Rafik Hamza

Orcid: 0000-0003-4253-9285

According to our database1, Rafik Hamza authored at least 26 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Emas: an efficient MLWE-based authentication scheme for advanced metering infrastructure in smart grid environment.
J. Ambient Intell. Humaniz. Comput., November, 2024

FHE-Based Secure Image Processing Framework with Integrated Key Management System.
Proceedings of the Fifth Workshop on Intelligent Cross-Data Analysis and Retrieval, 2024

2023
Homomorphic Encryption for AI-Based Applications: Challenges and Opportunities.
Proceedings of the 15th International Conference on Knowledge and Systems Engineering, 2023

2022
Research on privacy-preserving techniques in the era of the 5G applications.
Virtual Real. Intell. Hardw., 2022

Greedy Firefly Algorithm for Optimizing Job Scheduling in IoT Grid Computing.
Sensors, 2022

Design-Time Reliability Prediction Model for Component-Based Software Systems.
Sensors, 2022

Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms.
Entropy, 2022

A Survey of Intellectual Property Rights Protection in Big Data Applications.
Algorithms, 2022

Cloud Dynamic Load Balancing and Reactive Fault Tolerance Techniques: A Systematic Literature Review (SLR).
IEEE Access, 2022

A Secure User Authentication Protocol for Heterogeneous Mobile Environments.
IEEE Access, 2022

Towards Intellectual Property Rights Protection in Big Data.
Proceedings of the ICDAR@ICMR 2022: Proceedings of the 3rd ACM Workshop on Intelligent Cross-Data Analysis and Retrieval, Newark, NJ, USA, June 27, 2022

2021
Investigation on Privacy-Preserving Techniques For Personal Data.
Proceedings of the ICDAR@ICMR 2021: Proceedings of the 2021 Workshop on Intelligent Cross-Data Analysis and Retrieval, 2021

2020
Weighted-capsule routing via a fuzzy gaussian model.
Pattern Recognit. Lett., 2020

A privacy-preserving cryptosystem for IoT E-healthcare.
Inf. Sci., 2020

Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts.
Comput. Secur., 2020

2019
An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment.
Complex., 2019

Sensitive and Energetic IoT Access Control for Managing Cloud Electronic Health Records.
IEEE Access, 2019

An Efficient Outsourced Privacy Preserving Machine Learning Scheme With Public Verifiability.
IEEE Access, 2019

A Lightweight Certificateless User Authentication Scheme for Mobile Environment.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

A Lightweight Secure IoT Surveillance Framework Based on DCT-DFRT Algorithms.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Blockchain-PUF-Based Secure Authentication Protocol for Internet of Things.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

2018
Secure Surveillance Framework for IoT Systems Using Probabilistic Image Encryption.
IEEE Trans. Ind. Informatics, 2018

Hash Based Encryption for Keyframes of Diagnostic Hysteroscopy.
IEEE Access, 2018

2017
Secure video summarization framework for personalized wireless capsule endoscopy.
Pervasive Mob. Comput., 2017

A novel pseudo random sequence generator for image-cryptographic applications.
J. Inf. Secur. Appl., 2017

2016
A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map.
Inf. Secur. J. A Glob. Perspect., 2016


  Loading...