Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Amr M. Youssef
@article{DBLP:journals/iotj/SeifelnasrAY24, author = {Mohamed Seifelnasr and Riham AlTawy and Amr M. Youssef}, title = {{SKAFS:} Symmetric Key Authentication Protocol With Forward Secrecy for Edge Computing}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {1}, pages = {510--525}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3285513}, doi = {10.1109/JIOT.2023.3285513}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/SeifelnasrAY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/TejaswiMY24, author = {Bhaskar Tejaswi and Mohammad Mannan and Amr M. Youssef}, title = {Security Weaknesses in IoT Management Platforms}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {1}, pages = {1572--1588}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3289754}, doi = {10.1109/JIOT.2023.3289754}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/TejaswiMY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/SeifelnasrAYG24, author = {Mohamed Seifelnasr and Riham AlTawy and Amr M. Youssef and Essam Ghadafi}, title = {Privacy-Preserving Mutual Authentication Protocol With Forward Secrecy for IoT-Edge-Cloud}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {5}, pages = {8105--8117}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3318180}, doi = {10.1109/JIOT.2023.3318180}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/SeifelnasrAYG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/KhanEYSE24, author = {Omniyah Gul M. Khan and Fadi Elghitani and Amr M. Youssef and Magdy M. A. Salama and Ehab Fahmy El{-}Saadany}, title = {Real-Time Congestion-Aware Charging Station Assignment Model for EVs}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {7}, pages = {11723--11736}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3331600}, doi = {10.1109/JIOT.2023.3331600}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/KhanEYSE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/SaberYSZE24, author = {Ahmad Mohammad Saber and Amr M. Youssef and Davor Svetinovic and Hatem H. Zeineldin and Ehab F. El{-}Saadany}, title = {Cyber-Immune Line Current Differential Relays}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {20}, number = {3}, pages = {3597--3608}, year = {2024}, url = {https://doi.org/10.1109/TII.2023.3310769}, doi = {10.1109/TII.2023.3310769}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/SaberYSZE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KlubanMY24, author = {Maryna Kluban and Mohammad Mannan and Amr M. Youssef}, title = {On Detecting and Measuring Exploitable JavaScript Functions in Real-world Applications}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {1}, pages = {8:1--8:37}, year = {2024}, url = {https://doi.org/10.1145/3630253}, doi = {10.1145/3630253}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/KlubanMY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-14949, author = {Ahmad Mohammad Saber and Amr M. Youssef and Davor Svetinovic and Hatem H. Zeineldin and Deepa Kundur and Ehab F. El{-}Saadany}, title = {Enhancing Power Quality Event Classification with {AI} Transformer Models}, journal = {CoRR}, volume = {abs/2402.14949}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.14949}, doi = {10.48550/ARXIV.2402.14949}, eprinttype = {arXiv}, eprint = {2402.14949}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-14949.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/NakkarAY23, author = {Mouna Nakkar and Riham AlTawy and Amr M. Youssef}, title = {{GASE:} {A} Lightweight Group Authentication Scheme With Key Agreement for Edge Computing Applications}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {1}, pages = {840--854}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3204335}, doi = {10.1109/JIOT.2022.3204335}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/NakkarAY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ElbayoumiIEHY23, author = {Mohammed Elbayoumi and Mohamed Ibrahim and Salah Elhoushy and Walaa Hamouda and Amr M. Youssef}, title = {Performance Analysis of Cellular Ultradense IoT Networks With Wireless Backhauls}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {17}, pages = {15774--15787}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3265192}, doi = {10.1109/JIOT.2023.3265192}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ElbayoumiIEHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/KhanYSE23, author = {Omniyah Gul M. Khan and Amr M. Youssef and Magdy M. A. Salama and Ehab F. El{-}Saadany}, title = {Management of Congestion in Distribution Networks Utilizing Demand Side Management and Reinforcement Learning}, journal = {{IEEE} Syst. J.}, volume = {17}, number = {3}, pages = {4452--4463}, year = {2023}, url = {https://doi.org/10.1109/JSYST.2023.3281524}, doi = {10.1109/JSYST.2023.3281524}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/KhanYSE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/GalalY23, author = {Hisham S. Galal and Amr M. Youssef}, title = {Aegis: Privacy-Preserving Market for Non-Fungible Tokens}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {10}, number = {1}, pages = {92--102}, year = {2023}, url = {https://doi.org/10.1109/TNSE.2022.3205428}, doi = {10.1109/TNSE.2022.3205428}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnse/GalalY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/AlTawyGY23, author = {Riham AlTawy and Hisham S. Galal and Amr M. Youssef}, title = {Mjolnir: Breaking the Glass in a Publicly Verifiable Yet Private Manner}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {20}, number = {3}, pages = {2942--2956}, year = {2023}, url = {https://doi.org/10.1109/TNSM.2023.3244506}, doi = {10.1109/TNSM.2023.3244506}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/AlTawyGY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/TejaswiMY23, author = {Bhaskar Tejaswi and Mohammad Mannan and Amr M. Youssef}, editor = {Mohamed Shehab and Maribel Fern{\'{a}}ndez and Ninghui Li}, title = {All Your IoT Devices Are Belong to Us: Security Weaknesses in IoT Management Platforms}, booktitle = {Proceedings of the Thirteenth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26, 2023}, pages = {245--250}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577923.3583636}, doi = {10.1145/3577923.3583636}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/TejaswiMY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/RagabMY23, author = {Abdelrahman Ragab and Mohammad Mannan and Amr M. Youssef}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Costas Lambrinoudakis and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Pantaleone Nespoli and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis}, title = {Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps}, booktitle = {Computer Security. {ESORICS} 2023 International Workshops - CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14398}, pages = {232--248}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-54204-6\_13}, doi = {10.1007/978-3-031-54204-6\_13}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/RagabMY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbc2/AfiaGAY23, author = {Ismail Afia and Hisham S. Galal and Riham AlTawy and Amr M. Youssef}, title = {vPass: Publicly Verifiable Fair Exchange Protocol for Vehicle Passports}, booktitle = {{IEEE} International Conference on Blockchain and Cryptocurrency, {ICBC} 2023, Dubai, United Arab Emirates, May 1-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICBC56567.2023.10174895}, doi = {10.1109/ICBC56567.2023.10174895}, timestamp = {Fri, 21 Jul 2023 12:10:41 +0200}, biburl = {https://dblp.org/rec/conf/icbc2/AfiaGAY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ElbayoumiIEHY23, author = {Mohammed Elbayoumi and Mohamed Ibrahim and Salah Elhoushy and Walaa Hamouda and Amr M. Youssef}, title = {Machine-Type Communications in mmWave Ultra-Dense Networks: Performance Analysis}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2023, Rome, Italy, May 28 - June 1, 2023}, pages = {5843--5848}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICC45041.2023.10279718}, doi = {10.1109/ICC45041.2023.10279718}, timestamp = {Thu, 02 Nov 2023 17:09:41 +0100}, biburl = {https://dblp.org/rec/conf/icc/ElbayoumiIEHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iecon/SaberYSZE23, author = {Ahmad Mohammad Saber and Amr M. Youssef and Davor Svetinovic and Hatem H. Zeineldin and Ehab F. El{-}Saadany}, title = {Learning-Based Detection of Malicious Volt-VAr Control Parameters in Smart Inverters}, booktitle = {49th Annual Conference of the {IEEE} Industrial Electronics Society, {IECON} 2023, Singapore, October 16-19, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IECON51785.2023.10312615}, doi = {10.1109/IECON51785.2023.10312615}, timestamp = {Sat, 25 Nov 2023 16:52:31 +0100}, biburl = {https://dblp.org/rec/conf/iecon/SaberYSZE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MangeardYMY23, author = {Philippe Mangeard and Xiufen Yu and Mohammad Mannan and Amr M. Youssef}, editor = {Lothar Fritsch and Ismail Hassan and Ebenezer Paintsil}, title = {No Place to Hide: Privacy Exposure in Anti-stalkerware Apps and Support Websites}, booktitle = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14324}, pages = {18--36}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47748-5\_2}, doi = {10.1007/978-3-031-47748-5\_2}, timestamp = {Wed, 15 Nov 2023 10:18:13 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/MangeardYMY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BaskaranZMY23, author = {Supraja Baskaran and Lianying Zhao and Mohammad Mannan and Amr M. Youssef}, title = {Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {727--743}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607236}, doi = {10.1145/3607199.3607236}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BaskaranZMY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/PageyMY23, author = {Rohan Pagey and Mohammad Mannan and Amr M. Youssef}, editor = {Ying Ding and Jie Tang and Juan F. Sequeda and Lora Aroyo and Carlos Castillo and Geert{-}Jan Houben}, title = {All Your Shops Are Belong to Us: Security Weaknesses in E-commerce Platforms}, booktitle = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023}, pages = {2144--2154}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3543507.3583319}, doi = {10.1145/3543507.3583319}, timestamp = {Mon, 28 Aug 2023 21:17:10 +0200}, biburl = {https://dblp.org/rec/conf/www/PageyMY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-04931, author = {Amir Mohammad Naseri and Walter Lucia and Amr M. Youssef}, title = {An Observer-Based Key Agreement Scheme for Remotely Controlled Mobile Robots}, journal = {CoRR}, volume = {abs/2303.04931}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.04931}, doi = {10.48550/ARXIV.2303.04931}, eprinttype = {arXiv}, eprint = {2303.04931}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-04931.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-09317, author = {Supraja Baskaran and Lianying Zhao and Mohammad Mannan and Amr M. Youssef}, title = {Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case}, journal = {CoRR}, volume = {abs/2307.09317}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.09317}, doi = {10.48550/ARXIV.2307.09317}, eprinttype = {arXiv}, eprint = {2307.09317}, timestamp = {Tue, 25 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-09317.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-13952, author = {Bhaskar Tejaswi and Mohammad Mannan and Amr M. Youssef}, title = {Security Weaknesses in IoT Management Platforms}, journal = {CoRR}, volume = {abs/2307.13952}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.13952}, doi = {10.48550/ARXIV.2307.13952}, eprinttype = {arXiv}, eprint = {2307.13952}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-13952.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-10304, author = {Ahmad Mohammad Saber and Amr M. Youssef and Davor Svetinovic and Hatem H. Zeineldin and Ehab F. El{-}Saadany}, title = {Learning-Based Detection of Malicious Volt-VAr Control Parameters in Smart Inverters}, journal = {CoRR}, volume = {abs/2309.10304}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.10304}, doi = {10.48550/ARXIV.2309.10304}, eprinttype = {arXiv}, eprint = {2309.10304}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-10304.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalalY23, author = {Hisham S. Galal and Amr M. Youssef}, title = {Aegis: Privacy-Preserving Market for Non-Fungible Tokens}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {144}, year = {2023}, url = {https://eprint.iacr.org/2023/144}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GalalY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GalalMY22, author = {Hisham S. Galal and Mohammad Mannan and Amr M. Youssef}, title = {Blindfold: Keeping private keys in PKIs and CDNs out of sight}, journal = {Comput. Secur.}, volume = {118}, pages = {102731}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102731}, doi = {10.1016/J.COSE.2022.102731}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GalalMY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csysl/NaseriLY22, author = {Amir Mohammad Naseri and Walter Lucia and Amr M. Youssef}, title = {Encrypted Cloud-Based Set-Theoretic Model Predictive Control}, journal = {{IEEE} Control. Syst. Lett.}, volume = {6}, pages = {3032--3037}, year = {2022}, url = {https://doi.org/10.1109/LCSYS.2022.3182295}, doi = {10.1109/LCSYS.2022.3182295}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csysl/NaseriLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/ElbayoumiHY22, author = {Mohammed Elbayoumi and Walaa Hamouda and Amr M. Youssef}, title = {Edge Computing and Multiple-Association in Ultra-Dense Networks: Performance Analysis}, journal = {{IEEE} Trans. Commun.}, volume = {70}, number = {8}, pages = {5098--5112}, year = {2022}, url = {https://doi.org/10.1109/TCOMM.2022.3186989}, doi = {10.1109/TCOMM.2022.3186989}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/ElbayoumiHY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/AlbarakatiRKKDY22, author = {Abdullah Albarakati and Chantale Robillard and Mark Karanfil and Marthe Kassouf and Mourad Debbabi and Amr M. Youssef and Mohsen Ghafouri and Rachid Hadjidj}, title = {Security Monitoring of {IEC} 61850 Substations Using {IEC} 62351-7 Network and System Management}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {18}, number = {3}, pages = {1641--1653}, year = {2022}, url = {https://doi.org/10.1109/TII.2021.3082079}, doi = {10.1109/TII.2021.3082079}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/AlbarakatiRKKDY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/SaberYSZE22, author = {Ahmad Mohammad Saber and Amr M. Youssef and Davor Svetinovic and Hatem H. Zeineldin and Ehab F. El{-}Saadany}, title = {Anomaly-Based Detection of Cyberattacks on Line Current Differential Relays}, journal = {{IEEE} Trans. Smart Grid}, volume = {13}, number = {6}, pages = {4787--4800}, year = {2022}, url = {https://doi.org/10.1109/TSG.2022.3185764}, doi = {10.1109/TSG.2022.3185764}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsg/SaberYSZE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/LuciaY22, author = {Walter Lucia and Amr M. Youssef}, title = {A Key-Agreement Scheme for Cyber-Physical Systems}, journal = {{IEEE} Trans. Syst. Man Cybern. Syst.