Abawajy, Jemal
292  results:
Search for persons X
?
5

Efficient Provably Secure Authentication Protocol for Multi..:

Shahidinejad, Ali ; Abawajy, Jemal
IEEE Internet of Things Journal.  11 (2024)  9 - p. 15241-15251 , 2024
 
?
6

Blockchain-Based Self-Certified Key Exchange Protocol for H..:

Shahidinejad, Ali ; Abawajy, Jemal
IEEE Transactions on Consumer Electronics.  70 (2024)  1 - p. 543-553 , 2024
 
?
8

Information, Communication and Computing Technology: 8th In.. 

Communications in Computer and Information Science, 1841
 
?
10

A Comprehensive Review of Lightweight Authenticated Encrypt..:

AlJabri, Zainab ; Abawajy, Jemal ; Huda, Shamsul.
Wireless Communications and Mobile Computing.  2023 (2023)  - p. 1-31 , 2023
 
?
12

Special issue on neural computing and applications in cyber..:

Yan, Yuwei ; Abawajy, Jemal
Neural Computing and Applications.  35 (2023)  35 - p. 24563-24564 , 2023
 
?
14

A reliable edge server placement strategy based on DDPG in ..:

, In: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
Zhou, Zhou ; Han, Yonggui ; Shojafar, Mohammad.. - p. 2587-2594 , 2023
 
1-15