th International Conference on Information Science and Systems, 2021

2020
Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System.
IEEE Access, 2020

Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud.
Proceedings of the IEEE International Conference on Signal Processing, 2020

2019
EEIRI: Efficient Encrypted Image Retrieval in IoT-Cloud.
KSII Trans. Internet Inf. Syst., 2019

An Efficient and Secure Scheme for Dynamic Shared Data in Cloud.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019

2018
Efficient encrypted image retrieval in IoT-cloud with multi-user authentication.
Int. J. Distributed Sens. Networks, 2018

2017
Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing.
Secur. Commun. Networks, 2017

2016
Privacy-Preserving Image Retrieval in IoT-Cloud.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Robust scheme to protect authentication code of message/image documents in cloud computing.
Proceedings of the 2016 International Conference on Computing, 2016

Towards Secure Private Image Matching.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016

Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2015
Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015


  Loading...