}, volume = {52}, number = {8}, pages = {5368--5373}, year = {2022}, url = {https://doi.org/10.1109/TSMC.2021.3121205}, doi = {10.1109/TSMC.2021.3121205}, timestamp = {Mon, 08 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/LuciaY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/KlubanMY22, author = {Maryna Kluban and Mohammad Mannan and Amr M. Youssef}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {On Measuring Vulnerable JavaScript Functions in the Wild}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {917--930}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3497769}, doi = {10.1145/3488932.3497769}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiaccs/KlubanMY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/TejaswiSPMY22, author = {Bhaskar Tejaswi and Nayanamana Samarasinghe and Sajjad Pourali and Mohammad Mannan and Amr M. Youssef}, title = {Leaky Kits: The Increased Risk of Data Exposure from Phishing Kits}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston, MA, USA, November 30 - December 2, 2022}, pages = {1--13}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/eCrime57793.2022.10142092}, doi = {10.1109/ECRIME57793.2022.10142092}, timestamp = {Tue, 20 Jun 2023 14:12:59 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/TejaswiSPMY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SamarasingheKMY22, author = {Nayanamana Samarasinghe and Pranay Kapoor and Mohammad Mannan and Amr M. Youssef}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Nicola Dragoni}, title = {No Salvation from Trackers: Privacy Analysis of Religious Websites and Mobile Apps}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2022 International Workshops, {DPM} 2022 and {CBT} 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13619}, pages = {151--166}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25734-6\_10}, doi = {10.1007/978-3-031-25734-6\_10}, timestamp = {Tue, 28 Feb 2023 08:10:09 +0100}, biburl = {https://dblp.org/rec/conf/esorics/SamarasingheKMY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eucc/NaseriLY22, author = {Amir Mohammad Naseri and Walter Lucia and Amr M. Youssef}, title = {A Privacy Preserving Solution for Cloud-Enabled Set-Theoretic Model Predictive Control}, booktitle = {European Control Conference, {ECC} 2022, London, United Kingdom, July 12-15, 2022}, pages = {894--899}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/ECC55457.2022.9838573}, doi = {10.23919/ECC55457.2022.9838573}, timestamp = {Wed, 10 Aug 2022 08:28:40 +0200}, biburl = {https://dblp.org/rec/conf/eucc/NaseriLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/YuSMY22, author = {Xiufen Yu and Nayanamana Samarasinghe and Mohammad Mannan and Amr M. Youssef}, title = {Got Sick and Tracked: Privacy Analysis of Hospital Websites}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2022 - Workshops, Genoa, Italy, June 6-10, 2022}, pages = {278--286}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EuroSPW55150.2022.00034}, doi = {10.1109/EUROSPW55150.2022.00034}, timestamp = {Mon, 04 Jul 2022 17:06:18 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/YuSMY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ElgharabawyKMBW22, author = {Mounir Elgharabawy and Blas Kojusner and Mohammad Mannan and Kevin R. B. Butler and Byron Williams and Amr M. Youssef}, title = {{SAUSAGE:} Security Analysis of Unix domain Socket usAGE in Android}, booktitle = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2022, Genoa, Italy, June 6-10, 2022}, pages = {572--586}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EuroSP53844.2022.00042}, doi = {10.1109/EUROSP53844.2022.00042}, timestamp = {Wed, 29 Jun 2022 16:03:24 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ElgharabawyKMBW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ElSheikhY22, author = {Muhammad ElSheikh and Amr M. Youssef}, editor = {Shin'ichiro Matsuo and Lewis Gudgeon and Ariah Klages{-}Mundt and Daniel Perez Hernandez and Sam Werner and Thomas Haines and Aleksander Essex and Andrea Bracciali and Massimiliano Sala}, title = {Dispute-Free Scalable Open Vote Network Using zk-SNARKs}, booktitle = {Financial Cryptography and Data Security. {FC} 2022 International Workshops - CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13412}, pages = {499--515}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32415-4\_31}, doi = {10.1007/978-3-031-32415-4\_31}, timestamp = {Wed, 26 Jul 2023 08:43:08 +0200}, biburl = {https://dblp.org/rec/conf/fc/ElSheikhY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/KapoorPMY22, author = {Pranay Kapoor and Rohan Pagey and Mohammad Mannan and Amr M. Youssef}, editor = {Fengjun Li and Kaitai Liang and Zhiqiang Lin and Sokratis K. Katsikas}, title = {Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly}, booktitle = {Security and Privacy in Communication Networks - 18th {EAI} International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {462}, pages = {673--691}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25538-0\_35}, doi = {10.1007/978-3-031-25538-0\_35}, timestamp = {Thu, 06 Jul 2023 17:45:42 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/KapoorPMY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/SamarasingheAMY22, author = {Nayanamana Samarasinghe and Aashish Adhikari and Mohammad Mannan and Amr M. Youssef}, editor = {Fr{\'{e}}d{\'{e}}rique Laforest and Rapha{\"{e}}l Troncy and Elena Simperl and Deepak Agarwal and Aristides Gionis and Ivan Herman and Lionel M{\'{e}}dini}, title = {Et tu, Brute? Privacy Analysis of Government Websites and Mobile Apps}, booktitle = {{WWW} '22: The {ACM} Web Conference 2022, Virtual Event, Lyon, France, April 25 - 29, 2022}, pages = {564--575}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3485447.3512223}, doi = {10.1145/3485447.3512223}, timestamp = {Thu, 23 Jun 2022 19:54:34 +0200}, biburl = {https://dblp.org/rec/conf/www/SamarasingheAMY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-03363, author = {Muhammad ElSheikh and Amr M. Youssef}, title = {Dispute-free Scalable Open Vote Network using zk-SNARKs}, journal = {CoRR}, volume = {abs/2203.03363}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.03363}, doi = {10.48550/ARXIV.2203.03363}, eprinttype = {arXiv}, eprint = {2203.03363}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-03363.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-01516, author = {Mounir Elgharabawy and Blas Kojusner and Mohammad Mannan and Kevin R. B. Butler and Byron Williams and Amr M. Youssef}, title = {{SAUSAGE:} Security Analysis of Unix domain Socket Usage in Android}, journal = {CoRR}, volume = {abs/2204.01516}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.01516}, doi = {10.48550/ARXIV.2204.01516}, eprinttype = {arXiv}, eprint = {2204.01516}, timestamp = {Wed, 06 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-01516.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-09335, author = {Hisham S. Galal and Mohammad Mannan and Amr M. Youssef}, title = {Blindfold: Keeping Private Keys in PKIs and CDNs out of Sight}, journal = {CoRR}, volume = {abs/2207.09335}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.09335}, doi = {10.48550/ARXIV.2207.09335}, eprinttype = {arXiv}, eprint = {2207.09335}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-09335.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElSheikhY22, author = {Muhammad ElSheikh and Amr M. Youssef}, title = {Dispute-free Scalable Open Vote Network using zk-SNARKs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {310}, year = {2022}, url = {https://eprint.iacr.org/2022/310}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ElSheikhY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csysl/AbdelwahabLY21, author = {Ahmed Abdelwahab and Walter Lucia and Amr M. Youssef}, title = {Covert Channels in Cyber-Physical Systems}, journal = {{IEEE} Control. Syst. Lett.}, volume = {5}, number = {4}, pages = {1273--1278}, year = {2021}, url = {https://doi.org/10.1109/LCSYS.2020.3033059}, doi = {10.1109/LCSYS.2020.3033059}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csysl/AbdelwahabLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/AliEDMY21, author = {Suzan Ali and Mounir Elgharabawy and Quentin Duchaussoy and Mohammad Mannan and Amr M. Youssef}, title = {Parental Controls: Safer Internet Solutions or New Pitfalls?}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {36--46}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3076150}, doi = {10.1109/MSEC.2021.3076150}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/AliEDMY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-cps/LuciaY21, author = {Walter Lucia and Amr M. Youssef}, title = {Covert channels in stochastic cyber-physical systems}, journal = {{IET} Cyper-Phys. Syst.: Theory {\&} Appl.}, volume = {6}, number = {4}, pages = {228--237}, year = {2021}, url = {https://doi.org/10.1049/cps2.12020}, doi = {10.1049/CPS2.12020}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-cps/LuciaY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/ElbayoumiHY21, author = {Mohammed Elbayoumi and Walaa Hamouda and Amr M. Youssef}, title = {Multiple-Association Supporting {HTC/MTC} in Limited-Backhaul Capacity Ultra-Dense Networks}, journal = {{IEEE} Trans. Commun.}, volume = {69}, number = {6}, pages = {4113--4127}, year = {2021}, url = {https://doi.org/10.1109/TCOMM.2021.3062649}, doi = {10.1109/TCOMM.2021.3062649}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/ElbayoumiHY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CabanaYDLKAA21, author = {Olivier Cabana and Amr M. Youssef and Mourad Debbabi and Bernard Lebel and Marthe Kassouf and Ribal Atallah and Basile L. Agba}, title = {Threat Intelligence Generation Using Network Telescope Data for Industrial Control Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {3355--3370}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3078261}, doi = {10.1109/TIFS.2021.3078261}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CabanaYDLKAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/KhanEYS21, author = {Omniyah Gul M. Khan and Ehab F. El{-}Saadany and Amr M. Youssef and Mostafa F. Shaaban}, title = {Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {12}, pages = {8142--8153}, year = {2021}, url = {https://doi.org/10.1109/TII.2021.3065714}, doi = {10.1109/TII.2021.3065714}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/KhanEYS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/SeifelnasrAY21, author = {Mohamed Seifelnasr and Riham AlTawy and Amr M. Youssef}, title = {Efficient Inter-Cloud Authentication and Micropayment Protocol for IoT Edge Computing}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {18}, number = {4}, pages = {4420--4433}, year = {2021}, url = {https://doi.org/10.1109/TNSM.2021.3103509}, doi = {10.1109/TNSM.2021.3103509}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/SeifelnasrAY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ElSheikhY21, author = {Muhammad ElSheikh and Amr M. Youssef}, editor = {Joonsang Baek and Sushmita Ruj}, title = {On MILP-Based Automatic Search for Bit-Based Division Property for Ciphers with (Large) Linear Layers}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {111--131}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_6}, doi = {10.1007/978-3-030-90567-5\_6}, timestamp = {Mon, 08 Nov 2021 16:43:35 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ElSheikhY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/AbdelwahabLY21, author = {Ahmed Abdelwahab and Walter Lucia and Amr M. Youssef}, title = {Covert Channels in Cyber-Physical Systems}, booktitle = {2021 American Control Conference, {ACC} 2021, New Orleans, LA, USA, May 25-28, 2021}, pages = {4649--4654}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/ACC50511.2021.9483078}, doi = {10.23919/ACC50511.2021.9483078}, timestamp = {Fri, 30 Jul 2021 11:11:12 +0200}, biburl = {https://dblp.org/rec/conf/amcc/AbdelwahabLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GalalY21, author = {Hisham S. Galal and Amr M. Youssef}, editor = {Matthew Bernhard and Andrea Bracciali and Lewis Gudgeon and Thomas Haines and Ariah Klages{-}Mundt and Shin'ichiro Matsuo and Daniel Perez and Massimiliano Sala and Sam Werner}, title = {Publicly Verifiable and Secrecy Preserving Periodic Auctions}, booktitle = {Financial Cryptography and Data Security. {FC} 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12676}, pages = {348--363}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-63958-0\_29}, doi = {10.1007/978-3-662-63958-0\_29}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/GalalY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ElbayoumiHY21, author = {Mohammed Elbayoumi and Walaa Hamouda and Amr M. Youssef}, title = {Ergodic Secrecy Rate Analysis of Ultra-Dense Networks with Multiple Antennas}, booktitle = {{ICC} 2021 - {IEEE} International Conference on Communications, Montreal, QC, Canada, June 14-23, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICC42927.2021.9500938}, doi = {10.1109/ICC42927.2021.9500938}, timestamp = {Mon, 09 Aug 2021 11:13:44 +0200}, biburl = {https://dblp.org/rec/conf/icc/ElbayoumiHY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/UddinMY21, author = {Md Shahab Uddin and Mohammad Mannan and Amr M. Youssef}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Shujun Li and Radha Poovendran and Herv{\'{e}} Debar and Moti Yung}, title = {Horus: {A} Security Assessment Framework for Android Crypto Wallets}, booktitle = {Security and Privacy in Communication Networks - 17th {EAI} International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {399}, pages = {120--139}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90022-9\_7}, doi = {10.1007/978-3-030-90022-9\_7}, timestamp = {Tue, 23 Nov 2021 14:40:29 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/UddinMY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wf-iot/NakkarAY21, author = {Mouna Nakkar and Riham AlTawy and Amr M. Youssef}, title = {Lightweight Authentication and Key Agreement Protocol for Edge Computing Applications}, booktitle = {7th {IEEE} World Forum on Internet of Things, WF-IoT 2021, New Orleans, LA, USA, June 14 - July 31, 2021}, pages = {415--420}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/WF-IoT51360.2021.9595939}, doi = {10.1109/WF-IOT51360.2021.9595939}, timestamp = {Tue, 16 Nov 2021 08:53:09 +0100}, biburl = {https://dblp.org/rec/conf/wf-iot/NakkarAY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-09153, author = {Omniyah Gul M. Khan and Ehab F. El{-}Saadany and Amr M. Youssef and Mostafa F. Shaaban}, title = {Impact of Electric Vehicles Botnets on the Power Grid}, journal = {CoRR}, volume = {abs/2103.09153}, year = {2021}, url = {https://arxiv.org/abs/2103.09153}, eprinttype = {arXiv}, eprint = {2103.09153}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-09153.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-01011, author = {Amir Mohammad Naseri and Walter Lucia and Mohammad Mannan and Amr M. Youssef}, title = {On Securing Cloud-hosted Cyber-physical Systems Using Trusted Execution Environments}, journal = {CoRR}, volume = {abs/2104.01011}, year = {2021}, url = {https://arxiv.org/abs/2104.01011}, eprinttype = {arXiv}, eprint = {2104.01011}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-01011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-03509, author = {Walter Lucia and Amr M. Youssef}, title = {Wyner wiretap-like encoding scheme for cyber-physical systems}, journal = {CoRR}, volume = {abs/2105.03509}, year = {2021}, url = {https://arxiv.org/abs/2105.03509}, eprinttype = {arXiv}, eprint = {2105.03509}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-03509.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-13312, author = {Omniyah Gul M. Khan and Amr M. Youssef and Ehab F. El{-}Saadany and Magdy M. A. Salama}, title = {LSTM-based approach to detect cyber attacks on market-based congestion management methods}, journal = {CoRR}, volume = {abs/2109.13312}, year = {2021}, url = {https://arxiv.org/abs/2109.13312}, eprinttype = {arXiv}, eprint = {2109.13312}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-13312.