A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS FM Salem, R Amin Information sciences 527, 382-393, 2020 | 50 | 2020 |
Non-interactive authentication scheme providing privacy among drivers in vehicle-to-vehicle networks FM Salem, MH Ibrahim, II Ibrahim 2010 Sixth International Conference on Networking and Services, 156-161, 2010 | 32 | 2010 |
Matched-filter-based spectrum sensing for secure cognitive radio network communications FM Salem, MH Ibrahim, IA Ali, II Ibrahim International Journal of Computer Applications 87 (18), 2014 | 22 | 2014 |
LAMAS: Lightweight anonymous mutual authentication scheme for securing fog computing environments M Hamada, SA Salem, FM Salem Ain Shams Engineering Journal 13 (6), 101752, 2022 | 21 | 2022 |
Device-aware cell association in heterogeneous cellular networks: A matching game approach MK Elhattab, MM Elmesalawy, FM Salem, II Ibrahim IEEE Transactions on Green Communications and Networking 3 (1), 57-66, 2018 | 14 | 2018 |
Egyptian apricot kernels seeds SA Salem, FMA Salem Dtsch. Lebensm. Rundsch 69, 322-324, 1973 | 14 | 1973 |
SOS: Self‐organized secure framework for VANET FM Salem, AS Ali International Journal of Communication Systems 33 (7), e4317, 2020 | 12 | 2020 |
A lightweight authenticated key establishment scheme for secure smart grid communications FM Salem, E Ibrahim, O Elghandour Int. J. Saf. Secur. Eng 10 (4), 549-558, 2020 | 10 | 2020 |
An elliptic curve-based lightweight mutual authentication scheme for secure communication in smart grids FM Salem, R Khairy, IA Ali International Journal of Information Technology, 1-11, 2024 | 5 | 2024 |
A variable-trust threshold-based approach for DDOS attack mitigation in software defined networks FM Salem, H Youssef, I Ali, A Haggag Plos one 17 (8), e0273681, 2022 | 5 | 2022 |
A secure mutual authentication scheme with perfect forward-secrecy for wireless sensor networks MM Mansour, FM Salem, EM Saad Proceedings of the International Conference on Advanced Intelligent Systems …, 2019 | 5 | 2019 |
A secure privacy-preserving mutual authentication scheme for publish-subscribe fog computing FM Salem 2018 14th International Computer Engineering Conference (ICENCO), 213-218, 2018 | 5 | 2018 |
Secure authentication scheme preventing wormhole attacks in cognitive radio networks FM Salem, MH Ibrahim, IA El-Wahab Ali Asian Journal of Computer Science and Technology 2 (4), 52-55, 2013 | 5 | 2013 |
A primary user authentication scheme for secure cognitive TV spectrum sharing FM Salem, MH Ibrahim, II Ibrahim International Journal of Computer Science Issues (IJCSI) 9 (4), 157, 2012 | 5 | 2012 |
SOTF: Secure organizational transactions framework based on bitcoin payment bridge SM Mahgoub, II Ibrahim, FM Salem IEEE Access 10, 82977-82988, 2022 | 4 | 2022 |
A robust distributed authorization scheme for availability enhancement in VANET AS Ali, FM Salem 2017 12th International Conference on Computer Engineering and Systems …, 2017 | 4 | 2017 |
Energy detection based sensing for secure cognitive spectrum sharing in the presence of primary user emulation attack FM Salem, MH Ibrahim, II Ibrahim IEIE Transactions on Smart Processing and Computing 2 (6), 357-366, 2013 | 4 | 2013 |
Non-interactive secure and privacy preserving protocol for inter-vehicle communication networks FM Salem, MH Ibrahim, II Ibrahim 2010 Seventh International Conference on Information Technology: New …, 2010 | 4 | 2010 |
Efficient Noninteractive Secure Protocol Enforcing Privacy in Vehicle‐to‐Roadside Communication Networks FM Salem, MH Ibrahim, II Ibrahim International Journal of Vehicular Technology 2012 (1), 862368, 2012 | 3 | 2012 |
AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments FM Salem, M Safwat, R Fathy, S Habashy Journal of Cloud Computing 12 (1), 128, 2023 | 1 | 2023 |