Audio encryption scheme using self-adaptive bit scrambling and two multi chaotic-based dynamic DNA computations RI Abdelfatah IEEE Access 8, 69894-69907, 2020 | 76 | 2020 |
Secure image transmission using chaotic-enhanced elliptic curve cryptography RI Abdelfatah IEEE Access 8, 3875-3890, 2019 | 75 | 2019 |
An efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map RI Abdelfatah, HM Saqr, ME Nasr Multimedia Tools and Applications 82 (14), 22213-22227, 2023 | 37 | 2023 |
A new fast double-chaotic based Image encryption scheme RI Abdelfatah Multimedia Tools and Applications 79 (1), 1241-1259, 2020 | 32 | 2020 |
Secure VANET authentication protocol (SVAP) using Chebyshev chaotic maps for emergency conditions RI Abdelfatah, NM Abdal-Ghafour, ME Nasr IEEE Access 10, 1096-1115, 2021 | 23 | 2021 |
Secure image encryption scheme based on DNA and new multi chaotic map RI Abdelfattah, H Mohamed, ME Nasr Journal of Physics: Conference Series 1447 (1), 012053, 2020 | 22 | 2020 |
Encryption for multimedia based on chaotic map: Several scenarios RI Abdelfatah, ME Nasr, MA Alsharqawy Multimedia Tools and Applications 79, 19717-19738, 2020 | 21 | 2020 |
Keyed parallel hash algorithm based on multiple chaotic maps (KPHA-MCM) RI Abdelfatah, EA Baka, ME Nasr IEEE Access 9, 130399-130409, 2021 | 16 | 2021 |
A new efficient strong proxy signcryption scheme based on a combination of hard problems H Elkamchouchi, M Nasr, R Ismail 2009 IEEE International Conference on Systems, Man and Cybernetics, 5123-5127, 2009 | 16 | 2009 |
A new efficient publicly verifiable signcryption scheme and its multiple recipients variant for firewalls implementation HM Elkamchouchi, ME Nasr, R Ismail 2009 National Radio Science Conference, 1-9, 2009 | 16 | 2009 |
Quantum image encryption using a self-adaptive hash function-controlled chaotic map (sahf-ccm) RI Abdelfatah IEEE Access 10, 107152-107169, 2022 | 14 | 2022 |
A Novel Proxy Signcryption Scheme and its Elliptic Curve Variant R Ismail International Journal of Computer Applications 165 (Number 2), 36-43, 2017 | 13* | 2017 |
A color image authenticated encryption using conic curve and Mersenne twister RI Abdelfatah Multimedia Tools and Applications 79 (33), 24731-24756, 2020 | 10 | 2020 |
A new efficient multiple broadcasters signcryption scheme (mbss) for secure distributed networks H Elkamchouchi, M Nasr, R Ismail 2009 Fifth International Conference on Networking and Services, 204-209, 2009 | 5 | 2009 |
Robust biometric identity authentication scheme using quantum voice encryption and quantum secure direct communications for cybersecurity RI Abdelfatah Journal of King Saud University-Computer and Information Sciences 36 (5), 102062, 2024 | 4 | 2024 |
Blockchain for Healthcare Systems: Concepts, Applications, Challenges, and Future Trends MA Eltabakh, E Abdelrahman, RI Abdelfatah Journal of Engineering Research 7 (3), 132-143, 2023 | 4 | 2023 |
A new secure and fast hashing algorithm (SFHA-256) HM Elkamchouchi, ME Nasr, RI Abdelfatah 2008 National Radio Science Conference, 1-8, 2008 | 4 | 2008 |
Simplified Hybrid Secure Algorithm for Mobile Banking Application RI Abdelfattah, S Awad, ME Nasr Journal of Physics: Conference Series 1447 (1), 012052, 2020 | 3 | 2020 |
A new efficient multiple messages signcryption scheme with public verifiability H Elkamchouchi, M Nasr, R Ismail Applied Computing, Computer Science, and Advanced Communication: First …, 2009 | 3 | 2009 |
Realization of audio encryption using elliptic curve RI Abdelfatah, ME Nasr, MA Alsharqawy CiiT International Journal of Digital Signal Processing 13 (6), 89-99, 2021 | 2 | 2021 |