BibTeX records: Heba K. Aslan

download as .bib file

@article{DBLP:journals/cee/EltahlawyAEJA24,
  author       = {Ahmed M. Eltahlawy and
                  Heba K. Aslan and
                  Mahmoud Said Elsayed and
                  Anca D. Jurcut and
                  Marianne A. Azer},
  title        = {Detection of sequence number attacks using enhanced {AODV} protocol
                  in MANETs},
  journal      = {Comput. Electr. Eng.},
  volume       = {118},
  pages        = {109395},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compeleceng.2024.109395},
  doi          = {10.1016/J.COMPELECENG.2024.109395},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/EltahlawyAEJA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KabilAA24,
  author       = {Ahmad Kabil and
                  Heba Aslan and
                  Marianne Azer},
  title        = {Cryptanalysis of Two Conditional Privacy Preserving Authentication
                  Schemes for Vehicular Ad Hoc Networks},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {4},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010004},
  doi          = {10.3390/CRYPTOGRAPHY8010004},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KabilAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/El-KabbanyAACA24,
  author       = {Ghada F. El{-}Kabbany and
                  Hassan I. Ahmed and
                  Heba K. Aslan and
                  Young{-}Im Cho and
                  Mohamed S. Abdallah},
  title        = {Lightweight Computational Complexity Stepping Up the {NTRU} Post-Quantum
                  Algorithm Using Parallel Computing},
  journal      = {Symmetry},
  volume       = {16},
  number       = {1},
  pages        = {12},
  year         = {2024},
  url          = {https://doi.org/10.3390/sym16010012},
  doi          = {10.3390/SYM16010012},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/symmetry/El-KabbanyAACA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/RasslanNAEA24,
  author       = {Mohamed Rasslan and
                  Mahmoud M. Nasreldin and
                  Doaa Abdelrahman and
                  Aya Elshobaky and
                  Heba Aslan},
  title        = {Networking and cryptography library with a non-repudiation flavor
                  for blockchain},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {20},
  number       = {1},
  pages        = {1--14},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11416-023-00482-1},
  doi          = {10.1007/S11416-023-00482-1},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/RasslanNAEA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AbdelhamidEAA24,
  author       = {Ashraf Abdelhamid and
                  Mahmoud Said Elsayed and
                  Heba K. Aslan and
                  Marianne A. Azer},
  title        = {Anomaly-Based Intrusion Detection for Blackhole Attack Mitigation},
  booktitle    = {Proceedings of the 19th International Conference on Availability,
                  Reliability and Security, {ARES} 2024, Vienna, Austria, 30 July 2024
                  - 2 August 2024},
  pages        = {124:1--124:9},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3664476.3670941},
  doi          = {10.1145/3664476.3670941},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AbdelhamidEAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mocast/SharobimARA24,
  author       = {Bishoy K. Sharobim and
                  Salwa K. Abd{-}El{-}Hafiz and
                  Ahmed G. Radwan and
                  Heba K. Aslan},
  title        = {A {\textdollar}(k, n){\textdollar}-Secret Image Sharing With Steganography
                  Using Generalized Tent Map},
  booktitle    = {13th International Conference on Modern Circuits and Systems Technologies,
                  {MOCAST} 2024, Sofia, Bulgaria, June 26-28, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/MOCAST61810.2024.10615376},
  doi          = {10.1109/MOCAST61810.2024.10615376},
  timestamp    = {Tue, 13 Aug 2024 14:39:47 +0200},
  biburl       = {https://dblp.org/rec/conf/mocast/SharobimARA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithms/ElKashlanAEJA23,
  author       = {Mohamed ElKashlan and
                  Heba Aslan and
                  Mahmoud Said Elsayed and
                  Anca D. Jurcut and
                  Marianne A. Azer},
  title        = {Intrusion Detection for Electric Vehicle Charging Systems {(EVCS)}},
  journal      = {Algorithms},
  volume       = {16},
  number       = {2},
  pages        = {75},
  year         = {2023},
  url          = {https://doi.org/10.3390/a16020075},
  doi          = {10.3390/A16020075},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/algorithms/ElKashlanAEJA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsan/YassinAA23,
  author       = {Ahmed Mohsen Yassin and
                  Heba Kamal Aslan and
                  Islam Tharwat Abdel{-}Halim},
  title        = {Smart Automotive Diagnostic and Performance Analysis Using Blockchain
                  Technology},
  journal      = {J. Sens. Actuator Networks},
  volume       = {12},
  number       = {2},
  pages        = {32},
  year         = {2023},
  url          = {https://doi.org/10.3390/jsan12020032},
  doi          = {10.3390/JSAN12020032},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsan/YassinAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/ElRashidyFEAK23,
  author       = {Mohamed A. El{-}Rashidy and
                  Ahmed Farouk and
                  Nawal A. El{-}Fishawy and
                  Heba K. Aslan and