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElSheikhY21, author = {Muhammad ElSheikh and Amr M. Youssef}, title = {On MILP-based Automatic Search for Bit-Based Division Property for Ciphers with (large) Linear Layers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {643}, year = {2021}, url = {https://eprint.iacr.org/2021/643}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElSheikhY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/AlrabaeeDSWYRNMHH20, author = {Saed Alrabaee and Mourad Debbabi and Paria Shirani and Lingyu Wang and Amr M. Youssef and Ashkan Rahimian and Lina Nouh and Djedjiga Mouheb and He Huang and Aiman Hanna}, title = {Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting}, series = {Advances in Information Security}, volume = {78}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-34238-8}, doi = {10.1007/978-3-030-34238-8}, isbn = {978-3-030-34237-1}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/AlrabaeeDSWYRNMHH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/ElbayoumiKHY20, author = {Mohammed Elbayoumi and Mahmoud I. Kamel and Walaa Hamouda and Amr M. Youssef}, title = {NOMA-Assisted Machine-Type Communications in {UDN:} State-of-the-Art and Challenges}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {22}, number = {2}, pages = {1276--1304}, year = {2020}, url = {https://doi.org/10.1109/COMST.2020.2977845}, doi = {10.1109/COMST.2020.2977845}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/ElbayoumiKHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-cps/AyadFYE20, author = {Abdelrahman Ayad and Hany E. Z. Farag and Amr M. Youssef and Ehab F. El{-}Saadany}, title = {Cyber-physical attacks on power distribution systems}, journal = {{IET} Cyper-Phys. Syst.: Theory {\&} Appl.}, volume = {5}, number = {2}, pages = {218--225}, year = {2020}, url = {https://doi.org/10.1049/iet-cps.2019.0032}, doi = {10.1049/IET-CPS.2019.0032}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-cps/AyadFYE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-cps/LuciaY20, author = {Walter Lucia and Amr M. Youssef}, title = {Wyner wiretap-like encoding scheme for cyber-physical systems}, journal = {{IET} Cyper-Phys. Syst.: Theory {\&} Appl.}, volume = {5}, number = {4}, pages = {359--365}, year = {2020}, url = {https://doi.org/10.1049/iet-cps.2020.0012}, doi = {10.1049/IET-CPS.2020.0012}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-cps/LuciaY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/KamelHY20, author = {Mahmoud I. Kamel and Walaa Hamouda and Amr M. Youssef}, title = {Uplink Performance of NOMA-Based Combined {HTC} and {MTC} in Ultradense Networks}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {8}, pages = {7319--7333}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.2984805}, doi = {10.1109/JIOT.2020.2984805}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/KamelHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/NakkarAY20, author = {Mouna Nakkar and Riham AlTawy and Amr M. Youssef}, title = {Lightweight Broadcast Authentication Protocol for Edge-Based Applications}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {12}, pages = {11766--11777}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.3002221}, doi = {10.1109/JIOT.2020.3002221}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/NakkarAY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AmeliHEY20, author = {Amir Ameli and Ali Hooshyar and Ehab F. El{-}Saadany and Amr M. Youssef}, title = {An Intrusion Detection Method for Line Current Differential Relays}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {329--344}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2916331}, doi = {10.1109/TIFS.2019.2916331}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AmeliHEY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/KamelHY20, author = {Mahmoud I. Kamel and Walaa Hamouda and Amr M. Youssef}, title = {Uplink Coverage and Capacity Analysis of mMTC in Ultra-Dense Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {69}, number = {1}, pages = {746--759}, year = {2020}, url = {https://doi.org/10.1109/TVT.2019.2954233}, doi = {10.1109/TVT.2019.2954233}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/KamelHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AliEDMY20, author = {Suzan Ali and Mounir Elgharabawy and Quentin Duchaussoy and Mohammad Mannan and Amr M. Youssef}, title = {Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {69--83}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427287}, doi = {10.1145/3427228.3427287}, timestamp = {Tue, 15 Dec 2020 12:22:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AliEDMY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/TolbaEY20, author = {Mohamed Tolba and Muhammad ElSheikh and Amr M. Youssef}, editor = {Abderrahmane Nitaj and Amr M. Youssef}, title = {Impossible Differential Cryptanalysis of Reduced-Round Tweakable {TWINE}}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12174}, pages = {91--113}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51938-4\_5}, doi = {10.1007/978-3-030-51938-4\_5}, timestamp = {Tue, 07 Jul 2020 13:21:59 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/TolbaEY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ElSheikhY20, author = {Muhammad ElSheikh and Amr M. Youssef}, editor = {Stephan Krenn and Haya Schulmann and Serge Vaudenay}, title = {Integral Cryptanalysis of Reduced-Round Tweakable {TWINE}}, booktitle = {Cryptology and Network Security - 19th International Conference, {CANS} 2020, Vienna, Austria, December 14-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12579}, pages = {485--504}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65411-5\_24}, doi = {10.1007/978-3-030-65411-5\_24}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/cans/ElSheikhY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccta/AbdelwahabLY20, author = {Ahmed Abdelwahab and Walter Lucia and Amr M. Youssef}, title = {Set-Theoretic Control for Active Detection of Replay Attacks with Applications to Smart Grid}, booktitle = {2020 {IEEE} Conference on Control Technology and Applications, {CCTA} 2020, Montreal, QC, Canada, August 24-26, 2020}, pages = {1004--1009}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CCTA41146.2020.9206373}, doi = {10.1109/CCTA41146.2020.9206373}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccta/AbdelwahabLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudnet/SeifelnasrNYA20, author = {Mohamed Seifelnasr and Mouna Nakkar and Amr M. Youssef and Riham AlTawy}, editor = {Oscar M. Caicedo}, title = {A Lightweight Authentication and Inter-Cloud Payment Protocol for Edge Computing}, booktitle = {9th {IEEE} International Conference on Cloud Networking, CloudNet 2020, Piscataway, NJ, USA, November 9-11, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CloudNet51028.2020.9335814}, doi = {10.1109/CLOUDNET51028.2020.9335814}, timestamp = {Mon, 15 Feb 2021 11:28:43 +0100}, biburl = {https://dblp.org/rec/conf/cloudnet/SeifelnasrNYA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GalalY20, author = {Hisham S. Galal and Amr M. Youssef}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Jordi Herrera{-}Joancomart{\'{\i}}}, title = {Privacy Preserving Netting Protocol for Inter-bank Payments}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2020 International Workshops, {DPM} 2020 and {CBT} 2020, Guildford, UK, September 17-18, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12484}, pages = {319--334}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-66172-4\_21}, doi = {10.1007/978-3-030-66172-4\_21}, timestamp = {Tue, 12 Jan 2021 14:44:40 +0100}, biburl = {https://dblp.org/rec/conf/esorics/GalalY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/SeifelnasrGY20, author = {Mohamed Seifelnasr and Hisham S. Galal and Amr M. Youssef}, editor = {Matthew Bernhard and Andrea Bracciali and L. Jean Camp and Shin'ichiro Matsuo and Alana Maurushat and Peter B. R{\o}nne and Massimiliano Sala}, title = {Scalable Open-Vote Network on Ethereum}, booktitle = {Financial Cryptography and Data Security - {FC} 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12063}, pages = {436--450}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-54455-3\_31}, doi = {10.1007/978-3-030-54455-3\_31}, timestamp = {Sun, 09 Aug 2020 16:11:05 +0200}, biburl = {https://dblp.org/rec/conf/fc/SeifelnasrGY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ElbayoumiHY20, author = {Mohammed Elbayoumi and Walaa Hamouda and Amr M. Youssef}, title = {A Hybrid {NOMA/OMA} Scheme for {MTC} in Ultra-Dense Networks}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2020, Virtual Event, Taiwan, December 7-11, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/GLOBECOM42002.2020.9322207}, doi = {10.1109/GLOBECOM42002.2020.9322207}, timestamp = {Mon, 01 Feb 2021 08:43:43 +0100}, biburl = {https://dblp.org/rec/conf/globecom/ElbayoumiHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ElbayoumiHY20a, author = {Mohammed Elbayoumi and Walaa Hamouda and Amr M. Youssef}, title = {Secrecy Performance in Ultra-Dense Networks with Multiple Associations}, booktitle = {{IEEE} Globecom Workshops, {GLOBECOM} Workshops 2020, Virtual Event, Taiwan, December 7-11, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/GCWkshps50303.2020.9367510}, doi = {10.1109/GCWKSHPS50303.2020.9367510}, timestamp = {Thu, 11 Mar 2021 09:42:16 +0100}, biburl = {https://dblp.org/rec/conf/globecom/ElbayoumiHY20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/StobertSMMY20, author = {Elizabeth Stobert and Tina Safaie and Heather Molyneaux and Mohammad Mannan and Amr M. Youssef}, editor = {Noseong Park and Kun Sun and Sara Foresti and Kevin R. B. Butler and Nitesh Saxena}, title = {ByPass: Reconsidering the Usability of Password Managers}, booktitle = {Security and Privacy in Communication Networks - 16th {EAI} International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {335}, pages = {446--466}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-63086-7\_24}, doi = {10.1007/978-3-030-63086-7\_24}, timestamp = {Tue, 15 Dec 2020 15:14:02 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/StobertSMMY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/africacrypt/2020, editor = {Abderrahmane Nitaj and Amr M. Youssef}, title = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12174}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51938-4}, doi = {10.1007/978-3-030-51938-4}, isbn = {978-3-030-51937-7}, timestamp = {Tue, 07 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-13456, author = {Mohammed Elbayoumi and Walaa Hamouda and Amr M. Youssef}, title = {Multiple-Association Supporting {HTC/MTC} in Limited-Backhaul Capacity Ultra-Dense Networks}, journal = {CoRR}, volume = {abs/2009.13456}, year = {2020}, url = {https://arxiv.org/abs/2009.13456}, eprinttype = {arXiv}, eprint = {2009.13456}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-13456.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-06502, author = {Suzan Ali and Mounir Elgharabawy and Quentin Duchaussoy and Mohammad Mannan and Amr M. Youssef}, title = {Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions}, journal = {CoRR}, volume = {abs/2012.06502}, year = {2020}, url = {https://arxiv.org/abs/2012.06502}, eprinttype = {arXiv}, eprint = {2012.06502}, timestamp = {Wed, 03 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-06502.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SeifelnasrGY20, author = {Mohamed Seifelnasr and Hisham S. Galal and Amr M. Youssef}, title = {Scalable Open-Vote Network on Ethereum}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2020}, url = {https://eprint.iacr.org/2020/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SeifelnasrGY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TolbaEY20, author = {Mohamed Tolba and Muhammad ElSheikh and Amr M. Youssef}, title = {Impossible Differential Cryptanalysis of Reduced-Round Tweakable {TWINE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2020}, url = {https://eprint.iacr.org/2020/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TolbaEY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElSheikhY20, author = {Muhammad ElSheikh and Amr M. Youssef}, title = {A cautionary note on the use of Gurobi for cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1112}, year = {2020}, url = {https://eprint.iacr.org/2020/1112}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElSheikhY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElSheikhY20a, author = {Muhammad ElSheikh and Amr M. Youssef}, title = {Integral Cryptanalysis of Reduced-Round Tweakable {TWINE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1227}, year = {2020}, url = {https://eprint.iacr.org/2020/1227}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ElSheikhY20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ShashaMMY19, author = {Sharon Shasha and Moustafa Mahmoud and Mohammad Mannan and Amr M. Youssef}, title = {Playing With Danger: {A} Taxonomy and Evaluation of Threats to Smart Toys}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {2}, pages = {2986--3002}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2877749}, doi = {10.1109/JIOT.2018.2877749}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ShashaMMY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/KhalafYE19, author = {Mohsen Khalaf and Amr M. Youssef and Ehab F. El{-}Saadany}, title = {Joint Detection and Mitigation of False Data Injection Attacks in {AGC} Systems}, journal = {{IEEE} Trans. Smart Grid}, volume = {10}, number = {5}, pages = {4985--4995}, year = {2019}, url = {https://doi.org/10.1109/TSG.2018.2872120}, doi = {10.1109/TSG.2018.2872120}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/KhalafYE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OsmanMHY19, author = {Tousif Osman and Mohammad Mannan and Urs Hengartner and Amr M. Youssef}, editor = {David Balenson}, title = {AppVeto: mobile application self-defense through resource access veto}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {366--377}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359839}, doi = {10.1145/3359789.3359839}, timestamp = {Tue, 26 Nov 2019 09:46:34 +0100}, biburl = {https://dblp.org/rec/conf/acsac/OsmanMHY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/ElSheikh0Y19, author = {Muhammad ElSheikh and Ahmed Abdelkhalek and Amr M. Youssef}, editor = {Johannes Buchmann and Abderrahmane Nitaj and Tajje{-}eddine Rachidi}, title = {On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11627}, pages = {273--296}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-23696-0\_14}, doi = {10.1007/978-3-030-23696-0\_14}, timestamp = {Tue, 02 Jul 2019 13:10:56 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/ElSheikh0Y19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/CabanaYDLKA19, author = {Olivier Cabana and Amr M. Youssef and Mourad Debbabi and Bernard Lebel and Marthe Kassouf and Basile L. Agba}, editor = {Roberto Perdisci and Cl{\'{e}}mentine Maurice and Giorgio Giacinto and Magnus Almgren}, title = {Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11543}, pages = {89--108}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22038-9\_5}, doi = {10.1007/978-3-030-22038-9\_5}, timestamp = {Tue, 29 Dec 2020 18:36:17 +0100}, biburl = {https://dblp.org/rec/conf/dimva/CabanaYDLKA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AliOMY19, author = {Suzan Ali and Tousif Osman and Mohammad Mannan and Amr M. Youssef}, editor = {Cristina P{\'{e}}rez{-}Sol{\`{a}} and Guillermo Navarro{-}Arribas and Alex Biryukov and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {On Privacy Risks of Public WiFi Captive Portals}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2019 International Workshops, {DPM} 2019 and {CBT} 2019, Luxembourg, September 26-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11737}, pages = {80--98}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31500-9\_6}, doi = {10.1007/978-3-030-31500-9\_6}, timestamp = {Mon, 05 Feb 2024 20:29:40 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AliOMY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GalalEY19, author = {Hisham S. Galal and Muhammad ElSheikh and Amr M. Youssef}, editor = {Cristina P{\'{e}}rez{-}Sol{\`{a}} and Guillermo Navarro{-}Arribas and Alex Biryukov and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {An Efficient Micropayment Channel on Ethereum}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2019 International Workshops, {DPM} 2019 and {CBT} 2019, Luxembourg, September 26-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11737}, pages = {211--218}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31500-9\_13}, doi = {10.1007/978-3-030-31500-9\_13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GalalEY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ElSheikhCY19, author = {Muhammad ElSheikh and