A verifiable fully homomorphic encryption scheme for cloud computing security A El-Yahyaoui, MD ECH-CHERIF EL KETTANI Technologies 7 (1), 21, 2019 | 26 | 2019 |
Fully homomorphic encryption: state of art and comparison ELY Ahmed, MD Elkettani International Journal of Computer Science and Information Security (IJCSIS …, 2016 | 21 | 2016 |
A verifiable fully homomorphic encryption scheme to secure big data in cloud computing A EL-YAHYAOUI, MD ECH-CHRIF EL KETTANI The International Conference on Wireless Networks and Mobile Communications …, 2017 | 19 | 2017 |
An Efficient Fully Homomorphic Encryption Scheme A EL-YAHYAOUI, MD ECH-CHERIF EL KETTANI International Journal of Network Security 21 (01), 91-99, 2019 | 17 | 2019 |
Data privacy in cloud computing A El-Yahyaoui, MDEC El Kettani 2018 4th International Conference on Computer and Technology Applications …, 2018 | 15 | 2018 |
ECDSA-based certificateless conditional privacy-preserving authentication scheme in Vehicular Ad Hoc Network A Imghoure, A El-Yahyaoui, F Omary Vehicular Communications 37, 100504, 2022 | 10 | 2022 |
An improved Framework for Biometric Database’s privacy A EL-YAHYAOUI, F OMARY IJCNIS 13 (3), 499–510, 2021 | 7 | 2021 |
Cryptanalysis of fully homomorphic encryption schemes A El-Yahyaoui, MD Elkettani International Journal of Computer Science and Information Security 14 (5), 677, 2016 | 7 | 2016 |
Fully homomorphic encryption: Searching over encrypted cloud data A El-Yahyaoui, MDECHC El Kettani Proceedings of the 2nd international Conference on Big Data, Cloud and …, 2017 | 6 | 2017 |
Schnorr-based conditional privacy-preserving authentication scheme with multisignature and batch verification in vanet A Imghoure, F Omary, A El-Yahyaoui Internet of Things 23, 100850, 2023 | 4 | 2023 |
A noise-free homomorphic evaluation of the AES circuits to optimize secure big data storage in cloud computing A El-Yahyaoui, MD Ech-Chrif El Kettani Innovations in Smart Cities and Applications: Proceedings of the 2nd …, 2018 | 4 | 2018 |
A new cryptographic method for cloud computing A El-Yahyaoui, MDEC El Kettani 2017 3rd International Conference of Cloud Computing Technologies and …, 2017 | 4 | 2017 |
A Like ELGAMAL Cryptosystem But Resistant To Post-Quantum Attacks A EL-YAHYAOUI, F OMARY IJCNIS 14 (1), 132 - 136, 2022 | 3 | 2022 |
About Fully Homomorphic Encryption Improvement Techniques: NISS2018 Conference Paper A El-Yahyaoui, MDEC El Kettani Research Anthology on Artificial Intelligence Applications in Security, 1331 …, 2021 | 2 | 2021 |
Evaluating AND gates over encrypted data in cloud computing A El-Yahyaoui, MDEC El Kettani 2018 International Conference on Advanced Communication Technologies and …, 2018 | 2 | 2018 |
A New Encryption Scheme to Perform Smart Computations on Encrypted Cloud Big Data A El-Yahyaoui, MD Ech-Cherif El Kettani Lecture Notes in Real-Time Intelligent Systems, 313-320, 2019 | 1 | 2019 |
Cloud Identity Management Mechanisms and Issues K Maidine, A El-Yahyaoui 2023 IEEE 6th International Conference on Cloud Computing and Artificial …, 2023 | | 2023 |
Enhancing Ransomware Detection: A Registry Analysis-Based Approach K Zirari, HK Idrissi, A El-Yahyaoui, H Bensaid, A En-Nouaary 2023 10th International Conference on Future Internet of Things and Cloud …, 2023 | | 2023 |
Cross Virtual Machine Security: A Survey K Zirari, HK Idrissi, H Bensaid, A En-Nouaary, A El-Yahyaoui International Conference on Digital Technologies and Applications, 190-199, 2022 | | 2022 |
Optimizations in Fully Homomorphic Encryption A El-Yahyaoui, MD Ech-cherif El Kettani Cloud Computing and Big Data: Technologies, Applications and Security 3, 150-166, 2019 | | 2019 |