Hisham Dahshan

According to our database1, Hisham Dahshan authored at least 19 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Efficient Cryptographic-based Access Control Mechanism for Cloud Storage.
J. Inf. Hiding Multim. Signal Process., September, 2024

Enhancing Agricultural Efficiency with Blockchain-Orchestrated Drone Swarms and Kubernetes.
Proceedings of the 6th Novel Intelligent and Leading Emerging Sciences Conference, 2024

2020
SDN Mininet Emulator Benchmarking and Result Analysis.
Proceedings of the 2nd Novel Intelligent and Leading Emerging Sciences Conference, 2020

A New Homomorphic Message Authentication Code Scheme for Network Coding.
Proceedings of the 3rd International Conference on Information and Computer Technologies, 2020

2018
On the Transport Layer Throughput in Cognitive Mobile Ad Hoc Networks using Soft Sensing.
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018

Enhancing the Actual Throughput of the AES Algorithm on the Pascal GPU Architecture.
Proceedings of the 3rd International Conference on System Reliability and Safety, 2018

2016
On the secure Degrees of Freedom for the K-user symmetric MIMO Wiretap MAC channel.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
A Threshold Blind Digital Signature Scheme Using Elliptic Curve Dlog-Based Cryptosystem.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

2013
A Trust Based Threshold Revocation Scheme for MANETs.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

2011
An elliptic curve secret sharing key management scheme for mobile <i>ad hoc</i> networks.
Secur. Commun. Networks, 2011

2010
A robust self-organized public key management for mobile ad hoc networks.
Secur. Commun. Networks, 2010

An Elliptic Curve Distributed Key Management for Mobile Ad Hoc Networks.
Proceedings of the 71st IEEE Vehicular Technology Conference, 2010

A Threshold Key Management Scheme for Mobile Ad Hoc Networks Using Elliptic Curve Dlog-Based Cryptosystem.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010

2009
A Trust Based Threshold Cryptography Key Management for Mobile Ad Hoc Networks.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009

On Demand Self-Organized Public Key Management for Mobile Ad Hoc Networks.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009

A robust and redundant key management for Mobile Ad hoc Networks.
Proceedings of the 2009 6th International Symposium on Wireless Communication Systems, 2009

Key Management in Web of Trust for Mobile Ad Hoc Networks.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Analysis of Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Authenticated symmetric key distribution for mobile ad hoc networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008


  Loading...