Jeremy Clark and Amr M. Youssef}, editor = {Andrea Bracciali and Jeremy Clark and Federico Pintore and Peter B. R{\o}nne and Massimiliano Sala}, title = {Short Paper: Deploying PayWord on Ethereum}, booktitle = {Financial Cryptography and Data Security - {FC} 2019 International Workshops, {VOTING} and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11599}, pages = {82--90}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43725-1\_7}, doi = {10.1007/978-3-030-43725-1\_7}, timestamp = {Mon, 03 Jan 2022 22:29:34 +0100}, biburl = {https://dblp.org/rec/conf/fc/ElSheikhCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GalalY19, author = {Hisham S. Galal and Amr M. Youssef}, editor = {Andrea Bracciali and Jeremy Clark and Federico Pintore and Peter B. R{\o}nne and Massimiliano Sala}, title = {Trustee: Full Privacy Preserving Vickrey Auction on Top of Ethereum}, booktitle = {Financial Cryptography and Data Security - {FC} 2019 International Workshops, {VOTING} and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11599}, pages = {190--207}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43725-1\_14}, doi = {10.1007/978-3-030-43725-1\_14}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/GalalY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccspa/ElbayoumiKHY19, author = {Mohammed Elbayoumi and Mahmoud I. Kamel and Walaa Hamouda and Amr M. Youssef}, title = {Capacity Analysis of Downlink NOMA-Based Coexistent {HTC/MTC} in {UDN}}, booktitle = {International Conference on Communications, Signal Processing, and their Applications, {ICCSPA} 2019, Sharjah, United Arab Emirates, March 19-21, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCSPA.2019.8713691}, doi = {10.1109/ICCSPA.2019.8713691}, timestamp = {Tue, 09 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccspa/ElbayoumiKHY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/AlbarakatiRKKHD19, author = {Abdullah Albarakati and Chantale Robillard and Mark Karanfil and Marthe Kassouf and Rachid Hadjidj and Mourad Debbabi and Amr M. Youssef}, title = {Security Monitoring of {IEC} 61850 Substations Using {IEC} 62351-7 Network and System Management\({}^{\mbox{1}}\)}, booktitle = {2019 {IEEE} International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2019, Beijing, China, October 21-23, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SmartGridComm.2019.8909710}, doi = {10.1109/SMARTGRIDCOMM.2019.8909710}, timestamp = {Sun, 08 Dec 2019 17:30:04 +0100}, biburl = {https://dblp.org/rec/conf/smartgridcomm/AlbarakatiRKKHD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/ElSheikhY19, author = {Muhammad ElSheikh and Amr M. Youssef}, editor = {Shivam Bhasin and Avi Mendelson and Mridul Nandi}, title = {Related-Key Differential Cryptanalysis of Full Round {CRAFT}}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, {SPACE} 2019, Gandhinagar, India, December 3-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11947}, pages = {50--66}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35869-3\_6}, doi = {10.1007/978-3-030-35869-3\_6}, timestamp = {Fri, 22 Nov 2019 13:35:40 +0100}, biburl = {https://dblp.org/rec/conf/space/ElSheikhY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-06280, author = {Hisham S. Galal and Amr M. Youssef}, title = {Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum}, journal = {CoRR}, volume = {abs/1905.06280}, year = {2019}, url = {http://arxiv.org/abs/1905.06280}, eprinttype = {arXiv}, eprint = {1905.06280}, timestamp = {Tue, 28 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-06280.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-02142, author = {Suzan Ali and Tousif Osman and Mohammad Mannan and Amr M. Youssef}, title = {On Privacy Risks of Public WiFi Captive Portals}, journal = {CoRR}, volume = {abs/1907.02142}, year = {2019}, url = {http://arxiv.org/abs/1907.02142}, eprinttype = {arXiv}, eprint = {1907.02142}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-02142.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalalY19, author = {Hisham S. Galal and Amr M. Youssef}, title = {Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2019}, url = {https://eprint.iacr.org/2019/102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalalY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElSheikhAY19, author = {Muhammad ElSheikh and Ahmed Abdelkhalek and Amr M. Youssef}, title = {On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {476}, year = {2019}, url = {https://eprint.iacr.org/2019/476}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElSheikhAY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElSheikhY19, author = {Muhammad ElSheikh and Amr M. Youssef}, title = {Related-key Differential Cryptanalysis of Full Round {CRAFT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {932}, year = {2019}, url = {https://eprint.iacr.org/2019/932}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElSheikhY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalalEY19, author = {Hisham S. Galal and Muhammad ElSheikh and Amr M. Youssef}, title = {An Efficient Micropayment Channel on Ethereum}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1322}, year = {2019}, url = {https://eprint.iacr.org/2019/1322}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalalEY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ElSheikhTY18, author = {Muhammad ElSheikh and Mohamed Tolba and Amr M. Youssef}, title = {Impossible Differential Attack on Reduced Round {SPARX-128/256}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {4}, pages = {731--733}, year = {2018}, url = {https://doi.org/10.1587/transfun.E101.A.731}, doi = {10.1587/TRANSFUN.E101.A.731}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ElSheikhTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/AbdelkhalekTY18, author = {Ahmed Abdelkhalek and Mohamed Tolba and Amr M. Youssef}, title = {Related-Key Differential Attack on Round-Reduced Bel-T-256}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {5}, pages = {859--862}, year = {2018}, url = {https://doi.org/10.1587/transfun.E101.A.859}, doi = {10.1587/TRANSFUN.E101.A.859}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/AbdelkhalekTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AmeliHYEY18, author = {Amir Ameli and Ali Hooshyar and Ameen Hassan Yazdavar and Ehab F. El{-}Saadany and Amr M. Youssef}, title = {Attack Detection for Load Frequency Control Systems Using Stochastic Unknown Input Estimators}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2575--2590}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2824253}, doi = {10.1109/TIFS.2018.2824253}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AmeliHYEY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WakedMY18, author = {Louis Waked and Mohammad Mannan and Amr M. Youssef}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {To Intercept or Not to Intercept: Analyzing {TLS} Interception in Network Appliances}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {399--412}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196528}, doi = {10.1145/3196494.3196528}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WakedMY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GalalY18, author = {Hisham S. Galal and Amr M. Youssef}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Giovanni Livraga and Ruben Rios}, title = {Succinctly Verifiable Sealed-Bid Auction Smart Contract}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2018 International Workshops, {DPM} 2018 and {CBT} 2018, Barcelona, Spain, September 6-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11025}, pages = {3--19}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00305-0\_1}, doi = {10.1007/978-3-030-00305-0\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GalalY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GalalY18, author = {Hisham S. Galal and Amr M. Youssef}, editor = {Aviv Zohar and Ittay Eyal and Vanessa Teague and Jeremy Clark and Andrea Bracciali and Federico Pintore and Massimiliano Sala}, title = {Verifiable Sealed-Bid Auction on the Ethereum Blockchain}, booktitle = {Financial Cryptography and Data Security - {FC} 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura{\c{c}}ao, March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10958}, pages = {265--278}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-662-58820-8\_18}, doi = {10.1007/978-3-662-58820-8\_18}, timestamp = {Wed, 16 Mar 2022 23:55:54 +0100}, biburl = {https://dblp.org/rec/conf/fc/GalalY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/DumanY18, author = {Onur Duman and Amr M. Youssef}, editor = {Nur Zincir{-}Heywood and Guillaume Bonfante and Mourad Debbabi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Fault Analysis of the New Ukrainian Hash Function Standard: Kupyna}, booktitle = {Foundations and Practice of Security - 11th International Symposium, {FPS} 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11358}, pages = {225--240}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-18419-3\_15}, doi = {10.1007/978-3-030-18419-3\_15}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/DumanY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/KamelHY18, author = {Mahmoud I. Kamel and Walaa Hamouda and Amr M. Youssef}, title = {Uplink Coverage of Machine-Type Communications in Ultra-Dense Networks}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi, United Arab Emirates, December 9-13, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/GLOCOM.2018.8648146}, doi = {10.1109/GLOCOM.2018.8648146}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/KamelHY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isgt/AyadFYE18, author = {Abdelrahman Ayad and Hany E. Z. Farag and Amr M. Youssef and Ehab F. El{-}Saadany}, title = {Detection of false data injection attacks in smart grids using Recurrent Neural Networks}, booktitle = {2018 {IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies Conference, {ISGT} 2018, Washington, DC, USA, February 19-22, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISGT.2018.8403355}, doi = {10.1109/ISGT.2018.8403355}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isgt/AyadFYE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/ElSheikhTY18, author = {Muhammad ElSheikh and Mohamed Tolba and Amr M. Youssef}, editor = {Carlos Cid and Michael J. Jacobson Jr.}, title = {Integral Attacks on Round-Reduced Bel-T-256}, booktitle = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11349}, pages = {73--91}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-10970-7\_4}, doi = {10.1007/978-3-030-10970-7\_4}, timestamp = {Wed, 25 Sep 2019 18:08:16 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/ElSheikhTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/AlbarakatiMDYAK18, author = {Abdullah Albarakati and Bassam Moussa and Mourad Debbabi and Amr M. Youssef and Basile L. Agba and Marthe Kassouf}, title = {OpenStack-Based Evaluation Framework for Smart Grid Cyber Security}, booktitle = {2018 {IEEE} International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018, Aalborg, Denmark, October 29-31, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SmartGridComm.2018.8587420}, doi = {10.1109/SMARTGRIDCOMM.2018.8587420}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/AlbarakatiMDYAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-05556, author = {Sharon Shasha and Moustafa Mahmoud and Mohammad Mannan and Amr M. Youssef}, title = {Smart But Unsafe: Experimental Evaluation of Security and Privacy Practices in Smart Toys}, journal = {CoRR}, volume = {abs/1809.05556}, year = {2018}, url = {http://arxiv.org/abs/1809.05556}, eprinttype = {arXiv}, eprint = {1809.05556}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-05556.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-08729, author = {Louis Waked and Mohammad Mannan and Amr M. Youssef}, title = {The Sorry State of {TLS} Security in Enterprise Interception Appliances}, journal = {CoRR}, volume = {abs/1809.08729}, year = {2018}, url = {http://arxiv.org/abs/1809.08729}, eprinttype = {arXiv}, eprint = {1809.08729}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-08729.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalalY18, author = {Hisham S. Galal and Amr M. Youssef}, title = {Verifiable Sealed-Bid Auction on the Ethereum Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {704}, year = {2018}, url = {https://eprint.iacr.org/2018/704}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalalY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Tolba0Y17, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, title = {Improved Multiple Impossible Differential Cryptanalysis of Midori128}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {8}, pages = {1733--1737}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.1733}, doi = {10.1587/TRANSFUN.E100.A.1733}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Tolba0Y17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/DumanY17, author = {Onur Duman and Amr M. Youssef}, title = {Fault analysis on Kalyna}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {26}, number = {5}, pages = {249--265}, year = {2017}, url = {https://doi.org/10.1080/19393555.2017.1371361}, doi = {10.1080/19393555.2017.1371361}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/DumanY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/KamelHY17, author = {Mahmoud I. Kamel and Walaa Hamouda and Amr M. Youssef}, title = {Performance Analysis of Multiple Association in Ultra-Dense Networks}, journal = {{IEEE} Trans. Commun.}, volume = {65}, number = {9}, pages = {3818--3831}, year = {2017}, url = {https://doi.org/10.1109/TCOMM.2017.2706261}, doi = {10.1109/TCOMM.2017.2706261}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/KamelHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcps/AlTawyY17, author = {Riham AlTawy and Amr M. Youssef}, title = {Security, Privacy, and Safety Aspects of Civilian Drones: {A} Survey}, journal = {{ACM} Trans. Cyber Phys. Syst.}, volume = {1}, number = {2}, pages = {7:1--7:25}, year = {2017}, url = {https://doi.org/10.1145/3001836}, doi = {10.1145/3001836}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcps/AlTawyY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/0001STTY17, author = {Ahmed Abdelkhalek and Yu Sasaki and Yosuke Todo and Mohamed Tolba and Amr M. Youssef}, title = {{MILP} Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {99--129}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i4.99-129}, doi = {10.13154/TOSC.V2017.I4.99-129}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/0001STTY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wcl/KamelHY17, author = {Mahmoud I. Kamel and Walaa Hamouda and Amr M. Youssef}, title = {Physical Layer Security in Ultra-Dense Networks}, journal = {{IEEE} Wirel. Commun. Lett.