default search action
BibTeX records: Heba K. Aslan
@article{DBLP:journals/cee/EltahlawyAEJA24, author = {Ahmed M. Eltahlawy and Heba K. Aslan and Mahmoud Said Elsayed and Anca D. Jurcut and Marianne A. Azer}, title = {Detection of sequence number attacks using enhanced {AODV} protocol in MANETs}, journal = {Comput. Electr. Eng.}, volume = {118}, pages = {109395}, year = {2024}, url = {https://doi.org/10.1016/j.compeleceng.2024.109395}, doi = {10.1016/J.COMPELECENG.2024.109395}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/EltahlawyAEJA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KabilAA24, author = {Ahmad Kabil and Heba Aslan and Marianne Azer}, title = {Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {4}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010004}, doi = {10.3390/CRYPTOGRAPHY8010004}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KabilAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/El-KabbanyAACA24, author = {Ghada F. El{-}Kabbany and Hassan I. Ahmed and Heba K. Aslan and Young{-}Im Cho and Mohamed S. Abdallah}, title = {Lightweight Computational Complexity Stepping Up the {NTRU} Post-Quantum Algorithm Using Parallel Computing}, journal = {Symmetry}, volume = {16}, number = {1}, pages = {12}, year = {2024}, url = {https://doi.org/10.3390/sym16010012}, doi = {10.3390/SYM16010012}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/symmetry/El-KabbanyAACA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/RasslanNAEA24, author = {Mohamed Rasslan and Mahmoud M. Nasreldin and Doaa Abdelrahman and Aya Elshobaky and Heba Aslan}, title = {Networking and cryptography library with a non-repudiation flavor for blockchain}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {20}, number = {1}, pages = {1--14}, year = {2024}, url = {https://doi.org/10.1007/s11416-023-00482-1}, doi = {10.1007/S11416-023-00482-1}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/RasslanNAEA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AbdelhamidEAA24, author = {Ashraf Abdelhamid and Mahmoud Said Elsayed and Heba K. Aslan and Marianne A. Azer}, title = {Anomaly-Based Intrusion Detection for Blackhole Attack Mitigation}, booktitle = {Proceedings of the 19th International Conference on Availability, Reliability and Security, {ARES} 2024, Vienna, Austria, 30 July 2024 - 2 August 2024}, pages = {124:1--124:9}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3664476.3670941}, doi = {10.1145/3664476.3670941}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/AbdelhamidEAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mocast/SharobimARA24, author = {Bishoy K. Sharobim and Salwa K. Abd{-}El{-}Hafiz and Ahmed G. Radwan and Heba K. Aslan}, title = {A {\textdollar}(k, n){\textdollar}-Secret Image Sharing With Steganography Using Generalized Tent Map}, booktitle = {13th International Conference on Modern Circuits and Systems Technologies, {MOCAST} 2024, Sofia, Bulgaria, June 26-28, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/MOCAST61810.2024.10615376}, doi = {10.1109/MOCAST61810.2024.10615376}, timestamp = {Tue, 13 Aug 2024 14:39:47 +0200}, biburl = {https://dblp.org/rec/conf/mocast/SharobimARA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithms/ElKashlanAEJA23, author = {Mohamed ElKashlan and Heba Aslan and Mahmoud Said Elsayed and Anca D. Jurcut and Marianne A. Azer}, title = {Intrusion Detection for Electric Vehicle Charging Systems {(EVCS)}}, journal = {Algorithms}, volume = {16}, number = {2}, pages = {75}, year = {2023}, url = {https://doi.org/10.3390/a16020075}, doi = {10.3390/A16020075}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/algorithms/ElKashlanAEJA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/YassinAA23, author = {Ahmed Mohsen Yassin and Heba Kamal Aslan and Islam Tharwat Abdel{-}Halim}, title = {Smart Automotive Diagnostic and Performance Analysis Using Blockchain Technology}, journal = {J. Sens. Actuator Networks}, volume = {12}, number = {2}, pages = {32}, year = {2023}, url = {https://doi.org/10.3390/jsan12020032}, doi = {10.3390/JSAN12020032}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsan/YassinAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/ElRashidyFEAK23, author = {Mohamed A. El{-}Rashidy and Ahmed Farouk and Nawal A. El{-}Fishawy and Heba K. Aslan and Nabila A. Khodeir}, title = {New weighted {BERT} features and multi-CNN models to enhance the performance of {MOOC} posts classification}, journal = {Neural Comput. Appl.