                  Nabila A. Khodeir},
  title        = {New weighted {BERT} features and multi-CNN models to enhance the performance
                  of {MOOC} posts classification},
  journal      = {Neural Comput. Appl.},
  volume       = {35},
  number       = {24},
  pages        = {18019--18033},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00521-023-08673-z},
  doi          = {10.1007/S00521-023-08673-Z},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/ElRashidyFEAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RasslanNA22,
  author       = {Mohamed Rasslan and
                  Mahmoud M. Nasreldin and
                  Heba Kamal Aslan},
  title        = {Ibn Sina: {A} patient privacy-preserving authentication protocol in
                  medical internet of things},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102753},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102753},
  doi          = {10.1016/J.COSE.2022.102753},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RasslanNA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/RasslanNA22,
  author       = {Mohamed Rasslan and
                  Mahmoud M. Nasreldin and
                  Heba Kamal Aslan},
  title        = {An IoT Privacy-Oriented selective disclosure credential system},
  journal      = {J. Cybersecur.},
  volume       = {8},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1093/cybsec/tyac013},
  doi          = {10.1093/CYBSEC/TYAC013},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/RasslanNA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaci/AhmedNAA22,
  author       = {Hassan I. Ahmed and
                  Abdurrahman A. Nasr and
                  Salah M. Abdel{-}Mageid and
                  Heba K. Aslan},
  title        = {Cross-Layer Distributed Attack Detection Model for the IoT},
  journal      = {Int. J. Ambient Comput. Intell.},
  volume       = {13},
  number       = {1},
  pages        = {1--17},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijaci.300794},
  doi          = {10.4018/IJACI.300794},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijaci/AhmedNAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaci/AhmedNAA21,
  author       = {Hassan I. Ahmed and
                  Abdurrahman A. Nasr and
                  Salah M. Abdel{-}Mageid and
                  Heba K. Aslan},
  title        = {{DADEM:} Distributed Attack Detection Model Based on Big Data Analytics
                  for the Enhancement of the Security of Internet of Things (IoT)},
  journal      = {Int. J. Ambient Comput. Intell.},
  volume       = {12},
  number       = {1},
  pages        = {114--139},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJACI.2021010105},
  doi          = {10.4018/IJACI.2021010105},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijaci/AhmedNAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ElaskilyESDBEKA20,
  author       = {Mohamed A. Elaskily and
                  Heba A. Elnemr and
                  Ahmed Sedik and
                  Mohamed M. Dessouky and
                  Ghada M. El Banby and
                  Osama A. Elshakankiry and
                  Ashraf A. M. Khalaf and
                  Heba Kamal Aslan and
                  Osama S. Faragallah and
                  Fathi E. Abd El{-}Samie},
  title        = {A novel deep learning framework for copy-moveforgery detection in
                  images},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {27-28},
  pages        = {19167--19192},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-020-08751-7},
  doi          = {10.1007/S11042-020-08751-7},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/ElaskilyESDBEKA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RasslanEA18,
  author       = {Mohamed Rasslan and
                  Ghada F. El{-}Kabbany and
                  Heba Kamal Aslan},
  title        = {New Generic Design to Expedite Asymmetric Cryptosystems Using Three-levels
                  of Parallelism},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {371--380},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p371-380.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/RasslanEA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsci/El-KabbanyRA18,
  author       = {Ghada F. El{-}Kabbany and
                  Mohamed Rasslan and
                  Heba Kamal Aslan},
  title        = {Accelerating Digital Forensics through Parallel Computing},
  journal      = {J. Comput. Sci.},
  volume       = {14},
  number       = {2},
  pages        = {238--252},
  year         = {2018},
  url          = {https://doi.org/10.3844/jcssp.2018.238.252},
  doi          = {10.3844/JCSSP.2018.238.252},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsci/El-KabbanyRA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/El-HadidiEAO15,
  author       = {Mahmoud T. El{-}Hadidi and
                  Hany El{-}Sayed and
                  Heba Kamal Aslan and
                  Karim Osama},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Structured Design Approach for an Optimal Programmable Synchronous
                  Security Processor},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {313--325},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_26},
  doi          = {10.1007/978-3-319-31875-2\_26},
  timestamp    = {Thu, 02 Mar 2023 10:53:05 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/El-HadidiEAO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ElKabbanyAR15,
  author       = {Ghada F. ElKabbany and
                  Heba Kamal Aslan and
                  Mohamed Rasslan},