}, volume = {6}, number = {5}, pages = {690--693}, year = {2017}, url = {https://doi.org/10.1109/LWC.2017.2731840}, doi = {10.1109/LWC.2017.2731840}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wcl/KamelHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/Tolba0Y17, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, editor = {Marc Joye and Abderrahmane Nitaj}, title = {Impossible Differential Cryptanalysis of Reduced-Round {SKINNY}}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2017 - 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10239}, pages = {117--134}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57339-7\_7}, doi = {10.1007/978-3-319-57339-7\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/Tolba0Y17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/0001TY17, author = {Ahmed Abdelkhalek and Mohamed Tolba and Amr M. Youssef}, editor = {Marc Joye and Abderrahmane Nitaj}, title = {Impossible Differential Attack on Reduced Round {SPARX-64/128}}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2017 - 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10239}, pages = {135--146}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57339-7\_8}, doi = {10.1007/978-3-319-57339-7\_8}, timestamp = {Wed, 10 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/0001TY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuangYD17, author = {He Huang and Amr M. Youssef and Mourad Debbabi}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {155--166}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3052974}, doi = {10.1145/3052973.3052974}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HuangYD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/KamelHY17, author = {Mahmoud I. Kamel and Walaa Hamouda and Amr M. Youssef}, title = {Coverage and Capacity Analysis with Stretched Exponential Path Loss in Ultra-Dense Networks}, booktitle = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore, December 4-8, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/GLOCOM.2017.8254566}, doi = {10.1109/GLOCOM.2017.8254566}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/KamelHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/KamelHY17, author = {Mahmoud I. Kamel and Walaa Hamouda and Amr M. Youssef}, title = {Average downlink rate in Ultra-Dense Networks}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris, France, May 21-25, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICC.2017.7996629}, doi = {10.1109/ICC.2017.7996629}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/KamelHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/TolbaY17, author = {Mohamed Tolba and Amr M. Youssef}, editor = {Howon Kim and Dong{-}Chan Kim}, title = {Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik}, booktitle = {Information Security and Cryptology - {ICISC} 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10779}, pages = {26--38}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-78556-1\_2}, doi = {10.1007/978-3-319-78556-1\_2}, timestamp = {Thu, 02 Mar 2023 10:53:05 +0100}, biburl = {https://dblp.org/rec/conf/icisc/TolbaY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icm2/MahmoudNY17, author = {Moustafa Mahmoud and Mouna Nakkar and Amr M. Youssef}, title = {A power analysis resistant {FPGA} implementation of NTRUEncrypt}, booktitle = {29th International Conference on Microelectronics, {ICM} 2017, Beirut, Lebanon, December 10-13, 2017}, pages = {1--4}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICM.2017.8268818}, doi = {10.1109/ICM.2017.8268818}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icm2/MahmoudNY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icm2/NakkarMY17, author = {Mouna Nakkar and Moustafa Mahmoud and Amr M. Youssef}, title = {Fault analysis-resistant implementation of Rainbow Signature scheme}, booktitle = {29th International Conference on Microelectronics, {ICM} 2017, Beirut, Lebanon, December 10-13, 2017}, pages = {1--5}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICM.2017.8268841}, doi = {10.1109/ICM.2017.8268841}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icm2/NakkarMY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/KamelHY17, author = {Mahmoud I. Kamel and Walaa Hamouda and Amr M. Youssef}, title = {Downlink coverage and average cell load of {M2M} and {H2H} in ultra-dense networks}, booktitle = {28th {IEEE} Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, {PIMRC} 2017, Montreal, QC, Canada, October 8-13, 2017}, pages = {1--5}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/PIMRC.2017.8292419}, doi = {10.1109/PIMRC.2017.8292419}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/KamelHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/AlTawyEYG17, author = {Riham AlTawy and Muhammad ElSheikh and Amr M. Youssef and Guang Gong}, title = {Lelantos: {A} Blockchain-Based Anonymous Physical Delivery System}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {15--24}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00013}, doi = {10.1109/PST.2017.00013}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/AlTawyEYG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Tolba0Y17, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, editor = {Carlisle Adams and Jan Camenisch}, title = {Multidimensional Zero-Correlation Linear Cryptanalysis of Reduced Round {SPARX-128}}, booktitle = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10719}, pages = {423--441}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72565-9\_22}, doi = {10.1007/978-3-319-72565-9\_22}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Tolba0Y17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stast/MahmoudHBMY17, author = {Moustafa Mahmoud and Md Zakir Hossen and Hesham Barakat and Mohammad Mannan and Amr M. Youssef}, editor = {Giampaolo Bella and Gabriele Lenzini}, title = {Towards a comprehensive analytical framework for smart toy privacy practices}, booktitle = {Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, {STAST} 2017, Orlando, FL, USA, December 5, 2017}, pages = {64--75}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3167996.3168002}, doi = {10.1145/3167996.3168002}, timestamp = {Wed, 21 Apr 2021 15:28:24 +0200}, biburl = {https://dblp.org/rec/conf/stast/MahmoudHBMY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlTawyEYG17, author = {Riham AlTawy and Muhammad ElSheikh and Amr M. Youssef and Guang Gong}, title = {Lelantos: {A} Blockchain-based Anonymous Physical Delivery System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {465}, year = {2017}, url = {http://eprint.iacr.org/2017/465}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlTawyEYG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AlTawyY16, author = {Riham AlTawy and Amr M. Youssef}, title = {Security Tradeoffs in Cyber Physical Systems: {A} Case Study Survey on Implantable Medical Devices}, journal = {{IEEE} Access}, volume = {4}, pages = {959--979}, year = {2016}, url = {https://doi.org/10.1109/ACCESS.2016.2521727}, doi = {10.1109/ACCESS.2016.2521727}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AlTawyY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/KamelHY16, author = {Mahmoud I. Kamel and Walaa Hamouda and Amr M. Youssef}, title = {Ultra-Dense Networks: {A} Survey}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {18}, number = {4}, pages = {2522--2545}, year = {2016}, url = {https://doi.org/10.1109/COMST.2016.2571730}, doi = {10.1109/COMST.2016.2571730}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/KamelHY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/AlTawy0Y16, author = {Riham AlTawy and Ahmed Abdelkhalek and Amr M. Youssef}, title = {A Meet-in-the-Middle Attack on Reduced-Round Kalyna-\emph{b}/2\emph{b}}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {99-D}, number = {4}, pages = {1246--1250}, year = {2016}, url = {https://doi.org/10.1587/transinf.2015EDL8174}, doi = {10.1587/TRANSINF.2015EDL8174}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/AlTawy0Y16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/TolbaAY16, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, title = {A Meet in the Middle Attack on Reduced Round Kiasu-BC}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {99-A}, number = {10}, pages = {1888--1890}, year = {2016}, url = {https://doi.org/10.1587/transfun.E99.A.1888}, doi = {10.1587/TRANSFUN.E99.A.1888}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/TolbaAY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/TolbaY16, author = {Mohamed Tolba and Amr M. Youssef}, title = {Generalized MitM attacks on full {TWINE}}, journal = {Inf. Process. Lett.}, volume = {116}, number = {2}, pages = {128--135}, year = {2016}, url = {https://doi.org/10.1016/j.ipl.2015.09.011}, doi = {10.1016/J.IPL.2015.09.011}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/TolbaY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/KamelHY16, author = {Mahmoud I. Kamel and Walaa Hamouda and Amr M. Youssef}, title = {Multiple association in ultra-dense networks}, booktitle = {2016 {IEEE} International Conference on Communications, {ICC} 2016, Kuala Lumpur, Malaysia, May 22-27, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICC.2016.7511520}, doi = {10.1109/ICC.2016.7511520}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/KamelHY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Tolba0Y16, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Truncated and Multiple Differential Cryptanalysis of Reduced Round Midori128}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {3--17}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_1}, doi = {10.1007/978-3-319-45871-7\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/Tolba0Y16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/0001TY16, author = {Ahmed Abdelkhalek and Mohamed Tolba and Amr M. Youssef}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Improved Linear Cryptanalysis of Round-Reduced {ARIA}}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {18--34}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_2}, doi = {10.1007/978-3-319-45871-7\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/0001TY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mownet/ZhuYH16, author = {Fu Zhu and Amr M. Youssef and Walaa Hamouda}, title = {Detection techniques for data-level spoofing in GPS-based phasor measurement units}, booktitle = {International Conference on Selected Topics in Mobile {\&} Wireless Networking, MoWNeT 2016, Cairo, Egypt, April 11-13, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/MoWNet.2016.7496634}, doi = {10.1109/MOWNET.2016.7496634}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mownet/ZhuYH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TolbaAY16, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, title = {Impossible Differential Cryptanalysis of Reduced-Round {SKINNY}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1115}, year = {2016}, url = {http://eprint.iacr.org/2016/1115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TolbaAY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/AlTawyY15, author = {Riham AlTawy and Amr M. Youssef}, title = {A Meet in the Middle Attack on Reduced Round Kuznyechik}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {10}, pages = {2194--2198}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.2194}, doi = {10.1587/TRANSFUN.E98.A.2194}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/AlTawyY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/AlTawyY15, author = {Riham AlTawy and Amr M. Youssef}, title = {Watch your constants: malicious Streebog}, journal = {{IET} Inf. Secur.}, volume = {9}, number = {6}, pages = {328--333}, year = {2015}, url = {https://doi.org/10.1049/iet-ifs.2014.0540}, doi = {10.1049/IET-IFS.2014.0540}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/AlTawyY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c2si/AlTawyTY15, author = {Riham AlTawy and Mohamed Tolba and Amr M. Youssef}, editor = {Said El Hajji and Abderrahmane Nitaj and Claude Carlet and El Mamoun Souidi}, title = {A Higher Order Key Partitioning Attack with Application to LBlock}, booktitle = {Codes, Cryptology, and Information Security - First International Conference, {C2SI} 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger}, series = {Lecture Notes in Computer Science}, volume = {9084}, pages = {215--227}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18681-8\_17}, doi = {10.1007/978-3-319-18681-8\_17}, timestamp = {Tue, 27 Aug 2019 17:49:45 +0200}, biburl = {https://dblp.org/rec/conf/c2si/AlTawyTY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c2si/AbdelkhalekAY15, author = {Ahmed Abdelkhalek and Riham AlTawy and Amr M. Youssef}, editor = {Said El Hajji and Abderrahmane Nitaj and Claude Carlet and El Mamoun Souidi}, title = {Impossible Differential Properties of Reduced Round Streebog}, booktitle = {Codes, Cryptology, and Information Security - First International Conference, {C2SI} 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger}, series = {Lecture Notes in Computer Science}, volume = {9084}, pages = {274--286}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18681-8\_22}, doi = {10.1007/978-3-319-18681-8\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/c2si/AbdelkhalekAY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/AlTawyY15, author = {Riham AlTawy and Amr M. Youssef}, editor = {Javier L{\'{o}}pez and Yongdong Wu}, title = {Differential Fault Analysis of Streebog}, booktitle = {Information Security Practice and Experience - 11th International Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9065}, pages = {35--49}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17533-1\_3}, doi = {10.1007/978-3-319-17533-1\_3}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/ispec/AlTawyY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/AbdelkhalekATY15, author = {Ahmed Abdelkhalek and Riham AlTawy and Mohamed Tolba and Amr M. Youssef}, editor = {Kristin E. Lauter and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9230}, pages = {187--203}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22174-8\_11}, doi = {10.1007/978-3-319-22174-8\_11}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/AbdelkhalekATY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lightsec/TolbaAY15, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, editor = {Tim G{\"{u}}neysu and Gregor Leander and Amir Moradi}, title = {Meet-in-the-Middle Attacks on Reduced Round Piccolo}, booktitle = {Lightweight Cryptography for Security and Privacy - 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9542}, pages = {3--20}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29078-2\_1}, doi = {10.1007/978-3-319-29078-2\_1}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/lightsec/TolbaAY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/AlTawyY15, author = {Riham AlTawy and Amr M. Youssef}, editor = {Rajat Subhra Chakraborty and Peter Schwabe and Jon A. Solworth}, title = {Preimage Analysis of the Maelstrom-0 Hash Function}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9354}, pages = {113--126}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24126-5\_7}, doi = {10.1007/978-3-319-24126-5\_7}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/AlTawyY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/TolbaAY15, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, editor = {Rajat Subhra Chakraborty and Peter Schwabe and Jon A. Solworth}, title = {Meet-in-the-Middle Attacks on Round-Reduced Khudra}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9354}, pages = {127--138}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24126-5\_8}, doi = {10.1007/978-3-319-24126-5\_8}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/space/TolbaAY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/AbdelkhalekTY15, author = {Ahmed Abdelkhalek and Mohamed Tolba and Amr M. Youssef}, editor = {Rajat Subhra Chakraborty and Peter Schwabe and Jon A. Solworth}, title = {Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9354}, pages = {139--150}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24126-5\_9}, doi = {10.1007/978-3-319-24126-5\_9}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/space/AbdelkhalekTY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlTawyY15, author = {Riham AlTawy and Amr M. Youssef}, title = {Meet in the Middle Attacks on Reduced Round Kuznyechik}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2015}, url = {http://eprint.iacr.org/2015/096}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlTawyY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlTawyDY15, author = {Riham AlTawy and Onur Duman and Amr M. Youssef}, title = {Fault Analysis of Kuznyechik}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {347}, year = {2015}, url = {http://eprint.iacr.org/2015/347}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlTawyDY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlTawyAY15, author = {Riham AlTawy and Ahmed Abdelkhalek and Amr M. Youssef}, title = {A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {762}, year = {2015}, url = {http://eprint.iacr.org/2015/762}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlTawyAY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/AlTawyY14, author = {Riham AlTawy and Amr M. Youssef}, title = {Integral distinguishers for reduced-round Stribog}, journal = {Inf. Process. Lett.