Mohamed Hamdi
According to our database1,
Mohamed Hamdi
authored at least 130 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
5
10
15
1
1
2
1
2
2
2
1
2
3
2
1
1
1
2
2
1
7
16
14
10
5
6
4
3
1
7
11
8
4
2
1
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the International Wireless Communications and Mobile Computing, 2024
2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
An Authentication Protocol for Healthcare Application: A Case Study of a Diabetic Patient.
Proceedings of the Advanced Information Networking and Applications, 2023
2022
Keynote Speaker 4: Introducing Homomorphic Encryption in Blockchain-enabled Applications.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022
Safety Issues Investigation in Deep Learning Based Chatbots Answers to Medical Advice Requests.
Proceedings of the Neural Information Processing - 29th International Conference, 2022
2021
J. Supercomput., 2021
Proceedings of the Advanced Information Networking and Applications, 2021
2020
Comput. Secur., 2020
2019
Int. J. Grid Util. Comput., 2019
Comput. Networks, 2019
At the cross roads of lattice-based and homomorphic encryption to secure data aggregation in smart grid.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
Proceedings of the 22nd Conference on Innovation in Clouds, 2019
Proceedings of the 22nd Conference on Innovation in Clouds, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
Proceedings of the 6th International Conference on Wireless Networks and Mobile Communications, 2018
Privacy Preserving Profile Matching Protocol for Human-Centric Social Internet of Things.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018
A Key Management Scheme for IoT-Based Video Surveillance Systems Based on Fingerprints.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
Adaptive Anonymous Authentication for Wearable Sensors in Wireless Body Area Networks.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
Proceedings of the International Conference on Internet of Things, 2018
Context-Aware Authorization and Anonymous Authentication in Wireless Body Area Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the IEEE Global Communications Conference, 2018
A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2018
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018
Chaotic Cryptosystems for Multimedia Transmission Opportunities, Challenge and Limitations.
Proceedings of the 15th International Multi-Conference on Systems, Signals & Devices, 2018
Security of RFID Based Internet of Things Applications: Requirements and Open Issues.
Proceedings of the 15th International Multi-Conference on Systems, Signals & Devices, 2018
2017
Proceedings of the SCSS 2017, 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
A secure data storage based on revocation game-theoretic approaches in cloud computing environments.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
A novel privacy technique for Augmented Reality cloud gaming based on image authentication.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
2016
Proceedings of the 24th International Conference on Software, 2016
Proceedings of the 9th International Conference on Security of Information and Networks, 2016
Proceedings of the 2016 International Symposium on Networks, Computers and Communications, 2016
Proceedings of the International Conference on High Performance Computing & Simulation, 2016
Secure data aggregation with homomorphic primitives in wireless sensor networks: A critical survey and open research issues.
Proceedings of the 13th IEEE International Conference on Networking, Sensing, and Control, 2016
Proceedings of the 5th International Conference on Multimedia Computing and Systems, 2016
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 15th International Conference, 2016
2015
An overview on coalitional game-theoretic approaches for resource allocation in cloud computing architectures.
Int. J. Cloud Comput., 2015
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015
A novel efficient approach for protecting integrity of data aggregation in wireless sensor networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015
Proceedings of the International Symposium on Networks, Computers and Communications, 2015
Energy efficient key management scheme for clustered hierarchical wireless sensor networks.
Proceedings of the 12th IEEE International Conference on Networking, Sensing and Control, 2015
Proceedings of the International Conference on Advanced Robotics, 2015
2014
Veh. Commun., 2014
Proceedings of the International Conference on Systems, Signals and Image Processing, 2014
Proceedings of the International Symposium on Networks, Computers and Communications, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the International Conference on High Performance Computing & Simulation, 2014
A Coalitional Game-Theoretic Approach for QoS-Based and Secure Data Storage in Cloud Environment.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014
A Novel Approach for Fair and Secure Resource Allocation in Storage Cloud Architectures Based on DRF Mechanism.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014
2013
A Comparative Study on Game Theoretic Approaches for Resource Allocation in Cloud Computing Architectures.
Proceedings of the 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2013
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013
Proceedings of the International Workshop on Adaptive Security, 2013
Proceedings of the International Workshop on Adaptive Security, 2013
2012
IET Commun., 2012
A Dynamic Distributed Key Tunneling Protocol for Heterogeneous Wireless Sensor Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Space vector pulse width modulation of multilevel inverters: A new method for selecting the appropriate small hexagon.
Proceedings of the 38th Annual Conference on IEEE Industrial Electronics Society, 2012
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012
2011
Int. J. Commun. Networks Distributed Syst., 2011
Game theory and iterated Voronoi diagrams for self-organized Wireless Sensor Networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
2010
Contention Resolution for Transmission Control Protocol over Optical Burst-Switching Networks Using Random Segment Dropping.
Simul., 2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
Secure Wearable and Implantable Body Sensor Networks in Hazardous Environments.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010
A Novel Modular Black-box Architecture for Secure Vehicular Networks.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010
Mobility and Security Models for Wireless Sensor Networks using Voronoi Tessellations.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010
On the impact of irregular radio propagation on coverage control and sleep scheduling in wireless sensor networks.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010
2009
Multi-target Tracking Using Wireless Sensor Networks Based on Higher-Order Voronoi Diagrams.
J. Networks, 2009
EURASIP J. Adv. Signal Process., 2009
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009
Efficient coverage criterion for accurate target tracking using cooperative wireless sensor networks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009
An image-based tracking algorithm for hybrid Wireless Sensor Networks using epipolar geometry.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the Grid and Distributed Computing, 2009
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009
2008
Bandwidth-Effective Design of a Satellite-Based Hybrid Wireless Sensor Network for Mobile Target Detection and Tracking.
IEEE Syst. J., 2008
J. Networks, 2008
Int. J. Commun. Syst., 2008
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Proceedings of the NTMS 2008, 2008
Voronoi-Based Sensor Network Engineering for Target Tracking Using Wireless Sensor Networks.
Proceedings of the NTMS 2008, 2008
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008
An elliptic threshold signature framework for k-security in wireless sensor networks.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Automated Intrusion Response System: Surveys and Analysis.
Proceedings of the 2008 International Conference on Security & Management, 2008
2007
Eur. J. Oper. Res., 2007
Comput. Commun., 2007
Proceedings of the IEEE International Conference on Systems, 2007
Structuring a Multi-violation Detectors Database for an Efficient Intrusion Detection.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007
2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2005
Computer and network security risk management: theory, challenges, and countermeasures.
Int. J. Commun. Syst., 2005
Detecting distributed computer network attacks: A multi-dimensional wavelet approach.
Proceedings of the 12th IEEE International Conference on Electronics, 2005
2004
Proceedings of the IEEE International Conference on Systems, 2004
Proceedings of the Security and Protection in Information Processing Systems, 2004
2003
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003
2002
Vector-lifting schemes for lossless coding and progressive archival of multispectral images.
IEEE Trans. Geosci. Remote. Sens., 2002
2001
Proceedings of the IEEE International Conference on Acoustics, 2001