Heba K. Aslan
Orcid: 0000-0002-2499-2855Affiliations:
- Nile University, Giza, Egypt
According to our database1,
Heba K. Aslan
authored at least 36 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs.
Cryptogr., September, 2024
Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks.
Cryptogr., March, 2024
J. Comput. Virol. Hacking Tech., 2024
Lightweight Computational Complexity Stepping Up the NTRU Post-Quantum Algorithm Using Parallel Computing.
Symmetry, 2024
Comput. Electr. Eng., 2024
Proceedings of the 13th International Conference on Modern Circuits and Systems Technologies, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
New weighted BERT features and multi-CNN models to enhance the performance of MOOC posts classification.
Neural Comput. Appl., August, 2023
J. Sens. Actuator Networks, April, 2023
Algorithms, February, 2023
2022
Int. J. Ambient Comput. Intell., 2022
Ibn Sina: A patient privacy-preserving authentication protocol in medical internet of things.
Comput. Secur., 2022
2021
DADEM: Distributed Attack Detection Model Based on Big Data Analytics for the Enhancement of the Security of Internet of Things (IoT).
Int. J. Ambient Comput. Intell., 2021
2020
Multim. Tools Appl., 2020
2018
New Generic Design to Expedite Asymmetric Cryptosystems Using Three-levels of Parallelism.
Int. J. Netw. Secur., 2018
2015
A Design of a Fast Parallel-Pipelined Implementation of AES: Advanced Encryption Standard.
CoRR, 2015
Structured Design Approach for an Optimal Programmable Synchronous Security Processor.
Proceedings of the Information Security Applications - 16th International Workshop, 2015
2013
Int. J. Secur. Networks, 2013
Design of a High Performance Implementation of a Tree-Based Multicast Key Distribution Protocol.
Int. J. Netw. Secur., 2013
A new multicast authentication protocol using erasure code functions and signcryption techniques.
Proceedings of the 2013 World Congress on Internet Security, 2013
2012
Efficient Design for the Implementation of Wong-Lam Multicast Authentication Protocol Using Two-Levels of Parallelism
CoRR, 2012
2011
2009
A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach.
Int. J. Netw. Secur., 2009
2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2005
Two-level controllers hierarchy for a scalable and distributed multicast security protocol.
Comput. Secur., 2005
2004
Comput. Secur., 2004
A scalable and distributed multicast security protocol using a subgroup-key hierarchy.
Comput. Secur., 2004
Logical analysis of AUTHMAC_DH: a new protocol for authentication and key distribution.
Comput. Secur., 2004
2003
Proceedings of the Communications and Multimedia Security, 2003
2002
A Detection Scheme for the SK Virus.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
1999
Performance Evaluation of a New Hybrid Encryption Protocol for Authentication and Key Distribution.
Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 1999
1997
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997
1996
A new hybrid encryption scheme for computer networks.
Proceedings of the Information Systems Security, 1996
1995
Proceedings of the Proceedings IEEE Symposium on Computers and Communications, 1995