}, volume = {35}, number = {24}, pages = {18019--18033}, year = {2023}, url = {https://doi.org/10.1007/s00521-023-08673-z}, doi = {10.1007/S00521-023-08673-Z}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/ElRashidyFEAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RasslanNA22, author = {Mohamed Rasslan and Mahmoud M. Nasreldin and Heba Kamal Aslan}, title = {Ibn Sina: {A} patient privacy-preserving authentication protocol in medical internet of things}, journal = {Comput. Secur.}, volume = {119}, pages = {102753}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102753}, doi = {10.1016/J.COSE.2022.102753}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RasslanNA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/RasslanNA22, author = {Mohamed Rasslan and Mahmoud M. Nasreldin and Heba Kamal Aslan}, title = {An IoT Privacy-Oriented selective disclosure credential system}, journal = {J. Cybersecur.}, volume = {8}, number = {1}, year = {2022}, url = {https://doi.org/10.1093/cybsec/tyac013}, doi = {10.1093/CYBSEC/TYAC013}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecurity/RasslanNA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaci/AhmedNAA22, author = {Hassan I. Ahmed and Abdurrahman A. Nasr and Salah M. Abdel{-}Mageid and Heba K. Aslan}, title = {Cross-Layer Distributed Attack Detection Model for the IoT}, journal = {Int. J. Ambient Comput. Intell.}, volume = {13}, number = {1}, pages = {1--17}, year = {2022}, url = {https://doi.org/10.4018/ijaci.300794}, doi = {10.4018/IJACI.300794}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijaci/AhmedNAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaci/AhmedNAA21, author = {Hassan I. Ahmed and Abdurrahman A. Nasr and Salah M. Abdel{-}Mageid and Heba K. Aslan}, title = {{DADEM:} Distributed Attack Detection Model Based on Big Data Analytics for the Enhancement of the Security of Internet of Things (IoT)}, journal = {Int. J. Ambient Comput. Intell.}, volume = {12}, number = {1}, pages = {114--139}, year = {2021}, url = {https://doi.org/10.4018/IJACI.2021010105}, doi = {10.4018/IJACI.2021010105}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijaci/AhmedNAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ElaskilyESDBEKA20, author = {Mohamed A. Elaskily and Heba A. Elnemr and Ahmed Sedik and Mohamed M. Dessouky and Ghada M. El Banby and Osama A. Elshakankiry and Ashraf A. M. Khalaf and Heba Kamal Aslan and Osama S. Faragallah and Fathi E. Abd El{-}Samie}, title = {A novel deep learning framework for copy-moveforgery detection in images}, journal = {Multim. Tools Appl.}, volume = {79}, number = {27-28}, pages = {19167--19192}, year = {2020}, url = {https://doi.org/10.1007/s11042-020-08751-7}, doi = {10.1007/S11042-020-08751-7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/ElaskilyESDBEKA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/RasslanEA18, author = {Mohamed Rasslan and Ghada F. El{-}Kabbany and Heba Kamal Aslan}, title = {New Generic Design to Expedite Asymmetric Cryptosystems Using Three-levels of Parallelism}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {371--380}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p371-380.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/RasslanEA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsci/El-KabbanyRA18, author = {Ghada F. El{-}Kabbany and Mohamed Rasslan and Heba Kamal Aslan}, title = {Accelerating Digital Forensics through Parallel Computing}, journal = {J. Comput. Sci.}, volume = {14}, number = {2}, pages = {238--252}, year = {2018}, url = {https://doi.org/10.3844/jcssp.2018.238.252}, doi = {10.3844/JCSSP.2018.238.252}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsci/El-KabbanyRA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/El-HadidiEAO15, author = {Mahmoud T. El{-}Hadidi and Hany El{-}Sayed and Heba Kamal Aslan and Karim Osama}, editor = {Howon Kim and Dooho Choi}, title = {Structured Design Approach for an Optimal Programmable Synchronous Security Processor}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {313--325}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_26}, doi = {10.1007/978-3-319-31875-2\_26}, timestamp = {Thu, 02 Mar 2023 10:53:05 +0100}, biburl = {https://dblp.org/rec/conf/wisa/El-HadidiEAO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ElKabbanyAR15, author = {Ghada F. ElKabbany and Heba Kamal Aslan and Mohamed Rasslan}, title = {A Design of a Fast Parallel-Pipelined Implementation of {AES:} Advanced Encryption Standard}, journal = {CoRR}, volume = {abs/1501.01427}, year = {2015}, url = {http://arxiv.org/abs/1501.01427}, eprinttype = {arXiv}, eprint = {1501.01427}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ElKabbanyAR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/AslanE13, author = {Heba Kamal Aslan and Ghada F. ElKabbany}, title = {Design of a High Performance Implementation of a Tree-Based Multicast Key Distribution Protocol}, journal = {Int. J. Netw. Secur.