Obserwuj
Roayat Ismail Abdelfatah
Roayat Ismail Abdelfatah
Associate Professor at Prince Sattam bin Abdulaziz University
Zweryfikowany adres z f-eng.tanta.edu.eg
Tytuł
Cytowane przez
Cytowane przez
Rok
Audio encryption scheme using self-adaptive bit scrambling and two multi chaotic-based dynamic DNA computations
RI Abdelfatah
IEEE Access 8, 69894-69907, 2020
762020
Secure image transmission using chaotic-enhanced elliptic curve cryptography
RI Abdelfatah
IEEE Access 8, 3875-3890, 2019
752019
An efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map
RI Abdelfatah, HM Saqr, ME Nasr
Multimedia Tools and Applications 82 (14), 22213-22227, 2023
372023
A new fast double-chaotic based Image encryption scheme
RI Abdelfatah
Multimedia Tools and Applications 79 (1), 1241-1259, 2020
322020
Secure VANET authentication protocol (SVAP) using Chebyshev chaotic maps for emergency conditions
RI Abdelfatah, NM Abdal-Ghafour, ME Nasr
IEEE Access 10, 1096-1115, 2021
232021
Secure image encryption scheme based on DNA and new multi chaotic map
RI Abdelfattah, H Mohamed, ME Nasr
Journal of Physics: Conference Series 1447 (1), 012053, 2020
222020
Encryption for multimedia based on chaotic map: Several scenarios
RI Abdelfatah, ME Nasr, MA Alsharqawy
Multimedia Tools and Applications 79, 19717-19738, 2020
212020
Keyed parallel hash algorithm based on multiple chaotic maps (KPHA-MCM)
RI Abdelfatah, EA Baka, ME Nasr
IEEE Access 9, 130399-130409, 2021
162021
A new efficient strong proxy signcryption scheme based on a combination of hard problems
H Elkamchouchi, M Nasr, R Ismail
2009 IEEE International Conference on Systems, Man and Cybernetics, 5123-5127, 2009
162009
A new efficient publicly verifiable signcryption scheme and its multiple recipients variant for firewalls implementation
HM Elkamchouchi, ME Nasr, R Ismail
2009 National Radio Science Conference, 1-9, 2009
162009
Quantum image encryption using a self-adaptive hash function-controlled chaotic map (sahf-ccm)
RI Abdelfatah
IEEE Access 10, 107152-107169, 2022
142022
A Novel Proxy Signcryption Scheme and its Elliptic Curve Variant
R Ismail
International Journal of Computer Applications 165 (Number 2), 36-43, 2017
13*2017
A color image authenticated encryption using conic curve and Mersenne twister
RI Abdelfatah
Multimedia Tools and Applications 79 (33), 24731-24756, 2020
102020
A new efficient multiple broadcasters signcryption scheme (mbss) for secure distributed networks
H Elkamchouchi, M Nasr, R Ismail
2009 Fifth International Conference on Networking and Services, 204-209, 2009
52009
Robust biometric identity authentication scheme using quantum voice encryption and quantum secure direct communications for cybersecurity
RI Abdelfatah
Journal of King Saud University-Computer and Information Sciences 36 (5), 102062, 2024
42024
Blockchain for Healthcare Systems: Concepts, Applications, Challenges, and Future Trends
MA Eltabakh, E Abdelrahman, RI Abdelfatah
Journal of Engineering Research 7 (3), 132-143, 2023
42023
A new secure and fast hashing algorithm (SFHA-256)
HM Elkamchouchi, ME Nasr, RI Abdelfatah
2008 National Radio Science Conference, 1-8, 2008
42008
Simplified Hybrid Secure Algorithm for Mobile Banking Application
RI Abdelfattah, S Awad, ME Nasr
Journal of Physics: Conference Series 1447 (1), 012052, 2020
32020
A new efficient multiple messages signcryption scheme with public verifiability
H Elkamchouchi, M Nasr, R Ismail
Applied Computing, Computer Science, and Advanced Communication: First …, 2009
32009
Realization of audio encryption using elliptic curve
RI Abdelfatah, ME Nasr, MA Alsharqawy
CiiT International Journal of Digital Signal Processing 13 (6), 89-99, 2021
22021
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20