Follow
Maged Hamada Ibrahim
Maged Hamada Ibrahim
Associate Professor of Cryprography and Communication Security, Helwan University
Verified email at h-eng.helwan.edu.eg
Title
Cited by
Cited by
Year
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks
X Li, MH Ibrahim, S Kumari, AK Sangaiah, V Gupta, KKR Choo
Computer Networks 129, 429-443, 2017
2442017
OCTOPUS: An edge-fog mutual authentication scheme.
MH Ibrahim
Int. J. Netw. Secur. 18 (6), 1089-1101, 2016
1632016
Secure anonymous mutual authentication for star two-tier wireless body area networks
MH Ibrahim, S Kumari, AK Das, M Wazid, V Odelu
Computer methods and programs in biomedicine 135, 37-50, 2016
1102016
A Method for Obtaining Deniable Public-Key Encryption.
MH Ibrahim
Int. J. Netw. Secur. 8 (1), 1-9, 2009
802009
Receiver-deniable Public-Key Encryption.
MH Ibrahim
Int. J. Netw. Secur. 8 (2), 159-165, 2009
722009
SecureCoin: A Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem
MH Ibrahim
International Journal of Network Security 19 (2), 295-312, 2017
392017
Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors
X Li, MH Ibrahim, S Kumari, R Kumar
Telecommunication Systems 67 (2), 323-348, 2018
382018
A robust threshold elliptic curve digital signature providing a new verifiable secret sharing scheme
MH Ibrahim, IA Ali, II Ibrahim, AH El-Sawi
2003 46th Midwest Symposium on Circuits and Systems 1, 276-280, 2003
382003
Non-interactive authentication scheme providing privacy among drivers in vehicle-to-vehicle networks
FM Salem, MH Ibrahim, II Ibrahim
2010 Sixth International Conference on Networking and Services, 156-161, 2010
302010
Resisting Traitors in Linkable Democratic Group Signatures.
MH Ibrahim
Int. J. Netw. Secur. 9 (1), 51-60, 2009
232009
Matched-filter-based spectrum sensing for secure cognitive radio network communications
FM Salem, MH Ibrahim, IA Ali, II Ibrahim
International Journal of Computer Applications 87 (18), 2014
202014
Efficient Dealer-Less Threshold Sharing of Standard RSA.
MH Ibrahim
Int. J. Netw. Secur. 8 (2), 139-150, 2009
202009
Jamming resistant non‐interactive anonymous and unlinkable authentication scheme for mobile satellite networks
MH Ibrahim, S Kumari, AK Das, V Odelu
Security and Communication Networks 9 (18), 5563-5580, 2016
142016
The Weibull probabilities analysis on the single kenaf fiber
I Ibrahim, S Sarip, NA Bani, MH Ibrahim, MZ Hassan
AIP Conference Proceedings 1958 (1), 020009, 2018
132018
Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing.
MH Ibrahim
Int. J. Netw. Secur. 7 (1), 106-113, 2008
132008
Two-party private vector dominance: The all-or-nothing deal
MH Ibrahim
Third International Conference on Information Technology: New Generations …, 2006
122006
Fast fully distributed and threshold RSA function sharing
MH Ibrahim, IA Ali, II Ibrahim, AH El-Sawy
Proceedings of the Information Systems: New Generations (ISNG’04), 13-18, 2004
122004
Fast three-party shared generation of RSA keys without distributed primality tests
MH Ibrahim, II Ibrahim, AH El-Sawy
Proceedings of the Information Systems: New Generations (ISNG’04), 7-12, 2004
102004
Attribute-based authentication on the cloud for thin clients
MH Ibrahim, S Kumari, AK Das, V Odelu
The Journal of Supercomputing 74 (11), 5813-5845, 2018
82018
Secure and robust enterprise digital rights management protocol with efficient storage
MH Ibrahim
International Journal on Information 18 (2), 625-640, 2015
82015
The system can't perform the operation now. Try again later.
Articles 1–20