}, volume = {114}, number = {8}, pages = {426--431}, year = {2014}, url = {https://doi.org/10.1016/j.ipl.2014.03.005}, doi = {10.1016/J.IPL.2014.03.005}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/AlTawyY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/AlTawyY14, author = {Riham AlTawy and Amr M. Youssef}, editor = {David Pointcheval and Damien Vergnaud}, title = {Preimage Attacks on Reduced-Round Stribog}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8469}, pages = {109--125}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06734-6\_7}, doi = {10.1007/978-3-319-06734-6\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/AlTawyY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/AlTawyY14, author = {Riham AlTawy and Amr M. Youssef}, editor = {Dongdai Lin and Moti Yung and Jianying Zhou}, title = {Second Preimage Analysis of Whirlwind}, booktitle = {Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8957}, pages = {311--328}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16745-9\_17}, doi = {10.1007/978-3-319-16745-9\_17}, timestamp = {Fri, 09 Apr 2021 18:52:22 +0200}, biburl = {https://dblp.org/rec/conf/cisc/AlTawyY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/KaraBMYD14, author = {A. Mert Kara and Hamad Binsalleeh and Mohammad Mannan and Amr M. Youssef and Mourad Debbabi}, title = {Detection of malicious payload distribution channels in {DNS}}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney, Australia, June 10-14, 2014}, pages = {853--858}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICC.2014.6883426}, doi = {10.1109/ICC.2014.6883426}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/KaraBMYD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lightsec/AlTawyY14, author = {Riham AlTawy and Amr M. Youssef}, editor = {Thomas Eisenbarth and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk}, title = {Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock}, booktitle = {Lightweight Cryptography for Security and Privacy - Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8898}, pages = {126--139}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16363-5\_8}, doi = {10.1007/978-3-319-16363-5\_8}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/lightsec/AlTawyY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/BinsalleehKYD14, author = {Hamad Binsalleeh and A. Mert Kara and Amr M. Youssef and Mourad Debbabi}, editor = {Mohamad Badra and Omar Alfandi}, title = {Characterization of Covert Channels in {DNS}}, booktitle = {6th International Conference on New Technologies, Mobility and Security, {NTMS} 2014, Dubai, United Arab Emirates, March 30 - April 2, 2014}, pages = {1--5}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/NTMS.2014.6814008}, doi = {10.1109/NTMS.2014.6814008}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ntms/BinsalleehKYD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacrypt/2014, editor = {Antoine Joux and Amr M. Youssef}, title = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8781}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13051-4}, doi = {10.1007/978-3-319-13051-4}, isbn = {978-3-319-13050-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlTawyY14, author = {Riham AlTawy and Amr M. Youssef}, title = {Preimage attacks on Reduced-round Stribog}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {319}, year = {2014}, url = {http://eprint.iacr.org/2014/319}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlTawyY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlTawyY14a, author = {Riham AlTawy and Amr M. Youssef}, title = {Watch your Constants: Malicious Streebog}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {879}, year = {2014}, url = {http://eprint.iacr.org/2014/879}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlTawyY14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/AlTawyKY13, author = {Riham AlTawy and Aleksandar Kircanski and Amr M. Youssef}, title = {Second order collision for the 42-step reduced {DHA-256} hash function}, journal = {Inf. Process. Lett.}, volume = {113}, number = {19-21}, pages = {764--770}, year = {2013}, url = {https://doi.org/10.1016/j.ipl.2013.07.015}, doi = {10.1016/J.IPL.2013.07.015}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/AlTawyKY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/KamalY13, author = {Abdel Alim Kamal and Amr M. Youssef}, title = {Cryptanalysis of {\'{A}}lvarez et al. key exchange scheme}, journal = {Inf. Sci.}, volume = {223}, pages = {317--321}, year = {2013}, url = {https://doi.org/10.1016/j.ins.2012.10.010}, doi = {10.1016/J.INS.2012.10.010}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/KamalY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/HayatleOY13, author = {Osama Hayatle and Hadi Otrok and Amr M. Youssef}, title = {A Markov Decision Process Model for High Interaction Honeypots}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {22}, number = {4}, pages = {159--170}, year = {2013}, url = {https://doi.org/10.1080/19393555.2013.828802}, doi = {10.1080/19393555.2013.828802}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/HayatleOY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KamalY13, author = {Abdel Alim Kamal and Amr M. Youssef}, title = {Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {4}, pages = {227--240}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0061-7}, doi = {10.1007/S13389-013-0061-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/KamalY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KamalZY13, author = {Abdel Alim Kamal and Roger Zahno and Amr M. Youssef}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {75--90}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_6}, doi = {10.1007/978-3-642-40588-4\_6}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KamalZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KircanskiAY13, author = {Aleksandar Kircanski and Riham AlTawy and Amr M. Youssef}, editor = {Kazue Sako and Palash Sarkar}, title = {A Heuristic for Finding Compatible Differential Paths with Application to {HAS-160}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {464--483}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_24}, doi = {10.1007/978-3-642-42045-0\_24}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KircanskiAY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/AlTawyKY13, author = {Riham AlTawy and Aleksandar Kircanski and Amr M. Youssef}, editor = {Hyang{-}Sook Lee and Dong{-}Guk Han}, title = {Rebound Attacks on Stribog}, booktitle = {Information Security and Cryptology - {ICISC} 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8565}, pages = {175--188}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12160-4\_11}, doi = {10.1007/978-3-319-12160-4\_11}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/AlTawyKY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secnet/ShinwariYH13, author = {Merwais Shinwari and Amr M. Youssef and Walaa Hamouda}, editor = {Ali Ismail Awad and Aboul Ella Hassanien and Kensuke Baba}, title = {A Privacy Preserving Approach to Smart Metering}, booktitle = {Advances in Security of Information and Communication Networks - First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings}, series = {Communications in Computer and Information Science}, volume = {381}, pages = {164--176}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40597-6\_14}, doi = {10.1007/978-3-642-40597-6\_14}, timestamp = {Wed, 19 May 2021 08:32:23 +0200}, biburl = {https://dblp.org/rec/conf/secnet/ShinwariYH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/africacrypt/2013, editor = {Amr M. Youssef and Abderrahmane Nitaj and Aboul Ella Hassanien}, title = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7918}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38553-7}, doi = {10.1007/978-3-642-38553-7}, isbn = {978-3-642-38552-0}, timestamp = {Fri, 31 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KircanskiAY13, author = {Aleksandar Kircanski and Riham AlTawy and Amr M. Youssef}, title = {A heuristic for finding compatible differential paths with application to {HAS-160}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {359}, year = {2013}, url = {http://eprint.iacr.org/2013/359}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KircanskiAY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlTawyKY13, author = {Riham AlTawy and Aleksandar Kircanski and Amr M. Youssef}, title = {Rebound attacks on Stribog}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {539}, year = {2013}, url = {http://eprint.iacr.org/2013/539}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlTawyKY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlTawyY13, author = {Riham AlTawy and Amr M. Youssef}, title = {Integral Distinguishers for Reduced-round Stribog}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {648}, year = {2013}, url = {http://eprint.iacr.org/2013/648}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlTawyY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/KamalY12, author = {Abdel Alim Kamal and Amr M. Youssef}, title = {Cryptanalysis of a key exchange protocol based on the endomorphisms ring End ({\(\mathbb{Z}\)}\({}_{\mbox{p}}\) {\texttimes} {\(\mathbb{Z}\)}\({}_{\mbox{p\({}^{\mbox{2}}\)}}\))}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {23}, number = {3-4}, pages = {143--149}, year = {2012}, url = {https://doi.org/10.1007/s00200-012-0170-z}, doi = {10.1007/S00200-012-0170-Z}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/KamalY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KamalY12, author = {Abdel Alim Kamal and Amr M. Youssef}, title = {Fault analysis of the NTRUSign digital signature scheme}, journal = {Cryptogr. Commun.}, volume = {4}, number = {2}, pages = {131--144}, year = {2012}, url = {https://doi.org/10.1007/s12095-011-0061-3}, doi = {10.1007/S12095-011-0061-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KamalY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Al-ZaidyFYF12, author = {Rabeah Al{-}Zaidy and Benjamin C. M. Fung and Amr M. Youssef and Francis Fortin}, title = {Mining criminal networks from unstructured text documents}, journal = {Digit. Investig.}, volume = {8}, number = {3-4}, pages = {147--160}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2011.12.001}, doi = {10.1016/J.DIIN.2011.12.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Al-ZaidyFYF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KamalY12, author = {Abdel Alim Kamal and Amr M. Youssef}, title = {Cryptanalysis of a \emph{GL}(\emph{r}, \emph{Z\({}_{\mbox{n}}\)})-Based Public Key System}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {4}, pages = {829--831}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.829}, doi = {10.1587/TRANSFUN.E95.A.829}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KamalY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/HayatleYO12, author = {Osama Hayatle and Amr M. Youssef and Hadi Otrok}, title = {Dempster-Shafer Evidence Combining for (Anti)-Honeypot Technologies}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {21}, number = {6}, pages = {306--316}, year = {2012}, url = {https://doi.org/10.1080/19393555.2012.738375}, doi = {10.1080/19393555.2012.738375}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/HayatleYO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/ShinwariYH12, author = {Merwais Shinwari and Amr M. Youssef and Walaa Hamouda}, title = {A Water-Filling Based Scheduling Algorithm for the Smart Grid}, journal = {{IEEE} Trans. Smart Grid}, volume = {3}, number = {2}, pages = {710--719}, year = {2012}, url = {https://doi.org/10.1109/TSG.2011.2177103}, doi = {10.1109/TSG.2011.2177103}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/ShinwariYH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KircanskiY12, author = {Aleksandar Kircanski and Amr M. Youssef}, title = {On the Weak State in GGHN-like Ciphers}, booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012}, pages = {397--401}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ARES.2012.32}, doi = {10.1109/ARES.2012.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/KircanskiY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KamalY12, author = {Abdel Alim Kamal and Amr M. Youssef}, title = {A Scan-Based Side Channel Attack on the NTRUEncrypt Cryptosystem}, booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012}, pages = {402--409}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ARES.2012.14}, doi = {10.1109/ARES.2012.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/KamalY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/ZahnoY12, author = {Roger Zahno and Amr M. Youssef}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {An Obfuscated Implementation of {RC4}}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {113--129}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_13}, doi = {10.1007/978-3-642-31513-8\_13}, timestamp = {Sat, 05 Sep 2020 18:05:32 +0200}, biburl = {https://dblp.org/rec/conf/acity/ZahnoY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/HayatleOY12, author = {Osama Hayatle and Hadi Otrok and Amr M. Youssef}, title = {A game theoretic investigation for high interaction honeypots}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012}, pages = {6662--6667}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICC.2012.6364760}, doi = {10.1109/ICC.2012.6364760}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/HayatleOY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/KircanskiY12, author = {Aleksandar Kircanski and Amr M. Youssef}, editor = {Alejandro Hevia and Gregory Neven}, title = {On the Sosemanuk Related Key-IV Sets}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7533}, pages = {271--287}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33481-8\_15}, doi = {10.1007/978-3-642-33481-8\_15}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/KircanskiY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BiryukovKY12, author = {Alex Biryukov and Aleksandar Kircanski and Amr M. Youssef}, editor = {Lars R. Knudsen and Huapeng Wu}, title = {Cryptanalysis of the Loiss Stream Cipher}, booktitle = {Selected Areas in Cryptography, 19th International Conference, {SAC} 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7707}, pages = {119--134}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35999-6\_9}, doi = {10.1007/978-3-642-35999-6\_9}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BiryukovKY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/KircanskiSWY12, author = {Aleksandar Kircanski and Yanzhao Shen and Gaoli Wang and Amr M. Youssef}, editor = {Lars R. Knudsen and Huapeng Wu}, title = {Boomerang and Slide-Rotational Analysis of the {SM3} Hash Function}, booktitle = {Selected Areas in Cryptography, 19th International Conference, {SAC} 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7707}, pages = {304--320}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35999-6\_20}, doi = {10.1007/978-3-642-35999-6\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/KircanskiSWY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KircanskiY12, author = {Aleksandar Kircanski and Amr M. Youssef}, title = {Boomerang and Slide-Rotational Analysis of the {SM3} Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {274}, year = {2012}, url = {http://eprint.iacr.org/2012/274}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KircanskiY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/RasslanY11, author = {Mohamed M. Nasreldin Rasslan and Amr M. Youssef}, title = {Comments on the security of Chen's authenticated encryption scheme}, journal = {Comput. Electr. Eng.}, volume = {37}, number = {1}, pages = {71--74}, year = {2011}, url = {https://doi.org/10.1016/j.compeleceng.2010.09.001}, doi = {10.1016/J.COMPELECENG.2010.09.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/RasslanY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/Youssef11, author = {Amr M. Youssef}, title = {Cryptanalysis of a quadratic knapsack cryptosystem}, journal = {Comput. Math. Appl.