Follow
Maged Hamada Ibrahim
Maged Hamada Ibrahim
Associate Professor of Cryprography and Communication Security, Helwan University
Verified email at h-eng.helwan.edu.eg
Title
Cited by
Cited by
Year
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks
X Li, MH Ibrahim, S Kumari, AK Sangaiah, V Gupta, KKR Choo
Computer Networks 129, 429-443, 2017
3032017
OCTOPUS: An edge-fog mutual authentication scheme.
MH Ibrahim
Int. J. Netw. Secur. 18 (6), 1089-1101, 2016
1982016
Secure anonymous mutual authentication for star two-tier wireless body area networks
MH Ibrahim, S Kumari, AK Das, M Wazid, V Odelu
Computer methods and programs in biomedicine 135, 37-50, 2016
1372016
A Method for Obtaining Deniable Public-Key Encryption.
MH Ibrahim
Int. J. Netw. Secur. 8 (1), 1-9, 2009
832009
Receiver-deniable Public-Key Encryption.
MH Ibrahim
Int. J. Netw. Secur. 8 (2), 159-165, 2009
692009
Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors
X Li, MH Ibrahim, S Kumari, R Kumar
Telecommunication Systems 67, 323-348, 2018
522018
A robust threshold elliptic curve digital signature providing a new verifiable secret sharing scheme
MH Ibrahim, IA Ali, II Ibrahim, AH El-Sawi
2003 46th Midwest Symposium on Circuits and Systems 1, 276-280, 2003
472003
SecureCoin: A Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem
MH Ibrahim
International Journal of Network Security 19 (2), 295-312, 2017
442017
Non-interactive authentication scheme providing privacy among drivers in vehicle-to-vehicle networks
FM Salem, MH Ibrahim, II Ibrahim
2010 Sixth International Conference on Networking and Services, 156-161, 2010
332010
Resisting Traitors in Linkable Democratic Group Signatures.
MH Ibrahim
Int. J. Netw. Secur. 9 (1), 51-60, 2009
252009
Matched-filter-based spectrum sensing for secure cognitive radio network communications
FM Salem, MH Ibrahim, IA Ali, II Ibrahim
International Journal of Computer Applications 87 (18), 2014
242014
Efficient Dealer-Less Threshold Sharing of Standard RSA.
MH Ibrahim
Int. J. Netw. Secur. 8 (2), 139-150, 2009
212009
The Weibull probabilities analysis on the single kenaf fiber
I Ibrahim, S Sarip, NA Bani, MH Ibrahim, MZ Hassan
AIP Conference Proceedings 1958 (1), 2018
172018
Jamming resistant non‐interactive anonymous and unlinkable authentication scheme for mobile satellite networks
MH Ibrahim, S Kumari, AK Das, V Odelu
Security and Communication Networks 9 (18), 5563-5580, 2016
162016
Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing.
MH Ibrahim
Int. J. Netw. Secur. 7 (1), 106-113, 2008
152008
Fast fully distributed and threshold RSA function sharing
MH Ibrahim, IA Ali, II Ibrahim, AH El-Sawy
Proceedings of the Information Systems: New Generations (ISNG-2004 …, 2004
132004
Two-party private vector dominance: The all-or-nothing deal
MH Ibrahim
Third International Conference on Information Technology: New Generations …, 2006
122006
Fast three-party shared generation of RSA keys without distributed primality tests
MH Ibrahim, II Ibrahim, AH El-Sawy
Proceedings of the Information Systems: New Generations (ISNG’04), 7-12, 2004
122004
Attribute-based authentication on the cloud for thin clients
MH Ibrahim, S Kumari, AK Das, V Odelu
The Journal of Supercomputing 74, 5813-5845, 2018
102018
AATCT: Anonymously authenticated transmission on the cloud with traceability
MH Ibrahim
International Journal of Advanced Computer Science and Applications (IJACSA …, 2015
102015
The system can't perform the operation now. Try again later.
Articles 1–20