Mohamed H. Eldefrawy
Mohamed H. Eldefrawy
The School of Information Technology, Halmstad University, Sweden.
Verified email at - Homepage
Cited by
Cited by
A machine-learning-based technique for false data injection attacks detection in industrial IoT
MMN Aboelwafa, KG Seddik, MH Eldefrawy, Y Gadallah, M Gidlund
IEEE Internet of Things Journal 7 (9), 8462-8471, 2020
Formal security analysis of LoRaWAN
M Eldefrawy, I Butun, N Pereira, M Gidlund
Computer Networks 148, 328-339, 2019
OTP-based two-factor authentication using mobile phones
MH Eldefrawy, K Alghathbar, MK Khan
2011 eighth international conference on information technology: new …, 2011
Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges
T Gebremichael, LP Ledwapa, M Eldefrawy, GP Hancke Jr, N Pereira, ...
IEEE Access, 2020
A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography
MH Eldefrawy, MK Khan, K Alghathbar
2010 International Conference on Anti-Counterfeiting, Security and …, 2010
Mobile one‐time passwords: two‐factor authentication using mobile phones
MH Eldefrawy, MK Khan, K Alghathbar, TH Kim, H Elkamchouchi
Security and Communication Networks 5 (5), 508-516, 2012
Challenges of securing the industrial internet of things value chain
S Forsström, I Butun, M Eldefrawy, U Jennehag, M Gidlund
2018 Workshop on Metrology for Industry 4.0 and IoT, 218-223, 2018
Key distribution protocol for industrial Internet of Things without implicit certificates
MH Eldefrawy, N Pereira, M Gidlund
IEEE Internet of Things Journal 6 (1), 906-917, 2018
Broadcast authentication for wireless sensor networks using nested hashing and the Chinese remainder theorem
MH Eldefrawy, MK Khan, K Alghathbar, ES Cho
Sensors 10 (9), 8683-8695, 2010
One-time password authentication with infinite nested hash claims
MK Khan, MHK Eldefrawy, KS Alghathbar
US Patent 8,683,564, 2014
One-time password system with infinite nested hash chains
MH Eldefrawy, MK Khan, K Alghathbar
Security Technology, Disaster Recovery and Business Continuity …, 2010
Hardcopy document authentication based on public key encryption and 2D barcodes
MH Eldefrawy, K Alghathbar, MK Khan
2012 International Symposium on Biometrics and Security Technologies, 77-81, 2012
Banknote validation through an embedded RFID chip and an NFC-enabled smartphone
MH Eldefrawy, MK Khan
Mathematical Problems in Engineering 2015, 2015
Guest editorial: Security, privacy, and trust for industrial internet of things
M Gidlund, GP Hancke Jr, M Eldefrawy, J Åkerberg
IEEE Transactions on Industrial Informatics 16 (1), 625-628, 2020
Dynamic user authentication protocol for industrial IoT without timestamping
MH Eldefrawy, N Ferrari, M Gidlund
2019 15th IEEE International Workshop on Factory Communication Systems (WFCS …, 2019
System and method for currency validation
MHK Eldefrawy, MK Khan
US Patent 8,931,688, 2015
BAN logic-based security proof for mobile OTP authentication scheme
MS Alkatheiri, MH Eldefrawy, MK Khan
Future Information Technology, Application, and Service: FutureTech 2012 …, 2012
Cryptanalysis and enhancement of a password-based authentication scheme
MH Eldefrawy, JF Al-Muhtadi
2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015
An efficient and confirmed protocol for authenticated key agreement
H Elkamchouchi, M Eldefrawy
Radio Science Conference, 2008. NRSC 2008. National, 1-8, 2008
Secure instant messaging protocol for centralized communication group
MH Eldefrawy, K Alghathbar, MK Khan, H Elkamchouchi
2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20