팔로우
Shimaa A. Abdel Hakeem
Shimaa A. Abdel Hakeem
Shimaa A. Abdel Hakeem ,Postdoctoral Fellow at Brain Korea 21 Plus (BK21) ,South Korea
chungbuk.ac.kr의 이메일 확인됨
제목
인용
인용
연도
Security Requirements and Challenges of 6G Technologies and Applications
HyungWon Kim, Shimaa A. Abdel Hakeem,Hanan H. Hussein
Sensors 2022, 22 (5), 1969, 2022
163*2022
5G-V2X: Standardization, architecture, use cases, network-slicing, and edge-computing
SA Abdel Hakeem, AA Hady, HW Kim
Wireless Networks 26 (8), 6015-6041, 2020
1402020
Vision and research directions of 6G technologies and applications
SAA Hakeem, HH Hussein, HW Kim
Journal of King Saud University-Computer and Information Sciences 34 (6 …, 2022
1282022
RPL routing protocol performance in smart grid applications based wireless sensors: Experimental and simulated analysis
SA Abdel Hakeem, AA Hady, HW Kim
Electronics 8 (2), 186, 2019
702019
A decentralized lightweight authentication and privacy protocol for vehicular networks
SAA Hakeem, MA Abd El-Gawad, HW Kim
IEEE Access 7, 119689-119705, 2019
612019
Current and future developments to improve 5G-NewRadio performance in vehicle-to-everything communications
SA Abdel Hakeem, AA Hady, HW Kim
Telecommunication systems 75 (3), 331-353, 2020
462020
Multi-zone authentication and privacy-preserving protocol (MAPP) based on the bilinear pairing cryptography for 5G-V2X
SAA Hakeem, HW Kim
Sensors 21 (2), 665, 2021
242021
Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication
HWK Shimaa A. Abdel Hakeem
Sensors 22 (1), 331, 2022
222022
A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks
HK Shimaa A. Abdel Hakeem,Sherine M Abd El-Kader
Sensors 21 (17), 5838, 2021
222021
Comparative experiments of V2X security protocol based on hash chain cryptography
SAA Hakeem, MAA El-Gawad, HW Kim
Sensors 20 (19), 5719, 2020
192020
Optimizing 5G in V2X communications: Technologies, requirements, challenges, and standards
SA AbdelHakeem, AA Hady, HW Kim
Fundamental and supportive technologies for 5G mobile networks, 269-308, 2020
142020
New real evaluation study of rpl routing protocol based on cortex m3 nodes of iot-lab test bed
SAA Hakeem, TM Barakat, RAA Seoud
Middle-East Journal of Scientific Research 23 (8), 1639-1651, 2015
82015
Authentication and encryption protocol with revocation and reputation management for enhancing 5G-V2X security
SAA Hakeem, H Kim
Journal of King Saud University-Computer and Information Sciences 35 (7), 101638, 2023
62023
IKE hardware engine based on CAM for concurrent processing of massive user sessions
SA Naby, S Arslan, HW Kim
2017 13th international computer engineering conference (icenco), 154-159, 2017
42017
Evaluation and analysis of a secure voting-based aggregated signatures authentication and revocation protocol for 5 G-V2X communication
SAA Hakeem, HW Kim
Alexandria Engineering Journal 85, 160-176, 2023
22023
Implementation of IPsec-VPN Tunnel Using GNS3
S Abdelnaby, HW Kim
한국통신학회 학술대회논문집, 177-179, 2018
12018
Machine Learning-Enhanced Secure Voting-Based Aggregated Signatures Protocol for Authentication and Revocation in 5G-V2X Communication
SAA Hakeem, HW Kim
한국통신학회 인공지능 학술대회 논문집, 119-120, 2024
2024
Authentication and encryption protocol with revocation and reputation management for enhancing 5G-V2X security
SA Abdel Hakeem, H Kim
2023
Computer and Information Sciences
SAA Hakeem, H Kim
Threshold 5, V2X, 2023
2023
Unicast Encryption Protocol for Vehicular Communication
S Abdelnaby, HW Kim
한국통신학회 학술대회논문집, 1499-1500, 2019
2019
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20