Ihab Ali
Ihab Ali
Professor, Electronics, Communications and Computers Engineering Department, Helwan University
بريد إلكتروني تم التحقق منه على h-eng.helwan.edu.eg - الصفحة الرئيسية
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
A robust threshold elliptic curve digital signature providing a new verifiable secret sharing scheme
MH Ibrahim, IA Ali, II Ibrahim, AH El-Sawi
2003 46th Midwest Symposium on Circuits and Systems 1, 276-280, 2003
332003
Efficient zero-knowledge identification scheme with secret key exchange
AM Allam, II Ibrahim, IA Ali, AEH Elsawy
2003 46th Midwest Symposium on Circuits and Systems 1, 516-519, 2003
182003
A Novel Trust-Based Cross-Layer Model for Wireless Sensor Networks
SIS Hosam A. Rahhal, Ihab A. Ali
28th NATIONAL RADIO SCIENCE CONFERENCE (NRSC 2011), 2011
152011
Matched-filter-based spectrum sensing for secure cognitive radio network communications
FM Salem, MH Ibrahim, IA Ali, II Ibrahim
International Journal of Computer Applications 87 (18), 41-46, 2014
142014
TRIUMF: trust-based routing protocol with controlled degree of selfishness for securing MANET against packet dropping attack
AM Abd El-Haleem, IA Ali
International Journal of Computer Science Issues (IJCSI) 8 (4), 99, 2011
122011
Fast fully distributed and threshold RSA function sharing
MH Ibrahim, IA Ali, II Ibrahim, AH El-Sawy
Proceedings of the Information Systems: New Generations (ISNG’04), 13-18, 2004
122004
Wi-Fi protected access for secure power network protection scheme
MM Eissa, IA Ali, KM Abdel-Latif
International Journal of Electrical Power & Energy Systems 46, 414-424, 2013
102013
An improved LTE RACH protocol for M2M applications
A Samir, MM Elmesalawy, AS Ali, I Ali
Mobile Information Systems 2016, 2016
92016
Privacy-preserving data mining (ppdm) method for horizontally partitioned data
MA Ouda, SA Salem, IA Ali, ESM Saad
International Journal of Computer Science Issues (IJCSI) 9 (5), 339, 2012
92012
TRIDNT: The Trust-Based Routing Protocol with Controlled Degree of Node Selfishness for MANET
AM Abd El-Haleem, IA Ali
International Journal of Network Security & Its Applications (IJNSA) 3 (3), 2011
92011
A provably secure certificateless organizational signature schemes
AM Allam, IA Ali, SM Mahgoub
International Journal of Communication Systems 30 (5), e3038, 2017
72017
Studying the Effect of Eco-addition Inhibitors on Corrosion Resistance of Reinforced Concrete
SA Abdulsada, IA Ali, AA Ali
Bioprocess Engineering 1 (3), 81-86, 2017
62017
TRIDNT: Isolating Dropper nodes with some degree of Selfishness in MANET
AM Abd El-Haleem, IA Ali, II Ibrahim, ARH El-Sawy
International conference on computer science and information technology, 236-247, 2011
62011
Trust model for TRIDNT trust based routing Protocol
AM Abd El-Haleem, IA Ali, II Ibrahim, ARH El-Sawy
2010 2nd International Conference on Computer Technology and Development …, 2010
62010
Secure authentication scheme preventing wormhole attacks in cognitive radio networks
FM Salem, MH Ibrahim, IAA El-wahab
Asian J Comput Sci Informa Technol 24, 52-55, 2013
52013
An improved technique for increasing availability in Big Data replication
MR Kaseb, MH Khafagy, IA Ali, ESM Saad
Future Generation Computer Systems 91, 493-505, 2019
42019
Fully distributed and robust threshold RSA function sharing efficient for small number of players
MH Ibrahim, IA Ali, II Ibrahim, AH El-Sawy
Embedded Cryptographic Hardware: Methodologies and Architectures-2004, 2004
42004
A dynamic routing protocol for broadband networks
IA Ali, HT Mouftah, AH El-Sawi
Proceedings Second IEEE Symposium on Computer and Communications, 495-500, 1997
41997
Error analysis and detection procedures for elliptic curve cryptography
NF Saudy, IA Ali, R Al Barkouky
Ain Shams Engineering Journal 10 (3), 587-597, 2019
32019
Redundant Independent Files (RIF): a technique for reducing storage and resources in big data replication
MR Kaseb, MH Khafagy, IA Ali, ESM Saad
World Conference on Information Systems and Technologies, 182-193, 2018
32018
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20