}, volume = {15}, number = {2}, pages = {80--96}, year = {2013}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v15-n2/ijns-2013-v15-n2-p80-96.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/AslanE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RasslanA13, author = {Mohamed M. Nasreldin Rasslan and Heba Kamal Aslan}, title = {On the security of two improved authenticated encryption schemes}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {4}, pages = {194--199}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.058112}, doi = {10.1504/IJSN.2013.058112}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RasslanA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/worldcis/AslanR13, author = {Heba Kamal Aslan and Mohamed Rasslan}, title = {A new multicast authentication protocol using erasure code functions and signcryption techniques}, booktitle = {2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013}, pages = {99--105}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WorldCIS.2013.6751026}, doi = {10.1109/WORLDCIS.2013.6751026}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/worldcis/AslanR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1207-4600, author = {Ghada F. ElKabbany and Heba Kamal Aslan}, title = {Efficient Design for the Implementation of Wong-Lam Multicast Authentication Protocol Using Two-Levels of Parallelism}, journal = {CoRR}, volume = {abs/1207.4600}, year = {2012}, url = {http://arxiv.org/abs/1207.4600}, eprinttype = {arXiv}, eprint = {1207.4600}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1207-4600.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/AbdellatifAE11, author = {Riham Abdellatif and Heba Kamal Aslan and Salwa H. El{-}Ramly}, title = {New Real Time Multicast Authentication Protocol}, journal = {Int. J. Netw. Secur.}, volume = {12}, number = {1}, pages = {13--20}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n1/ijns-2011-v12-n1-p13-20.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/AbdellatifAE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/RasslanDA09, author = {Mohamed M. Nasreldin Rasslan and Yasser H. Dakroury and Heba Kamal Aslan}, title = {A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach}, journal = {Int. J. Netw. Secur.}, volume = {8}, number = {1}, pages = {75--89}, year = {2009}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v8-n1/ijns-2009-v8-n1-p75-89.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/RasslanDA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/NasreldinAEE08, author = {Mahmoud Nasreldin and Heba Kamal Aslan and Magdy El{-}Hennawy and Adel El{-}Hennawy}, title = {WiMax Security}, booktitle = {22nd International Conference on Advanced Information Networking and Applications, {AINA} 2008, Workshops Proceedings, GinoWan, Okinawa, Japan, March 25-28, 2008}, pages = {1335--1340}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/WAINA.2008.190}, doi = {10.1109/WAINA.2008.190}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/NasreldinAEE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Aslan05, author = {Heba Kamal Aslan}, title = {Two-level controllers hierarchy for a scalable and distributed multicast security protocol}, journal = {Comput. Secur.}, volume = {24}, number = {5}, pages = {399--408}, year = {2005}, url = {https://doi.org/10.1016/j.cose.2005.01.003}, doi = {10.1016/J.COSE.2005.01.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Aslan05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Aslan04, author = {Heba Kamal Aslan}, title = {Logical analysis of AUTHMAC{\_}DH: a new protocol for authentication and key distribution}, journal = {Comput. Secur.}, volume = {23}, number = {4}, pages = {290--299}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2003.11.002}, doi = {10.1016/J.COSE.2003.11.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Aslan04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Aslan04a, author = {Heba Kamal Aslan}, title = {A scalable and distributed multicast security protocol using a subgroup-key hierarchy}, journal = {Comput. Secur.}, volume = {23}, number = {4}, pages = {320--329}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2003.11.003}, doi = {10.1016/J.COSE.2003.11.