}, volume = {61}, number = {4}, pages = {1261--1265}, year = {2011}, url = {https://doi.org/10.1016/j.camwa.2011.01.006}, doi = {10.1016/J.CAMWA.2011.01.006}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cma/Youssef11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/RasslanY11, author = {Mohamed M. Nasreldin Rasslan and Amr M. Youssef}, title = {Cryptanalysis of a Public Key Encryption Scheme Using Ergodic Matrices}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {2}, pages = {853--854}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.853}, doi = {10.1587/TRANSFUN.E94.A.853}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/RasslanY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KamalY11, author = {Abdel Alim Kamal and Amr M. Youssef}, title = {Fault Analysis of the NTRUEncrypt Cryptosystem}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {4}, pages = {1156--1158}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.1156}, doi = {10.1587/TRANSFUN.E94.A.1156}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KamalY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/BasyouniHY11, author = {Ayda Basyouni and Walaa Hamouda and Amr M. Youssef}, title = {Cooperative relaying protocol for energy-constrained ad hoc networks}, journal = {{IET} Commun.}, volume = {5}, number = {4}, pages = {418--424}, year = {2011}, url = {https://doi.org/10.1049/iet-com.2010.0035}, doi = {10.1049/IET-COM.2010.0035}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/BasyouniHY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/KircanskiY11, author = {Aleksandar Kircanski and Amr M. Youssef}, title = {On the sliding property of {SNOW} 3 {G} and {SNOW} 2.0}, journal = {{IET} Inf. Secur.}, volume = {5}, number = {4}, pages = {199--206}, year = {2011}, url = {https://doi.org/10.1049/iet-ifs.2011.0033}, doi = {10.1049/IET-IFS.2011.0033}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/KircanskiY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/SalehaniKY11, author = {Yaser Esmaeili Salehani and Aleksandar Kircanski and Amr M. Youssef}, editor = {Abderrahmane Nitaj and David Pointcheval}, title = {Differential Fault Analysis of Sosemanuk}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6737}, pages = {316--331}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21969-6\_20}, doi = {10.1007/978-3-642-21969-6\_20}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/SalehaniKY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/Al-ZaidyFY11, author = {Rabeah Al{-}Zaidy and Benjamin C. M. Fung and Amr M. Youssef}, editor = {William C. Chu and W. Eric Wong and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {Towards discovering criminal communities from textual data}, booktitle = {Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21 - 24, 2011}, pages = {172--177}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1982185.1982225}, doi = {10.1145/1982185.1982225}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/Al-ZaidyFY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SalehaniY11, author = {Yaser Esmaeili Salehani and Amr M. Youssef}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Differential Fault Analysis of Hummingbird}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {357--361}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SalehaniY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KircanskiY10, author = {Aleksandar Kircanski and Amr M. Youssef}, title = {On the structural weakness of the {GGHN} stream cipher}, journal = {Cryptogr. Commun.}, volume = {2}, number = {1}, pages = {1--17}, year = {2010}, url = {https://doi.org/10.1007/s12095-009-0013-3}, doi = {10.1007/S12095-009-0013-3}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KircanskiY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/Youssef10, author = {Amr M. Youssef}, title = {Cryptanalysis of Boolean permutation-based key escrow scheme}, journal = {Comput. Electr. Eng.}, volume = {36}, number = {1}, pages = {56--60}, year = {2010}, url = {https://doi.org/10.1016/j.compeleceng.2009.04.004}, doi = {10.1016/J.COMPELECENG.2009.04.004}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/Youssef10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KhanBY10, author = {Liaqat Ali Khan and Muhammad Shamim Baig and Amr M. Youssef}, title = {Speaker recognition from encrypted VoIP communications}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {65--73}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2009.10.001}, doi = {10.1016/J.DIIN.2009.10.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KhanBY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/RasslanY10, author = {Mohamed M. Nasreldin Rasslan and Amr M. Youssef}, title = {Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {93-D}, number = {5}, pages = {1301--1302}, year = {2010}, url = {https://doi.org/10.1587/transinf.E93.D.1301}, doi = {10.1587/TRANSINF.E93.D.1301}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/RasslanY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/BasyouniHY10, author = {Ayda Basyouni and Walaa Hamouda and Amr M. Youssef}, title = {Improved channel access protocol for cooperative ad hoc networks}, journal = {{IET} Commun.}, volume = {4}, number = {8}, pages = {915--923}, year = {2010}, url = {https://doi.org/10.1049/iet-com.2009.0461}, doi = {10.1049/IET-COM.2009.0461}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/BasyouniHY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/AssraHY10, author = {Ayman Assra and Walaa Hamouda and Amr M. Youssef}, title = {EM-Based Joint Channel Estimation and Data Detection for {MIMO-CDMA} Systems}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {59}, number = {3}, pages = {1205--1216}, year = {2010}, url = {https://doi.org/10.1109/TVT.2009.2038925}, doi = {10.1109/TVT.2009.2038925}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/AssraHY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/AssraHY10a, author = {Ayman Assra and Walaa Hamouda and Amr M. Youssef}, title = {A Channel-Estimation and Data-Detection Scheme for Multiuser {MIMO-CDMA} Systems in Fading Channels}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {59}, number = {6}, pages = {2830--2844}, year = {2010}, url = {https://doi.org/10.1109/TVT.2010.2047417}, doi = {10.1109/TVT.2010.2047417}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/AssraHY10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/KircanskiY10, author = {Aleksandar Kircanski and Amr M. Youssef}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Differential Fault Analysis of {HC-128}}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {261--278}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_16}, doi = {10.1007/978-3-642-12678-9\_16}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/KircanskiY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/AssraHY10, author = {Ayman Assra and Walaa Hamouda and Amr M. Youssef}, title = {Joint Iterative Channel Estimation and Data Detection for {MIMO-CDMA} Systems over Frequency-Selective Fading Channels}, booktitle = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM} 2010, 6-10 December 2010, Miami, Florida, {USA}}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/GLOCOM.2010.5683248}, doi = {10.1109/GLOCOM.2010.5683248}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/AssraHY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/BasyouniHY10, author = {Ayda Basyouni and Walaa Hamouda and Amr M. Youssef}, title = {A New Rate Control Technique for cdma2000 1xEV}, booktitle = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM} 2010, 6-10 December 2010, Miami, Florida, {USA}}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/GLOCOM.2010.5683712}, doi = {10.1109/GLOCOM.2010.5683712}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/BasyouniHY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isspit/ShiZY10, author = {Peipei Shi and Bo Zhu and Amr M. Youssef}, title = {A framework to strengthen password authentication using mobile devices and browser extensions}, booktitle = {Proceedings of the {IEEE} International Symposium on Signal Processing and Information Technology, {ISSPIT} 2010, December 15-18,2010, Luxor, Egypt}, pages = {73--78}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ISSPIT.2010.5711728}, doi = {10.1109/ISSPIT.2010.5711728}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isspit/ShiZY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isspit/ElshehY10, author = {Esam Elsheh and Amr M. Youssef}, title = {On the security of image encryption schemes based on Multiple Parameters Transforms}, booktitle = {Proceedings of the {IEEE} International Symposium on Signal Processing and Information Technology, {ISSPIT} 2010, December 15-18,2010, Luxor, Egypt}, pages = {97--101}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ISSPIT.2010.5711735}, doi = {10.1109/ISSPIT.2010.5711735}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isspit/ElshehY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/BinsalleehOBSYDW10, author = {Hamad Binsalleeh and Thomas C. Ormerod and Amine Boukhtouta and Prosenjit Sinha and Amr M. Youssef and Mourad Debbabi and Lingyu Wang}, title = {On the analysis of the Zeus botnet crimeware toolkit}, booktitle = {Eighth Annual Conference on Privacy, Security and Trust, {PST} 2010, August 17-19, 2010, Ottawa, Ontario, Canada}, pages = {31--38}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/PST.2010.5593240}, doi = {10.1109/PST.2010.5593240}, timestamp = {Sat, 27 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/BinsalleehOBSYDW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securware/OrmerodWDYBBS10, author = {Thomas C. Ormerod and Lingyu Wang and Mourad Debbabi and Amr M. Youssef and Hamad Binsalleeh and Amine Boukhtouta and Prosenjit Sinha}, editor = {Reijo Savola and Masaru Takesue and Rainer Falk and Manuela Popescu}, title = {Defaming Botnet Toolkits: {A} Bottom-Up Approach to Mitigating the Threat}, booktitle = {Fourth International Conference on Emerging Security Information Systems and Technologies, {SECURWARE} 2010, Venice, Italy, July 18-25, 2010}, pages = {195--200}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SECURWARE.2010.39}, doi = {10.1109/SECURWARE.2010.39}, timestamp = {Sat, 27 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securware/OrmerodWDYBBS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securware/KamalY10, author = {Abdel Alim Kamal and Amr M. Youssef}, editor = {Reijo Savola and Masaru Takesue and Rainer Falk and Manuela Popescu}, title = {Applications of {SAT} Solvers to {AES} Key Recovery from Decayed Key Schedule Images}, booktitle = {Fourth International Conference on Emerging Security Information Systems and Technologies, {SECURWARE} 2010, Venice, Italy, July 18-25, 2010}, pages = {216--220}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SECURWARE.2010.42}, doi = {10.1109/SECURWARE.2010.42}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securware/KamalY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/AssraHY10, author = {Ayman Assra and Walaa Hamouda and Amr M. Youssef}, title = {{EM} Channel Estimation and Data Detection for {MIMO-CDMA} Systems over Slow-Fading Channels}, booktitle = {Proceedings of the 72nd {IEEE} Vehicular Technology Conference, {VTC} Fall 2010, 6-9 September 2010, Ottawa, Canada}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/VETECF.2010.5594161}, doi = {10.1109/VETECF.2010.5594161}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vtc/AssraHY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wimo/RasslanY10, author = {Mohamed Rasslan and Amr M. Youssef}, editor = {Abdulkadir {\"{O}}zcan and Nabendu Chaki and Dhinaharan Nagamalai}, title = {A Bilinear Pairing Based Hidden-Signature Scheme}, booktitle = {Recent Trends in Wireless and Mobile Networks - Second International Conference, WiMo 2010, Ankara, Turkey, June 26-28, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {84}, pages = {389--397}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14171-3\_34}, doi = {10.1007/978-3-642-14171-3\_34}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wimo/RasslanY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KamalY10, author = {Abdel Alim Kamal and Amr M. Youssef}, title = {Applications of {SAT} Solvers to {AES} key Recovery from Decayed Key Schedule Images}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {324}, year = {2010}, url = {http://eprint.iacr.org/2010/324}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KamalY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KircanskiAY09, author = {Aleksandar Kircanski and Rabeah Al{-}Zaidy and Amr M. Youssef}, title = {A new distinguishing and key recovery attack on {NGG} stream cipher}, journal = {Cryptogr. Commun.}, volume = {1}, number = {2}, pages = {269--282}, year = {2009}, url = {https://doi.org/10.1007/s12095-009-0012-4}, doi = {10.1007/S12095-009-0012-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KircanskiAY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/AssraHY09, author = {Ayman Assra and Walaa Hamouda and Amr M. Youssef}, title = {{BER} analysis of space-time diversity in {CDMA} systems over frequency-selective fading channels}, journal = {{IET} Commun.}, volume = {3}, number = {7}, pages = {1216--1226}, year = {2009}, url = {https://doi.org/10.1049/iet-com.2008.0559}, doi = {10.1049/IET-COM.2008.0559}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/AssraHY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/Youssef09, author = {Amr M. Youssef}, title = {Cryptanalysis of a knapsack-based probabilistic encryption scheme}, journal = {Inf. Sci.}, volume = {179}, number = {18}, pages = {3116--3121}, year = {2009}, url = {https://doi.org/10.1016/j.ins.2009.05.015}, doi = {10.1016/J.INS.2009.05.015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/Youssef09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/LiuY09, author = {Wen Ming Liu and Amr M. Youssef}, title = {On the Existence of (10, 2, 7, 488) Resilient Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {55}, number = {1}, pages = {411--412}, year = {2009}, url = {https://doi.org/10.1109/TIT.2008.2008140}, doi = {10.1109/TIT.2008.2008140}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/LiuY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/AssraHY09, author = {Ayman Assra and Walaa Hamouda and Amr M. Youssef}, title = {Performance of Superimposed Training-Based Channel Estimation in {MIMO-CDMA} Systems}, booktitle = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM} 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/GLOCOM.2009.5426268}, doi = {10.1109/GLOCOM.2009.5426268}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/AssraHY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/BasyouniHY09, author = {Ayda Basyouni and Walaa Hamouda and Amr M. Youssef}, title = {On Reducing Blocking Probability in Cooperative Ad-hoc Networks}, booktitle = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM} 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/GLOCOM.2009.5425571}, doi = {10.1109/GLOCOM.2009.5425571}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/BasyouniHY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShiZY09, author = {Peipei Shi and Bo Zhu and Amr M. Youssef}, title = {A rotary {PIN} entry scheme resilient to shoulder-surfing}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402625}, doi = {10.1109/ICITST.2009.5402625}, timestamp = {Mon, 09 Aug 2021 17:01:45 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShiZY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/KircanskiY09, author = {Aleksandar Kircanski and Amr M. Youssef}, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {Differential Fault Analysis of Rabbit}, booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, pages = {197--214}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7\_13}, doi = {10.1007/978-3-642-05445-7\_13}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/KircanskiY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securware/ShiZY09, author = {Peipei Shi and Bo Zhu and Amr M. Youssef}, editor = {Rainer Falk and Wilson Goudalo and Eric Y. Chen and Reijo Savola and Manuela Popescu}, title = {A {PIN} Entry Scheme Resistant to Recording-Based Shoulder-Surfing}, booktitle = {The Third International Conference on Emerging Security Information, Systems and Technologies, {SECURWARE} 2009, 18-23 June 2009, Athens/Glyfada, Greece}, pages = {237--241}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SECURWARE.2009.43}, doi = {10.1109/SECURWARE.2009.