High performance CUDA AES implementation: A quantitative performance analysis approach AA Abdelrahman, MM Fouad, H Dahshan, AM Mousa 2017 Computing conference, 1077-1085, 2017 | 38 | 2017 |
A robust self‐organized public key management for mobile ad hoc networks H Dahshan, J Irvine Security and Communication Networks 3 (1), 16-30, 2010 | 31 | 2010 |
On demand self-organized public key management for mobile ad hoc networks H Dahshan, J Irvine VTC Spring 2009-IEEE 69th Vehicular Technology Conference, 1-5, 2009 | 25 | 2009 |
SDN mininet emulator benchmarking and result analysis M Hasan, H Dahshan, E Abdelwanees, A Elmoghazy 2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES …, 2020 | 22 | 2020 |
An elliptic curve distributed key management for mobile ad hoc networks H Dahshan, J Irvine 2010 IEEE 71st Vehicular Technology Conference, 1-5, 2010 | 18 | 2010 |
A trust based threshold revocation scheme for MANETs H Dahshan, F Elsayed, A Rohiem, A Elgmoghazy, J Irvine 2013 IEEE 78th vehicular technology conference (VTC Fall), 1-5, 2013 | 17 | 2013 |
Key management in web of trust for mobile ad hoc networks H Dahshan, J Irvine 2009 International Conference on Advanced Information Networking and …, 2009 | 15 | 2009 |
A trust based threshold cryptography key management for mobile ad hoc networks H Dahshan, J Irvine 2009 IEEE 70th Vehicular Technology Conference Fall, 1-5, 2009 | 14 | 2009 |
Authenticated symmetric key distribution for mobile ad hoc networks H Dahshan, J Irvine 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems …, 2008 | 14 | 2008 |
Analysis on the aes implementation with various granularities on different gpu architectures AA Abdelrahman, MM Fouad, H Dahshan Advances in Electrical and Electronic Engineering 15 (3), 526-535, 2017 | 13 | 2017 |
A novel approach for designing the s-box of advanced encryption standard algorithm (AES) using chaotic map AE Rohiem, S Elagooz, H Dahshan Proceedings of the Twenty-Second National Radio Science Conference, 2005 …, 2005 | 11 | 2005 |
A threshold key management scheme for mobile ad hoc networks using elliptic curve dlog-based cryptosystem H Dahshan, J Irvine 2010 8th Annual Communication Networks and Services Research Conference, 130-137, 2010 | 10 | 2010 |
Performance evaluation of multihop decode and forward cooperative relaying A Prince, AE Abdalla, H Dahshan, AED Rohiem 2017 Intl Conf on Advanced Control Circuits Systems (ACCS) Systems & 2017 …, 2017 | 9 | 2017 |
Enhancing the actual throughput of the AES algorithm on the Pascal GPU architecture AA Abdelrahman, H Dahshan, GI Salama 2018 3rd International Conference on System Reliability and Safety (ICSRS …, 2018 | 8 | 2018 |
An elliptic curve key management scheme for Internet of Things H Dahshan International Journal of Applied Engineering Research 11 (20), 10241-10246, 2016 | 7 | 2016 |
Analysis of key distribution in mobile ad hoc networks based on message relaying H Dahshan, J Irvine 2008 IEEE International Conference on Wireless and Mobile Computing …, 2008 | 7 | 2008 |
A threshold blind digital signature scheme using elliptic curve dlog-based cryptosystem H Dahshan, A Kamal, A Rohiem 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), 1-5, 2015 | 6 | 2015 |
An elliptic curve secret sharing key management scheme for mobile ad hoc networks H Dahshan, J Irvine Security and Communication Networks 4 (12), 1405-1419, 2011 | 5 | 2011 |
Multimedia SDR-based cooperative communication A Prince, AE Abdalla, H Dahshan, AED Rohiem 2018 13th International Conference on Computer Engineering and Systems …, 2018 | 4 | 2018 |
Hardware Assisted Homomorphic Encryption in a Real Time VOIP Conference Application A Kamal, H Dahshan, A Diaa 2018 13th International Conference on Computer Engineering and Systems …, 2018 | 4 | 2018 |