Mohammad El-Hajj

Orcid: 0000-0002-4022-9999

Affiliations:
  • Twente University, Enschede, Netherlands
  • University of Sciences and Arts in Lebanon, USAL, Lebanon
  • Saint Joseph University, USJ, Lebanon (PhD 2020)


According to our database1, Mohammad El-Hajj authored at least 24 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Evaluating the Efficiency of zk-SNARK, zk-STARK, and Bulletproof in Real-World Scenarios: A Benchmark Study.
Inf., August, 2024

Decentralized Zone-Based PKI: A Lightweight Security Framework for IoT Ecosystems.
Inf., June, 2024

Automobile insurance fraud detection using data mining: A systematic literature review.
Intell. Syst. Appl., March, 2024

Systematic review: Comparing zk-SNARK, zk-STARK, and bulletproof protocols for privacy-preserving authentication.
Secur. Priv., 2024

Systematic literature review: Digital twins' role in enhancing security for Industry 4.0 applications.
Secur. Priv., 2024

Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0.
Network, 2024

Lightweight public key infrastructure for the Internet of Things: A systematic literature review.
J. Ind. Inf. Integr., 2024

NAISS: A reverse proxy approach to mitigate MageCart's e-skimmers in e-commerce.
Comput. Secur., 2024

2023
Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform.
Future Internet, February, 2023

Smooth Number Message Authentication Code in the IoT Landscape.
CoRR, 2023

Defeating MageCart Attacks in a NAISS Way.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Enhancing IoT Security: Design and Evaluation of a Raspberry Pi-Based Intrusion Detection System.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

A Comparison of Authentication Protocols for Unified Client Applications.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

Survey on IoT Multi-Factor Authentication Protocols: A Systematic Literature Review.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

An end-to-end Approach to a Reinforcement Learning in Transport Logistics.
Proceedings of the 16th International Conference on Signal Processing and Communication System, 2023

Security Aspects of Digital Twins in IoT.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Securing IoT Device Networks: A Digital Twin and Automated Adversary Emulation Approach.
Proceedings of the IEEE 3rd International Conference on Digital Twins and Parallel Intelligence, 2023

2022
LASII: Lightweight Authentication Scheme using IOTA in IoT Platforms.
Proceedings of the 20th Mediterranean Communication and Computer Networking Conference, 2022

Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platforms.
Proceedings of the 32nd International Telecommunication Networks and Applications Conference, 2022

2021
A taxonomy of PUF Schemes with a novel Arbiter-based PUF resisting machine learning attacks.
Comput. Networks, 2021

2019
A Survey of Internet of Things (IoT) Authentication Schemes.
Sensors, 2019

Ethereum for Secure Authentication of IoT using Pre-Shared Keys (PSKs).
Proceedings of the 2019 International Conference on Wireless Networks and Mobile Communications, 2019

2018
Analysis of Cryptographic Algorithms on IoT Hardware platforms.
Proceedings of the 2nd Cyber Security in Networking Conference, 2018

2017
Analysis of authentication techniques in Internet of Things (IoT).
Proceedings of the 1st Cyber Security in Networking Conference, 2017


  Loading...