  title        = {A Design of a Fast Parallel-Pipelined Implementation of {AES:} Advanced
                  Encryption Standard},
  journal      = {CoRR},
  volume       = {abs/1501.01427},
  year         = {2015},
  url          = {http://arxiv.org/abs/1501.01427},
  eprinttype    = {arXiv},
  eprint       = {1501.01427},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ElKabbanyAR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/AslanE13,
  author       = {Heba Kamal Aslan and
                  Ghada F. ElKabbany},
  title        = {Design of a High Performance Implementation of a Tree-Based Multicast
                  Key Distribution Protocol},
  journal      = {Int. J. Netw. Secur.},
  volume       = {15},
  number       = {2},
  pages        = {80--96},
  year         = {2013},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v15-n2/ijns-2013-v15-n2-p80-96.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/AslanE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RasslanA13,
  author       = {Mohamed M. Nasreldin Rasslan and
                  Heba Kamal Aslan},
  title        = {On the security of two improved authenticated encryption schemes},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {4},
  pages        = {194--199},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.058112},
  doi          = {10.1504/IJSN.2013.058112},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RasslanA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worldcis/AslanR13,
  author       = {Heba Kamal Aslan and
                  Mohamed Rasslan},
  title        = {A new multicast authentication protocol using erasure code functions
                  and signcryption techniques},
  booktitle    = {2013 World Congress on Internet Security, WorldCIS 2013, London, United
                  Kingdom, December 9-12, 2013},
  pages        = {99--105},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WorldCIS.2013.6751026},
  doi          = {10.1109/WORLDCIS.2013.6751026},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/worldcis/AslanR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1207-4600,
  author       = {Ghada F. ElKabbany and
                  Heba Kamal Aslan},
  title        = {Efficient Design for the Implementation of Wong-Lam Multicast Authentication
                  Protocol Using Two-Levels of Parallelism},
  journal      = {CoRR},
  volume       = {abs/1207.4600},
  year         = {2012},
  url          = {http://arxiv.org/abs/1207.4600},
  eprinttype    = {arXiv},
  eprint       = {1207.4600},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1207-4600.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/AbdellatifAE11,
  author       = {Riham Abdellatif and
                  Heba Kamal Aslan and
                  Salwa H. El{-}Ramly},
  title        = {New Real Time Multicast Authentication Protocol},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {13--20},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n1/ijns-2011-v12-n1-p13-20.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/AbdellatifAE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RasslanDA09,
  author       = {Mohamed M. Nasreldin Rasslan and
                  Yasser H. Dakroury and
                  Heba Kamal Aslan},
  title        = {A New Secure Multicast Key Distribution Protocol Using Combinatorial
                  Boolean Approach},
  journal      = {Int. J. Netw. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {75--89},
  year         = {2009},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v8-n1/ijns-2009-v8-n1-p75-89.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/RasslanDA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/NasreldinAEE08,
  author       = {Mahmoud Nasreldin and
                  Heba Kamal Aslan and
                  Magdy El{-}Hennawy and
                  Adel El{-}Hennawy},
  title        = {WiMax Security},
  booktitle    = {22nd International Conference on Advanced Information Networking and
                  Applications, {AINA} 2008, Workshops Proceedings, GinoWan, Okinawa,
                  Japan, March 25-28, 2008},
  pages        = {1335--1340},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/WAINA.2008.190},
  doi          = {10.1109/WAINA.2008.190},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/NasreldinAEE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Aslan05,
  author       = {Heba Kamal Aslan},
  title        = {Two-level controllers hierarchy for a scalable and distributed multicast
                  security protocol},
  journal      = {Comput. Secur.},
  volume       = {24},
  number       = {5},
  pages        = {399--408},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.cose.2005.01.003},
  doi          = {10.1016/J.COSE.2005.01.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Aslan05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Aslan04,
  author       = {Heba Kamal Aslan},
  title        = {Logical analysis of AUTHMAC{\_}DH: a new protocol for authentication
                  and key distribution},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {290--299},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2003.11.002},
  doi          = {10.1016/J.COSE.2003.11.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Aslan04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Aslan04a,
  author       = {Heba Kamal Aslan},
  title        = {A scalable and distributed multicast security protocol using a subgroup-key
