关注
Abubaker Wahaballa
Abubaker Wahaballa
在 uestc.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing
Z Qin, J Sun, A Wahaballa, W Zheng, H Xiong, Z Qin
Computer Standards & Interfaces 54, 55-60, 2017
832017
Toward unified DevOps model
A Wahaballa, O Wahballa, M Abdellatief, H Xiong, Z Qin
2015 6th IEEE international conference on software engineering and service …, 2015
712015
Medical Image Encryption Scheme Based on Arnold Transformation and ID-AK Protocol.
O Wahballa, A Wahaballa, F Li, II Idris, C Xu
Int. J. Netw. Secur. 19 (5), 776-784, 2017
132017
Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme.
H Abdalla, H Xiong, A Wahaballa, AA Ali, M Ramadan, Z Qin
Int. J. Netw. Secur. 19 (1), 27-38, 2017
122017
Digital image confidentiality depends upon Arnold transformation and rc4 algorithms
K Hamdnaalla, A Wahaballa, O Wahballa
International Journal of Video&Image Processing and Network Security 13 (04 …, 2013
122013
Complexity metrics for component-based software systems: developer perspective
S Ali, M Abdellatief, MA Elfaki, A Wahaballa
Indian Journal of Science and Technology 11 (32), 2018
62018
Equality test with an anonymous authorization in cloud computing
H Abdalla, H Xiong, A Wahaballa, M Ramadan, Z Qin
Wireless Networks 27, 1063-1076, 2021
52021
Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System.
H Abdalla, H Xiong, A Wahaballa, P Avornyo, Z Qin
Int. J. Netw. Secur. 18 (2), 235-243, 2016
52016
A taxonomy of secure electronic English auction protocols
A Wahaballa, Z Qin, H Xiong, Z Qin, M Ramadan
International Journal of Computers and Applications 37 (1), 28-36, 2015
52015
A Secure and Robust Certificateless Public Key Steganography Based on SVD-DDWT.
O Wahballa, A Wahaballa, F Li, C Xu
Int. J. Netw. Secur. 18 (5), 888-899, 2016
42016
Assessing the changeability of component-based system design: a controlled experiment
M Abdellatief, AB Md Sultan, AA Abdul Ghani, A Wahaballa
International Journal of Computers and Applications 44 (6), 513-520, 2022
32022
A literature review on collaborative caching techniques in manets
M Abdellatief
Engineering, Technology & Applied Science Research 9 (5), 4729-4734, 2019
32019
Efficient functional encryption and proxy re-cryptography for secure public cloud data sharing
H Abdallai, X Hu, A Wahaballa, N Eltayieb, M Ramadan, Q Zhiguang
2016 IEEE International Conference of Online Analysis and Computing Science …, 2016
32016
Multiple-layered securities using steganography and cryptography
A Wahaballa, O Wahballa, F Li, M Ramadan, Z Qin
International Journal of Computers and Applications 36 (3), 93-100, 2014
32014
Lightweight and Secure IoT-Based Payment Protocols from an Identity-Based Signature Scheme
A Wahaballa
Electronics 11 (21), 3445, 2022
22022
Oblivious transfer with hidden access control and outsourced decryption from deterministic finite automata‐based functional encryption for an in‐vehicle sensor database system
A Wahaballa, Z Qin, H Abdalla, M Abdellatief, MA Elfaki
Transactions on Emerging Telecommunications Technologies 33 (5), e3870, 2022
12022
Digital Rights Management-Current Status and Future Trends
H Abdalla, X Hu, A Wahaballa, A Abdalla, M Ramadan, Q Zhiguang
2016 3rd International Conference on Information Science and Control …, 2016
12016
Secure mobile agent-based English auction protocol using identity-based signature scheme
A Wahaballa, H Xiong, F Li, Z Qin, Z Qin
International Journal of Security and Networks 11 (4), 175-187, 2016
12016
Secure Aggregation-Based Big Data Analysis and Power Prediction Model for Photovoltaic Systems: A Multi-Layered Approach
Q Huang, A Wahaballa
Preprints, 2024
2024
Lightweight and Secure IoT-based Payment Protocols from an Identity-Based Signature Scheme. Electronics 2022, 11, 3445
A Wahaballa
s Note: MDPI stays neutral with regard to jurisdictional claims in published …, 2022
2022
系统目前无法执行此操作,请稍后再试。
文章 1–20