Ali A. Yassin
Orcid: 0000-0003-4425-0071
According to our database1,
Ali A. Yassin
authored at least 29 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
1
1
1
1
4
1
1
1
3
1
1
1
3
2
1
6
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Hyperledger Fabric Blockchain Using CCTV Surveillance Cameras for Pipelines of Oil and Gas Fields.
Proceedings of the 11th International Conference on Wireless Networks and Mobile Communications, 2024
Proceedings of the 10th International Conference on Control, 2024
Development Anonymous Authentication Maria et al.'s Scheme of VANETs Using Blockchain and Fog Computing with QR Code Technique.
Proceedings of the 10th International Conference on Control, 2024
2023
J. Ambient Intell. Humaniz. Comput., July, 2023
2022
EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment.
Peer-to-Peer Netw. Appl., 2022
2021
A Secure and Lightweight Three-Factor Remote User Authentication Protocol for Future IoT Applications.
J. Sensors, 2021
2020
Proceedings of the Advances in Cyber Security - Second International Conference, 2020
2019
Robust Conditional Privacy-Preserving Authentication based on Pseudonym Root with Cuckoo Filter in Vehicular Ad Hoc Networks.
KSII Trans. Internet Inf. Syst., 2019
Efficient and Flexible Multi-Factor Authentication Protocol Based on Fuzzy Extractor of Administrator's Fingerprint and Smart Mobile Device.
Cryptogr., 2019
Low-Overhead Remote User Authentication Protocol for IoT Based on a Fuzzy Extractor and Feature Extraction.
IEEE Access, 2019
Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network.
IEEE Access, 2019
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
2018
Flexible and Efficient Authentication of IoT Cloud Scheme Using Crypto Hash Function.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018
2017
Int. J. Auton. Adapt. Commun. Syst., 2017
2016
Comput., 2016
Robust scheme to protect authentication code of message/image documents in cloud computing.
Proceedings of the 2016 International Conference on Computing, 2016
Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016
An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016
2015
Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015
Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015
2014
Comput. J., 2014
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014
2012
Proceedings of the Web Information Systems and Mining - International Conference, 2012
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012
Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012