                  hierarchy},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {320--329},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2003.11.003},
  doi          = {10.1016/J.COSE.2003.11.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Aslan04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Aslan04b,
  author       = {Heba Kamal Aslan},
  title        = {A hybrid scheme for multicast authentication over lossy networks},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {8},
  pages        = {705--713},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.06.010},
  doi          = {10.1016/J.COSE.2004.06.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Aslan04b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/Aslan03,
  author       = {Heba Kamal Aslan},
  editor       = {Antonio Lioy and
                  Daniele Mazzocchi},
  title        = {AUTHMAC{\_}DH: {A} New Protocol for Authentication and Key Distribution},
  booktitle    = {Communications and Multimedia Security - Advanced Techniques for Network
                  and Data Protection, 7th {IFIP} {TC-6} {TC-11} International Conference,
                  {CMS} 2003, Torino, Italy, October 2-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2828},
  pages        = {14--26},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45184-6\_2},
  doi          = {10.1007/978-3-540-45184-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/Aslan03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SalahAE02,
  author       = {D. Salah and
                  Heba Kamal Aslan and
                  Mahmoud T. El{-}Hadidi},
  editor       = {Adeeb Ghonaimy and
                  Mahmoud T. El{-}Hadidi and
                  Heba Kamal Aslan},
  title        = {A Detection Scheme for the {SK} Virus},
  booktitle    = {Security in the Information Society: Visions and Perspectives, {IFIP}
                  {TC11} 17\({}^{\mbox{th}}\) International Conference on Information
                  Security (SEC2002), May 7-9, 2002, Cairo, Egypt},
  series       = {{IFIP} Conference Proceedings},
  volume       = {214},
  pages        = {171--182},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Fri, 11 Feb 2005 12:53:42 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/SalahAE02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2002,
  editor       = {Adeeb Ghonaimy and
                  Mahmoud T. El{-}Hadidi and
                  Heba Kamal Aslan},
  title        = {Security in the Information Society: Visions and Perspectives, {IFIP}
                  {TC11} 17\({}^{\mbox{th}}\) International Conference on Information
                  Security (SEC2002), May 7-9, 2002, Cairo, Egypt},
  series       = {{IFIP} Conference Proceedings},
  volume       = {214},
  publisher    = {Kluwer},
  year         = {2002},
  isbn         = {1-4020-7030-6},
  timestamp    = {Fri, 11 Feb 2005 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/El-HadidiHA99,
  author       = {Mahmoud T. El{-}Hadidi and
                  Nadia Hamed Hegazi and
                  Heba Kamal Aslan},
  title        = {Performance Evaluation of a New Hybrid Encryption Protocol for Authentication
                  and Key Distribution},
  booktitle    = {Proceedings of the Fourth {IEEE} Symposium on Computers and Communications
                  {(ISCC} 1999), 6-8 July 1999, Sharm El Sheikh, Red Sea, Egypt},
  pages        = {16--22},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/ISCC.1999.780753},
  doi          = {10.1109/ISCC.1999.780753},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/El-HadidiHA99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/El-HadidiHA97,
  author       = {Mahmoud T. El{-}Hadidi and
                  Nadia Hamed Hegazi and
                  Heba Kamal Aslan},
  title        = {Performance analysis of the Kerberos protocol in a distributed environment},
  booktitle    = {Proceedings of the Second {IEEE} Symposium on Computers and Communications
                  {(ISCC} 1997), July 1-3, 1997, Alexandria, Egypt},
  pages        = {235--239},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/ISCC.1997.616004},
  doi          = {10.1109/ISCC.1997.616004},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/El-HadidiHA97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/El-HadidiHA96,
  author       = {Mahmoud T. El{-}Hadidi and
                  Nadia Hamed Hegazi and
                  Heba Kamal Aslan},
  editor       = {Sokratis K. Katsikas and
                  Dimitris Gritzalis},
  title        = {A new hybrid encryption scheme for computer networks},
  booktitle    = {Information Systems Security, Facing the information society of the
                  21st Century},
  series       = {{IFIP} Conference Proceedings},
  volume       = {54},
  pages        = {494--495},
  publisher    = {Chapman {\&} Hall},
  year         = {1996},
  timestamp    = {Fri, 11 Feb 2005 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/El-HadidiHA96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/El-HadidiHA95,
  author       = {Mahmoud T. El{-}Hadidi and
                  Nadia Hamed Hegazi and
                  Heba Kamal Aslan},
  title        = {Implementation of a hybrid encryption scheme for Ethernet},
  booktitle    = {Proceedings {IEEE} Symposium on Computers and Communications, {ISCC}
                  1995, Alexandria, Egypt, July 27-29, 1995},
  pages        = {150--156},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/SCAC.1995.523660},
  doi          = {10.1109/SCAC.1995.523660},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/El-HadidiHA95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}