Ihab Ali
Ihab Ali
Professor, Electronics, Communications and Computers Engineering Department, Helwan University
Verified email at h-eng.helwan.edu.eg - Homepage
Title
Cited by
Cited by
Year
A robust threshold elliptic curve digital signature providing a new verifiable secret sharing scheme
MH Ibrahim, IA Ali, II Ibrahim, AH El-Sawi
2003 46th Midwest Symposium on Circuits and Systems 1, 276-280, 2003
332003
A Novel Trust-Based Cross-Layer Model for Wireless Sensor Networks
SIS Hosam A. Rahhal, Ihab A. Ali
28th NATIONAL RADIO SCIENCE CONFERENCE (NRSC 2011), 2011
202011
Efficient zero-knowledge identification scheme with secret key exchange
AM Allam, II Ibrahim, IA Ali, AEH Elsawy
2003 46th Midwest Symposium on Circuits and Systems 1, 516-519, 2003
172003
Matched-filter-based spectrum sensing for secure cognitive radio network communications
FM Salem, MH Ibrahim, IA Ali, II Ibrahim
International Journal of Computer Applications 87 (18), 2014
162014
TRIUMF: Trust-based routing protocol with controlled degree of selfishness for securing MANET against packet dropping attack
AM Abd El-Haleem, IA Ali
International Journal of Computer Science Issues (IJCSI) 8 (4), 99, 2011
122011
Fast fully distributed and threshold RSA function sharing
MH Ibrahim, IA Ali, II Ibrahim, AH El-Sawy
Proceedings of the Information Systems: New Generations (ISNG’04), 13-18, 2004
122004
An improved LTE RACH protocol for M2M applications
A Samir, MM Elmesalawy, AS Ali, I Ali
Mobile Information Systems 2016, 2016
112016
Wi-Fi protected access for secure power network protection scheme
MM Eissa, IA Ali, KM Abdel-Latif
International Journal of Electrical Power & Energy Systems 46, 414-424, 2013
102013
A provably secure certificateless organizational signature schemes
AM Allam, IA Ali, SM Mahgoub
International Journal of Communication Systems 30 (5), e3038, 2017
92017
Nalbuphine versus Morphine as part of intravenous anesthesia post cardiac surgery
H Shokri, I Ali
J Anesth Clin Res 5 (463), 2, 2014
92014
Privacy-preserving data mining (ppdm) method for horizontally partitioned data
MA Ouda, SA Salem, IA Ali, ESM Saad
International Journal of Computer Science Issues (IJCSI) 9 (5), 339, 2012
92012
TRIDNT: The Trust-Based Routing Protocol with Controlled Degree of Node Selfishness for MANET
AM Abd El-Haleem, IA Ali
International Journal of Network Security & Its Applications (IJNSA) 3 (3 …, 2011
92011
A randomized control trial comparing prophylactic dexmedetomidine versus clonidine on rates and duration of delirium in older adult patients undergoing coronary artery bypass …
H Shokri, I Ali
Journal of clinical anesthesia 61, 109622, 2020
82020
An improved technique for increasing availability in big data replication
MR Kaseb, MH Khafagy, IA Ali, ESM Saad
Future Generation Computer Systems 91, 493-505, 2019
72019
A Novel Dispersion Compensation Model using an Efficient CFBG Reflectors for WDM Optical Networks
IAA Ahmed F.Sayed, Tamer M. Barakat
INTERNATIONAL JOURNAL OF MICROWAVE AND OPTICAL TECHNOLOGY 12 (3), 230-238, 2017
72017
Error analysis and detection procedures for elliptic curve cryptography
NF Saudy, IA Ali, R Al Barkouky
Ain Shams Engineering Journal 10 (3), 587-597, 2019
62019
Redundant independent files (RIF): a technique for reducing storage and resources in big data replication
MR Kaseb, MH Khafagy, IA Ali, ESM Saad
World Conference on Information Systems and Technologies, 182-193, 2018
62018
TRIDNT: Isolating Dropper nodes with some degree of Selfishness in MANET
AM Abd El-Haleem, IA Ali, II Ibrahim, ARH El-Sawy
International conference on computer science and information technology, 236-247, 2011
62011
Secure authentication scheme preventing wormhole attacks in cognitive radio networks
FM Salem, MH Ibrahim, IA El-Wahab Ali
Asian Journal of Computer Science and Information Technology 2, 52-55, 2012
52012
Trust model for TRIDNT trust based routing Protocol
AM Abd El-Haleem, IA Ali, II Ibrahim, ARH El-Sawy
2010 2nd International Conference on Computer Technology and Development …, 2010
52010
The system can't perform the operation now. Try again later.
Articles 1–20