Abdelkader H. Ouda

According to our database1, Abdelkader H. Ouda authored at least 14 papers between 2001 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Optimal and suboptimal resource allocation techniques in cloud computing data centers.
J. Cloud Comput., 2017

A hybrid-based filtering approach for user authentication.
Proceedings of the 30th IEEE Canadian Conference on Electrical and Computer Engineering, 2017

A content-based data masking technique for a built-in framework in Business Intelligence platform.
Proceedings of the 30th IEEE Canadian Conference on Electrical and Computer Engineering, 2017

2015
Simulating High Availability Scenarios in Cloud Data Centers: A Closer Look.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

2013
Wireless security: securing mobile UMTS communications from interoperation of GSM.
Secur. Commun. Networks, 2013

Resource allocation in a network-based cloud computing environment: design challenges.
IEEE Commun. Mag., 2013

A resource scheduling model for cloud computing data centers.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

2011
Solutions to security issues with legacy integration of GSM into UMTS.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

2010
Security Protocols in Service-Oriented Architecture.
Proceedings of the 6th World Congress on Services, 2010

2005
Localization and security enhancement of block-based image authentication.
Proceedings of the 2005 International Conference on Image Processing, 2005

A Step Towards Practical Steganography Systems.
Proceedings of the Image Analysis and Recognition, Second International Conference, 2005

2004
A practical version of wong's watermarking technique.
Proceedings of the 2004 International Conference on Image Processing, 2004

A Secure and Localizing Watermarking Technique for Image Authentication .
Proceedings of the Image Analysis and Recognition: International Conference, 2004

2001
New correlation-based scheme for image authentication.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001


  Loading...