Arwa Alrawais

Orcid: 0000-0002-9718-4613

According to our database1, Arwa Alrawais authored at least 25 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Intelligent techniques for deception detection: a survey and critical study.
Soft Comput., April, 2023

2022
Privacy-Preserving Techniques in Social Distancing Applications: A Comprehensive Survey.
J. Adv. Comput. Intell. Intell. Informatics, 2022

2021
ADGAN: Protect Your Location Privacy in Camera Data of Auto-Driving Vehicles.
IEEE Trans. Ind. Informatics, 2021

CSProp: Ciphertext and Signature Propagation Low-Overhead Public-Key Cryptosystem for IoT Environments.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
An efficient blockchain-based privacy preserving scheme for vehicular social networks.
Inf. Sci., 2020

HomeShield: A Credential-Less Authentication Framework for Smart Home Systems.
IEEE Internet Things J., 2020

R²PEDS: A Recoverable and Revocable Privacy-Preserving Edge Data Sharing Scheme.
IEEE Internet Things J., 2020

FlowGuard: An Intelligent Edge Defense Mechanism Against IoT DDoS Attacks.
IEEE Internet Things J., 2020

Secure and Efficient Data Collection and Storage of IoT in Smart Ocean.
IEEE Internet Things J., 2020

An Efficient Blockchain-Based Bidirectional Friends Matching Scheme in Social Networks.
IEEE Access, 2020

2018
A Secure and Scalable Data Communication Scheme in Smart Grids.
Wirel. Commun. Mob. Comput., 2018

SecureGuard: A Certificate Validation System in Public Key Infrastructure.
IEEE Trans. Veh. Technol., 2018

Privacy-preserving combinatorial auction without an auctioneer.
EURASIP J. Wirel. Commun. Netw., 2018

Solving Data Trading Dilemma with Asymmetric Incomplete Information Using Zero-Determinant Strategy.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

2017
QuickCash: Secure Transfer Payment Systems.
Sensors, 2017

Fog Computing for the Internet of Things: Security and Privacy Issues.
IEEE Internet Comput., 2017

An Attribute-Based Encryption Scheme to Secure Fog Communications.
IEEE Access, 2017

A Secure and Practical Authentication Scheme Using Personal Devices.
IEEE Access, 2017

A secure and verifiable outsourcing scheme for matrix inverse computation.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

An Efficient Revocation Scheme for Vehicular Ad-Hoc Networks.
Proceedings of the 2017 International Conference on Identification, 2017

One-Time-Username: A Threshold-based Authentication System.
Proceedings of the 2017 International Conference on Identification, 2017

2015
A novel verification method for payment card systems.
Pers. Ubiquitous Comput., 2015

X.509 Check: A Tool to Check the Safety and Security of Digital Certificates.
Proceedings of the International Conference on Identification, 2015

2014
Secure Authentication Scheme Using Dual Channels in Rogue Access Point Environments.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

Towards More Secure Cardholder Verification in Payment Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014


  Loading...