e-Marefa
eMarefa Database
Home
Services
ARCIF
Bookmarks
Contact us
اللغة
الإنجليزية
العربية
Sign in
Search
Browse
All
Title
Authors / Persons
Institute
Search
Advanced search
Advanced Search
Search Controls
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
Article Limiters
Has Full Text
Phrase
Contains Phrase
Exact Phrase
Any Word
اللغة
Arabic
English
French
# Pages
Equal to
Less than
Greater than
Pages
Document Type
Journal Articles
Book
Book chapters
Journals
International Theses
Arab Theses
Conference Papers
Book Reviews
Statistical Reports
Annual Reports
Conference
Thesaurus
Academic Programs
Awards
Concepts and Terminology
Institute
Poll Question
Fatawa
Training Courses
Public Opinion Polls
Resolutions
Person
Governance
Articles of association
Auditing Reports
Laws
Corporate Report
Monographic Series
Quarterly Reports
Conference Review
Textbook
Textbook Chapter
From
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
To
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
Filters
Main Subjects
Information Technology and Computer Science
(34)
Medicine
(4)
Data Type
Journal Articles
(35)
Language
English
(35)
Country
Egypt
(35)
Authors / Persons
Choo, Kim-Kwang Raymond
(35)
He, Debiao
(6)
Nam, Junghyun
(4)
Paik, Juryon
(3)
Won, Dongho
(3)
Source
Wireless Communications and Mobile Computing
(17)
Security and Communication Networks
(13)
The Scientific World Journal
(4)
Institute
Hindawi Publishing Corporation Cairo, Egypt :
(35)
Range:
Search Results
(
1
-
35
of
35
)
Relevance
Publish Date Asc
Publish Date Desc
Title Asc
Title Desc
Author Asc
Author Desc
Journal Articles
PowerPrint: Identifying Smartphones through Power Consumption of the Battery
By: Chen, Jiong; Chen, Jing; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
Demystifying COVID-19 Digital Contact Tracing: A Survey on Frameworks and Mobile Apps
By: Martin, Tania; Karopoulos, Georgios; Choo, Kim-Kwang Raymond…[et al.]. Wireless Communications and Mobile Computing. No. 2020 (2020), pp.1-29, 29 p.
Journal Articles
Social-Aware Task Allocation in Mobile Crowd Sensing
By: Zhu, Weiping; Choo, Kim-Kwang Raymond; Yu, Zhiyong…[et al.]. Wireless Communications and Mobile Computing. No. 2020 (2020), pp.1-15, 15 p.
Journal Articles
A Blockchain-Based Public Auditing Scheme for Cloud Storage Environment without Trusted Auditors
By: Li, Song; Liu, Jian; Yang, Guannan…[et al.]. Wireless Communications and Mobile Computing. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
Privacy-Enhancing Preferential LBS Query for Mobile Social Network Users
By: Li, Yingshu; Cheng, Xiuzhen; Choo, Kim-Kwang Raymond…[et al.]. Wireless Communications and Mobile Computing. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
An Identity-Based Blind Signature Scheme Using Lattice with Provable Security
By: He, Debiao; Gong, Peng; Insfran, Emilio…[et al.]. Mathematical Problems in Engineering. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs
By: He, Debiao; Kumar, Neeraj; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks
By: Li, Quanrun; Hsu, Chingfang; He, Debiao…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
A General Architecture for Multiserver Authentication Key Agreement with Provable Security
By: Choo, Kim-Kwang Raymond; Nicopolitidis, Petros; He, Debiao…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT
By: He, Debiao; Choo, Kim-Kwang Raymond; Kambourakis, Georgios…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
Efficient Message Authentication Scheme with Conditional Privacy-Preserving and Signature Aggregation for Vehicular Cloud Network
By: Xie, Yong; Xu, Fang; Choo, Kim-Kwang Raymond…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System
By: Choo, Kim-Kwang Raymond; He, Debiao; Giri, Debasis…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services
By: Chen, Lei; Choo, Kim-Kwang Raymond; Jin, Biao…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
Strong Identity-Based Proxy Signature Schemes, Revisited
By: Liu, Weiwei; Mu, Yi; Choo, Kim-Kwang Raymond…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
Multidevice Authentication with Strong Privacy Protection
By: Hajny, Jan; Dzurenda, Petr; Choo, Kim-Kwang Raymond…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
An SDN-Based Connectivity Control System for Wi-Fi Devices
By: Nguyen, Duc-Thang; Choo, Kim-Kwang Raymond; Kim, Taehong. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
Hydra-Bite: Static Taint Immunity, Split, and Complot Based Information Capture Method for Android Device
By: Luo, Xiangyang; Liu, Fenlin; Choo, Kim-Kwang Raymond…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-19, 19 p.
Journal Articles
Task-Oriented Multilevel Cooperative Access Control Scheme for Environment with Virtualization and IoT
By: Dong, Jian; Zhu, Hui; Choo, Kim-Kwang Raymond…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
Cluster-Based Arithmetic Coding for Data Provenance Compression in Wireless Sensor Networks
By: Akhtar, Rizwan; Choo, Kim-Kwang Raymond; Wang, Changda…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-15, 15 p.
Journal Articles
Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection
By: Hu, Jiankun; Choo, Kim-Kwang Raymond; Wu, Qianhong…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-17, 17 p.
Journal Articles
Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud
By: Li, Qi; Zhu, Hongbo; Choo, Kim-Kwang Raymond…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
A Rational Exchange Protocol under Asymmetric Information in Wireless Sensor Networks
By: Lv, Zhen; Choo, Kim-Kwang Raymond; Zhang, Junwei…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment
By: Zhao, Yan; Li, Shiming; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
Efficient Compression and Encryption for Digital Data Transmission
By: Carpentieri, Bruno; Choo, Kim-Kwang Raymond. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
Gleer: A Novel Gini-Based Energy Balancing Scheme for Mobile Botnet Retopology
By: Wang, Yichuan; Ji, Wenjiang; Choo, Kim-Kwang Raymond…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
A Cloud-User Protocol Based on Ciphertext Watermarking Technology
By: Liu, Keyang; Zhang, Weiming; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
Journal Articles
Erratum to “An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model”
By: Zhou, Guomin; Yuan, Xiaohui; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-1, 1 p.
Journal Articles
An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model
By: Zhou, Guomin; Yuan, Xiaohui; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-7, 7 p.
Journal Articles
Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party
By: Hua, Jingyu; Tang, An; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
Journal Articles
Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications
By: Dalai, Asish Kumar; Choo, Kim-Kwang Raymond; Jena, Sanjay Kumar. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
Journal Articles
Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters
By: Man, Dapeng; Choo, Kim-Kwang Raymond; Du, Xiaojiang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks
By: Nam, Junghyun; Choo, Kim-Kwang Raymond; Won, Dongho…[et al.]. The Scientific World Journal. No. 2014 (2014), pp.1-15, 15 p.
Journal Articles
Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
By: Yang, Ang; Nam, Junghyun; Choo, Kim-Kwang Raymond…[et al.]. The Scientific World Journal. No. 2014 (2014), pp.1-8, 8 p.
Journal Articles
On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys
By: Nam, Junghyun; Kim, Moonseong; Won, Dongho…[et al.]. The Scientific World Journal. No. 2014 (2014), pp.1-7, 7 p.
Journal Articles
Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model
By: Yu, F.; Ivanovic, M.; Cao, T.…[et al.]. The Scientific World Journal. No. 2014 (2014), pp.1-11, 11 p.