Security Requirements and Challenges of 6G Technologies and Applications HyungWon Kim, Shimaa A. Abdel Hakeem,Hanan H. Hussein Sensors 2022, 22 (5), 1969, 2022 | 163* | 2022 |
5G-V2X: Standardization, architecture, use cases, network-slicing, and edge-computing SA Abdel Hakeem, AA Hady, HW Kim Wireless Networks 26 (8), 6015-6041, 2020 | 140 | 2020 |
Vision and research directions of 6G technologies and applications SAA Hakeem, HH Hussein, HW Kim Journal of King Saud University-Computer and Information Sciences 34 (6 …, 2022 | 128 | 2022 |
RPL routing protocol performance in smart grid applications based wireless sensors: Experimental and simulated analysis SA Abdel Hakeem, AA Hady, HW Kim Electronics 8 (2), 186, 2019 | 70 | 2019 |
A decentralized lightweight authentication and privacy protocol for vehicular networks SAA Hakeem, MA Abd El-Gawad, HW Kim IEEE Access 7, 119689-119705, 2019 | 61 | 2019 |
Current and future developments to improve 5G-NewRadio performance in vehicle-to-everything communications SA Abdel Hakeem, AA Hady, HW Kim Telecommunication systems 75 (3), 331-353, 2020 | 46 | 2020 |
Multi-zone authentication and privacy-preserving protocol (MAPP) based on the bilinear pairing cryptography for 5G-V2X SAA Hakeem, HW Kim Sensors 21 (2), 665, 2021 | 24 | 2021 |
Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication HWK Shimaa A. Abdel Hakeem Sensors 22 (1), 331, 2022 | 22 | 2022 |
A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks HK Shimaa A. Abdel Hakeem,Sherine M Abd El-Kader Sensors 21 (17), 5838, 2021 | 22 | 2021 |
Comparative experiments of V2X security protocol based on hash chain cryptography SAA Hakeem, MAA El-Gawad, HW Kim Sensors 20 (19), 5719, 2020 | 19 | 2020 |
Optimizing 5G in V2X communications: Technologies, requirements, challenges, and standards SA AbdelHakeem, AA Hady, HW Kim Fundamental and supportive technologies for 5G mobile networks, 269-308, 2020 | 14 | 2020 |
New real evaluation study of rpl routing protocol based on cortex m3 nodes of iot-lab test bed SAA Hakeem, TM Barakat, RAA Seoud Middle-East Journal of Scientific Research 23 (8), 1639-1651, 2015 | 8 | 2015 |
Authentication and encryption protocol with revocation and reputation management for enhancing 5G-V2X security SAA Hakeem, H Kim Journal of King Saud University-Computer and Information Sciences 35 (7), 101638, 2023 | 6 | 2023 |
IKE hardware engine based on CAM for concurrent processing of massive user sessions SA Naby, S Arslan, HW Kim 2017 13th international computer engineering conference (icenco), 154-159, 2017 | 4 | 2017 |
Evaluation and analysis of a secure voting-based aggregated signatures authentication and revocation protocol for 5 G-V2X communication SAA Hakeem, HW Kim Alexandria Engineering Journal 85, 160-176, 2023 | 2 | 2023 |
Implementation of IPsec-VPN Tunnel Using GNS3 S Abdelnaby, HW Kim 한국통신학회 학술대회논문집, 177-179, 2018 | 1 | 2018 |
Machine Learning-Enhanced Secure Voting-Based Aggregated Signatures Protocol for Authentication and Revocation in 5G-V2X Communication SAA Hakeem, HW Kim 한국통신학회 인공지능 학술대회 논문집, 119-120, 2024 | | 2024 |
Authentication and encryption protocol with revocation and reputation management for enhancing 5G-V2X security SA Abdel Hakeem, H Kim | | 2023 |
Computer and Information Sciences SAA Hakeem, H Kim Threshold 5, V2X, 2023 | | 2023 |
Unicast Encryption Protocol for Vehicular Communication S Abdelnaby, HW Kim 한국통신학회 학술대회논문집, 1499-1500, 2019 | | 2019 |