A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing Z Qin, J Sun, A Wahaballa, W Zheng, H Xiong, Z Qin Computer Standards & Interfaces 54, 55-60, 2017 | 83 | 2017 |
Toward unified DevOps model A Wahaballa, O Wahballa, M Abdellatief, H Xiong, Z Qin 2015 6th IEEE international conference on software engineering and service …, 2015 | 71 | 2015 |
Medical Image Encryption Scheme Based on Arnold Transformation and ID-AK Protocol. O Wahballa, A Wahaballa, F Li, II Idris, C Xu Int. J. Netw. Secur. 19 (5), 776-784, 2017 | 13 | 2017 |
Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme. H Abdalla, H Xiong, A Wahaballa, AA Ali, M Ramadan, Z Qin Int. J. Netw. Secur. 19 (1), 27-38, 2017 | 12 | 2017 |
Digital image confidentiality depends upon Arnold transformation and rc4 algorithms K Hamdnaalla, A Wahaballa, O Wahballa International Journal of Video&Image Processing and Network Security 13 (04 …, 2013 | 12 | 2013 |
Complexity metrics for component-based software systems: developer perspective S Ali, M Abdellatief, MA Elfaki, A Wahaballa Indian Journal of Science and Technology 11 (32), 2018 | 6 | 2018 |
Equality test with an anonymous authorization in cloud computing H Abdalla, H Xiong, A Wahaballa, M Ramadan, Z Qin Wireless Networks 27, 1063-1076, 2021 | 5 | 2021 |
Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System. H Abdalla, H Xiong, A Wahaballa, P Avornyo, Z Qin Int. J. Netw. Secur. 18 (2), 235-243, 2016 | 5 | 2016 |
A taxonomy of secure electronic English auction protocols A Wahaballa, Z Qin, H Xiong, Z Qin, M Ramadan International Journal of Computers and Applications 37 (1), 28-36, 2015 | 5 | 2015 |
A Secure and Robust Certificateless Public Key Steganography Based on SVD-DDWT. O Wahballa, A Wahaballa, F Li, C Xu Int. J. Netw. Secur. 18 (5), 888-899, 2016 | 4 | 2016 |
Assessing the changeability of component-based system design: a controlled experiment M Abdellatief, AB Md Sultan, AA Abdul Ghani, A Wahaballa International Journal of Computers and Applications 44 (6), 513-520, 2022 | 3 | 2022 |
A literature review on collaborative caching techniques in manets M Abdellatief Engineering, Technology & Applied Science Research 9 (5), 4729-4734, 2019 | 3 | 2019 |
Efficient functional encryption and proxy re-cryptography for secure public cloud data sharing H Abdallai, X Hu, A Wahaballa, N Eltayieb, M Ramadan, Q Zhiguang 2016 IEEE International Conference of Online Analysis and Computing Science …, 2016 | 3 | 2016 |
Multiple-layered securities using steganography and cryptography A Wahaballa, O Wahballa, F Li, M Ramadan, Z Qin International Journal of Computers and Applications 36 (3), 93-100, 2014 | 3 | 2014 |
Lightweight and Secure IoT-Based Payment Protocols from an Identity-Based Signature Scheme A Wahaballa Electronics 11 (21), 3445, 2022 | 2 | 2022 |
Oblivious transfer with hidden access control and outsourced decryption from deterministic finite automata‐based functional encryption for an in‐vehicle sensor database system A Wahaballa, Z Qin, H Abdalla, M Abdellatief, MA Elfaki Transactions on Emerging Telecommunications Technologies 33 (5), e3870, 2022 | 1 | 2022 |
Digital Rights Management-Current Status and Future Trends H Abdalla, X Hu, A Wahaballa, A Abdalla, M Ramadan, Q Zhiguang 2016 3rd International Conference on Information Science and Control …, 2016 | 1 | 2016 |
Secure mobile agent-based English auction protocol using identity-based signature scheme A Wahaballa, H Xiong, F Li, Z Qin, Z Qin International Journal of Security and Networks 11 (4), 175-187, 2016 | 1 | 2016 |
Secure Aggregation-Based Big Data Analysis and Power Prediction Model for Photovoltaic Systems: A Multi-Layered Approach Q Huang, A Wahaballa Preprints, 2024 | | 2024 |
Lightweight and Secure IoT-based Payment Protocols from an Identity-Based Signature Scheme. Electronics 2022, 11, 3445 A Wahaballa s Note: MDPI stays neutral with regard to jurisdictional claims in published …, 2022 | | 2022 |