AbdAllah, Eslam G.
223  results:
Search for persons X
?
1

Evaluation of Wireless Deauthentication Attacks and Counter..:

, In: 2023 10th International Conference on Dependable Systems and Their Applications (DSA),
 
?
3

Enhancing Radio Frequency Identification Systems Security u..:

, In: 2023 IEEE 13th International Conference on RFID Technology and Applications (RFID-TA),
 
?
4

Evaluation of Man-in-the-Middle Attacks and Countermeasures..:

, In: 2023 10th International Conference on Dependable Systems and Their Applications (DSA),
 
?
5

Information-Centric Networking (ICN) Based Disaster Recover..:

, In: 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech),
Mazumder, Kawser A. ; AbdAllah, Eslam G. - p. 0014-0019 , 2023
 
?
6

Securing RFID-Based Attendance Management Systems: An Imple..:

, In: 2023 IEEE 13th International Conference on RFID Technology and Applications (RFID-TA),
 
?
8

Impacts of Radio Frequency IDentification (RFID) Technology..:

, In: 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC),
Akuma, Solomon J. ; AbdAllah, Eslam G. - p. 1544-1549 , 2022
 
?
9

Segmented OTA Platform Over ICN Vehicular Networks:

Safwat, Mena ; Elgammal, Ali ; AbdAllah, Eslam G..
Mobile Networks and Applications.  27 (2022)  3 - p. 1327-1336 , 2022
 
?
10

Vehicle Software Update over ICN Architectures:

, In: Ad Hoc Networks; Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
Elgammal, Ali ; Safwat, Mena ; Badawy, Wael... - p. 44-54 , 2021
 
?
11

Advanced Encryption Standard New Instructions (AES-NI) Anal..:

, In: Proceedings of the 2020 12th International Conference on Computer and Automation Engineering,
 
?
14

Towards defending connected vehicles against attacks:

, In: Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems,
 
?
 
1-15