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Aslan04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Aslan04b, author = {Heba Kamal Aslan}, title = {A hybrid scheme for multicast authentication over lossy networks}, journal = {Comput. Secur.}, volume = {23}, number = {8}, pages = {705--713}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.06.010}, doi = {10.1016/J.COSE.2004.06.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Aslan04b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/Aslan03, author = {Heba Kamal Aslan}, editor = {Antonio Lioy and Daniele Mazzocchi}, title = {AUTHMAC{\_}DH: {A} New Protocol for Authentication and Key Distribution}, booktitle = {Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th {IFIP} {TC-6} {TC-11} International Conference, {CMS} 2003, Torino, Italy, October 2-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2828}, pages = {14--26}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45184-6\_2}, doi = {10.1007/978-3-540-45184-6\_2}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/cms/Aslan03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/SalahAE02, author = {D. Salah and Heba Kamal Aslan and Mahmoud T. El{-}Hadidi}, editor = {Adeeb Ghonaimy and Mahmoud T. El{-}Hadidi and Heba Kamal Aslan}, title = {A Detection Scheme for the {SK} Virus}, booktitle = {Security in the Information Society: Visions and Perspectives, {IFIP} {TC11} 17\({}^{\mbox{th}}\) International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt}, series = {{IFIP} Conference Proceedings}, volume = {214}, pages = {171--182}, publisher = {Kluwer}, year = {2002}, timestamp = {Fri, 11 Feb 2005 12:53:42 +0100}, biburl = {https://dblp.org/rec/conf/sec/SalahAE02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sec/2002, editor = {Adeeb Ghonaimy and Mahmoud T. El{-}Hadidi and Heba Kamal Aslan}, title = {Security in the Information Society: Visions and Perspectives, {IFIP} {TC11} 17\({}^{\mbox{th}}\) International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt}, series = {{IFIP} Conference Proceedings}, volume = {214}, publisher = {Kluwer}, year = {2002}, isbn = {1-4020-7030-6}, timestamp = {Fri, 11 Feb 2005 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/El-HadidiHA99, author = {Mahmoud T. El{-}Hadidi and Nadia Hamed Hegazi and Heba Kamal Aslan}, title = {Performance Evaluation of a New Hybrid Encryption Protocol for Authentication and Key Distribution}, booktitle = {Proceedings of the Fourth {IEEE} Symposium on Computers and Communications {(ISCC} 1999), 6-8 July 1999, Sharm El Sheikh, Red Sea, Egypt}, pages = {16--22}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/ISCC.1999.780753}, doi = {10.1109/ISCC.1999.780753}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/El-HadidiHA99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/El-HadidiHA97, author = {Mahmoud T. El{-}Hadidi and Nadia Hamed Hegazi and Heba Kamal Aslan}, title = {Performance analysis of the Kerberos protocol in a distributed environment}, booktitle = {Proceedings of the Second {IEEE} Symposium on Computers and Communications {(ISCC} 1997), July 1-3, 1997, Alexandria, Egypt}, pages = {235--239}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/ISCC.1997.616004}, doi = {10.1109/ISCC.1997.616004}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/El-HadidiHA97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/El-HadidiHA96, author = {Mahmoud T. El{-}Hadidi and Nadia Hamed Hegazi and Heba Kamal Aslan}, editor = {Sokratis K. Katsikas and Dimitris Gritzalis}, title = {A new hybrid encryption scheme for computer networks}, booktitle = {Information Systems Security, Facing the information society of the 21st Century}, series = {{IFIP} Conference Proceedings}, volume = {54}, pages = {494--495}, publisher = {Chapman {\&} Hall}, year = {1996}, timestamp = {Fri, 11 Feb 2005 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/El-HadidiHA96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/El-HadidiHA95, author = {Mahmoud T. El{-}Hadidi and Nadia Hamed Hegazi and Heba Kamal Aslan}, title = {Implementation of a hybrid encryption scheme for Ethernet}, booktitle = {Proceedings {IEEE} Symposium on Computers and Communications, {ISCC} 1995, Alexandria, Egypt, July 27-29, 1995}, pages = {150--156}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/SCAC.1995.523660}, doi = {10.1109/SCAC.1995.523660}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/El-HadidiHA95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.