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securware/ShiZY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/Al-ZaidyKY08, author = {Rabeah Al{-}Zaidy and Aleksandar Kircanski and Amr M. Youssef}, title = {Cryptanalysis of the parameterized improved fast encryption algorithm for multimedia}, journal = {{IEEE} Commun. Lett.}, volume = {12}, number = {12}, pages = {886--887}, year = {2008}, url = {https://doi.org/10.1109/LCOMM.2008.081335}, doi = {10.1109/LCOMM.2008.081335}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/Al-ZaidyKY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/Youssef08, author = {Amr M. Youssef}, title = {On the Security of a Cryptosystem Based on Multiple-Parameters Discrete Fractional Fourier Transform}, journal = {{IEEE} Signal Process. Lett.}, volume = {15}, pages = {77--78}, year = {2008}, url = {https://doi.org/10.1109/LSP.2007.910299}, doi = {10.1109/LSP.2007.910299}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spl/Youssef08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcas/Youssef08, author = {Amr M. Youssef}, title = {An Attack Against the Revised Murthy-Swamy Cryptosystem}, journal = {{IEEE} Trans. Circuits Syst. {II} Express Briefs}, volume = {55-II}, number = {2}, pages = {166--167}, year = {2008}, url = {https://doi.org/10.1109/TCSII.2007.911833}, doi = {10.1109/TCSII.2007.911833}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcas/Youssef08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/LiuHY08, author = {Kun Liu and Walaa Hamouda and Amr M. Youssef}, title = {Performance of a {MANET} directional {MAC} protocol with angle-of-arrival estimation}, journal = {Wirel. Commun. Mob. Comput.}, volume = {8}, number = {6}, pages = {759--769}, year = {2008}, url = {https://doi.org/10.1002/wcm.523}, doi = {10.1002/WCM.523}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/LiuHY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securware/KircanskiY08, author = {Aleksandar Kircanski and Amr M. Youssef}, editor = {Andr{\'{e}} Cotton and Oana Dini and Antonio Fernandez G{\'{o}}mez{-}Skarmeta and Mihaela Ion and Manuela Popescu and Masaru Takesue}, title = {A Related-Key Attack on {TREYFER}}, booktitle = {Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, {SECURWARE} 2008, August 25-31, 2008, Cap Esterel, France}, pages = {213--217}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SECURWARE.2008.51}, doi = {10.1109/SECURWARE.2008.51}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securware/KircanskiY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/AssraHY08, author = {Ayman Assra and Walaa Hamouda and Amr M. Youssef}, title = {Joint Decorrelating Channel and Data Estimation for Space-Time Spreading Systems}, booktitle = {Proceedings of the 67th {IEEE} Vehicular Technology Conference, {VTC} Spring 2008, 11-14 May 2008, Singapore}, pages = {1399--1403}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/VETECS.2008.294}, doi = {10.1109/VETECS.2008.294}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vtc/AssraHY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcas/Youssef07, author = {Amr M. Youssef}, title = {A Comment on "Cryptographic Applications of Brahmagupta-Bh{\~{a}}skara Equation"}, journal = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.}, volume = {54-I}, number = {4}, pages = {927--928}, year = {2007}, url = {https://doi.org/10.1109/TCSI.2007.893508}, doi = {10.1109/TCSI.2007.893508}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcas/Youssef07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/XuWYZ07, author = {Xuxin Xu and Lingyu Wang and Amr M. Youssef and Bo Zhu}, editor = {Jonathan Katz and Moti Yung}, title = {Preventing Collusion Attacks on the One-Way Function Tree {(OFT)} Scheme}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {177--193}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_12}, doi = {10.1007/978-3-540-72738-5\_12}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/XuWYZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/AssraHY07, author = {Ayman Assra and Walaa Hamouda and Amr M. Youssef}, title = {Performance of Space-Time Diversity in {CDMA} Over Frequency-Selective Fading Channels}, booktitle = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM} '07, Washington, DC, USA, 26-30 November 2007}, pages = {1514--1518}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/GLOCOM.2007.291}, doi = {10.1109/GLOCOM.2007.291}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/AssraHY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LiuHY07, author = {Kun Liu and Walaa Hamouda and Amr M. Youssef}, title = {ESPRIT-Based Directional {MAC} Protocol for Mobile Ad Hoc Networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007}, pages = {3654--3659}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICC.2007.602}, doi = {10.1109/ICC.2007.602}, timestamp = {Tue, 19 Jun 2018 07:53:33 +0200}, biburl = {https://dblp.org/rec/conf/icc/LiuHY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isspa/Abdel-MannanHY07, author = {Osama Abdel{-}Mannan and A. Ben Hamza and Amr M. Youssef}, title = {Incremental Hessian Locally Linear Embedding algorithm}, booktitle = {9th International Symposium on Signal Processing and Its Applications, {ISSPA} 2007, Sharjah, United Arab Emirates, February 12-15, 2007}, pages = {1--4}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISSPA.2007.4555395}, doi = {10.1109/ISSPA.2007.4555395}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isspa/Abdel-MannanHY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isspa/AssraHY07, author = {Ayman Assra and Walaa Hamouda and Amr M. Youssef}, title = {Space-time spreading and diversity in asynchronous {CDMA} systems over frequency-selective fading channels}, booktitle = {9th International Symposium on Signal Processing and Its Applications, {ISSPA} 2007, Sharjah, United Arab Emirates, February 12-15, 2007}, pages = {1--4}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISSPA.2007.4555515}, doi = {10.1109/ISSPA.2007.4555515}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isspa/AssraHY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacrypt/2006, editor = {Eli Biham and Amr M. Youssef}, title = {Selected Areas in Cryptography, 13th International Workshop, {SAC} 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4356}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74462-7}, doi = {10.1007/978-3-540-74462-7}, isbn = {978-3-540-74461-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dm/YoussefTG06, author = {Amr M. Youssef and Stafford E. Tavares and Guang Gong}, title = {On some probabilistic approximations for AES-like s-boxes}, journal = {Discret. Math.}, volume = {306}, number = {16}, pages = {2016--2020}, year = {2006}, url = {https://doi.org/10.1016/j.disc.2006.03.055}, doi = {10.1016/J.DISC.2006.03.055}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dm/YoussefTG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/YoussefG06, author = {Amr M. Youssef and Guang Gong}, title = {On linear complexity of sequences over \emph{GF}(2\({}^{\mbox{\emph{n}}}\))}, journal = {Theor. Comput. Sci.}, volume = {352}, number = {1-3}, pages = {288--292}, year = {2006}, url = {https://doi.org/10.1016/j.tcs.2005.11.044}, doi = {10.1016/J.TCS.2005.11.044}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/YoussefG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/SaberUY06, author = {Z. Saber and Mohammad Faisal Uddin and Amr M. Youssef}, title = {On the existence of (9, 3, 5, 240) resilient functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {52}, number = {5}, pages = {2269--2270}, year = {2006}, url = {https://doi.org/10.1109/TIT.2006.872862}, doi = {10.1109/TIT.2006.872862}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/SaberUY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccece/MohamedYES06, author = {S. S. Mohamed and Amr M. Youssef and E. F. El{-}Saadany and Magdy M. A. Salama}, title = {On the Use of Spectral Clustering for Prostate Tissue Characterization}, booktitle = {Proceedings of the Canadian Conference on Electrical and Computer Engineering, {CCECE} 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada}, pages = {979--982}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/CCECE.2006.277317}, doi = {10.1109/CCECE.2006.277317}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/ccece/MohamedYES06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccece/UddinY06, author = {Mohammad Faisal Uddin and Amr M. Youssef}, title = {An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers}, booktitle = {Proceedings of the Canadian Conference on Electrical and Computer Engineering, {CCECE} 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada}, pages = {1582--1585}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/CCECE.2006.277769}, doi = {10.1109/CCECE.2006.277769}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccece/UddinY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccece/WangYE06, author = {Ren Wang and Amr M. Youssef and Ahmed K. Elhakeem}, title = {On Some Feature Selection Strategies for Spam Filter Design}, booktitle = {Proceedings of the Canadian Conference on Electrical and Computer Engineering, {CCECE} 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada}, pages = {2186--2189}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/CCECE.2006.277770}, doi = {10.1109/CCECE.2006.277770}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccece/WangYE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/UddinY06, author = {Mohammad Faisal Uddin and Amr M. Youssef}, title = {Cryptanalysis of Simple Substitution Ciphers Using Particle Swarm Optimization}, booktitle = {{IEEE} International Conference on Evolutionary Computation, {CEC} 2006, part of {WCCI} 2006, Vancouver, BC, Canada, 16-21 July 2006}, pages = {677--680}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/CEC.2006.1688376}, doi = {10.1109/CEC.2006.1688376}, timestamp = {Thu, 16 Dec 2021 14:00:41 +0100}, biburl = {https://dblp.org/rec/conf/cec/UddinY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LiuHY06, author = {Kun Liu and Walaa Hamouda and Amr M. Youssef}, title = {Performance of Directional {MAC} Protocols in Ad-Hoc Networks over Fading Channels}, booktitle = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM} '06, San Francisco, CA, USA, 27 November - 1 December 2006}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/GLOCOM.2006.504}, doi = {10.1109/GLOCOM.2006.504}, timestamp = {Fri, 21 Feb 2020 18:38:36 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LiuHY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iastedCI/WangYE06, author = {Ren Wang and Amr M. Youssef and Ahmed K. Elhakeem}, editor = {Boris Kovalerchuk}, title = {Artificial life feature selection techniques for spam e-mail filters}, booktitle = {Proceedings of the Second {IASTED} International Conference on Computational Intelligence, San Francisco, California, USA, November 20-22, 2006}, pages = {102--107}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iastedCI/WangYE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciar/MohamedYES06, author = {S. S. Mohamed and Amr M. Youssef and E. F. El{-}Saadany and Magdy M. A. Salama}, editor = {Aur{\'{e}}lio C. Campilho and Mohamed S. Kamel}, title = {Prostate Tissue Characterization Using {TRUS} Image Spectral Features}, booktitle = {Image Analysis and Recognition, Third International Conference, {ICIAR} 2006, P{\'{o}}voa de Varzim, Portugal, September 18-20, 2006, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4142}, pages = {589--601}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11867661\_53}, doi = {10.1007/11867661\_53}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciar/MohamedYES06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/miip/MohamedYES06, author = {S. S. Mohamed and Amr M. Youssef and E. F. El{-}Saadany and M. M. A. Salama}, editor = {Joseph M. Reinhardt and Josien P. W. Pluim}, title = {{AIS} {TLS-ESPRIT} feature selection for prostate tissue characterization}, booktitle = {Medical Imaging 2006: Image Processing, {MEDICAL} IMAGING, San Diego, California, United States, 11-16 February 2006}, series = {{SPIE} Proceedings}, volume = {6144}, pages = {614451}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.649274}, doi = {10.1117/12.649274}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/miip/MohamedYES06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/YoussefT05, author = {Amr M. Youssef and Stafford E. Tavares}, title = {Affine equivalence in the {AES} round function}, journal = {Discret. Appl. Math.}, volume = {148}, number = {2}, pages = {161--170}, year = {2005}, url = {https://doi.org/10.1016/j.dam.2005.02.001}, doi = {10.1016/J.DAM.2005.02.001}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/YoussefT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciar/MohamedYES05, author = {S. S. Mohamed and Amr M. Youssef and E. F. El{-}Saadany and Magdy M. A. Salama}, editor = {Mohamed S. Kamel and Aur{\'{e}}lio C. Campilho}, title = {Artificial Life Feature Selection Techniques for Prostrate Cancer Diagnosis Using {TRUS} Images}, booktitle = {Image Analysis and Recognition, Second International Conference, {ICIAR} 2005, Toronto, Canada, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3656}, pages = {903--913}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11559573\_110}, doi = {10.1007/11559573\_110}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciar/MohamedYES05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/YoussefT03, author = {Amr M. Youssef and Stafford E. Tavares}, title = {Comments on the security of fast encryption algorithm for multimedia {(FEA-M)}}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {49}, number = {1}, pages = {168--170}, year = {2003}, url = {https://doi.org/10.1109/TCE.2003.1205471}, doi = {10.1109/TCE.2003.1205471}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/YoussefT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/GongY02, author = {Guang Gong and Amr M. Youssef}, title = {Cryptographic properties of the Welch-Gong transformation sequence generators}, journal = {{IEEE} Trans. Inf. Theory}, volume = {48}, number = {11}, pages = {2837--2846}, year = {2002}, url = {https://doi.org/10.1109/TIT.2002.804043}, doi = {10.1109/TIT.2002.804043}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/GongY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YoussefT02, author = {Amr M. Youssef and Stafford E. Tavares}, title = {On Some Algebraic Structures in the {AES} Round Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {144}, year = {2002}, url = {http://eprint.iacr.org/2002/144}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YoussefT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YoussefG01, author = {Amr M. Youssef and Guang Gong}, editor = {Vijay Varadharajan and Yi Mu}, title = {Cryptanalysis of a Public Key Cryptosystem Proposed at {ACISP} 2000}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {15--20}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_3}, doi = {10.1007/3-540-47719-5\_3}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YoussefG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/YoussefG01, author = {Amr M. Youssef and Guang Gong}, editor = {Birgit Pfitzmann}, title = {Hyper-bent Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {406--419}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_25}, doi = {10.1007/3-540-44987-6\_25}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/YoussefG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/YoussefG01, author = {Amr M. Youssef and Guang Gong}, editor = {C. Pandu Rangan and Cunsheng Ding}, title = {Cryptanalysis of Imai and Matsumoto Scheme {B} Asymmetric Cryptosystem}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2247}, pages = {214--222}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45311-3\_20}, doi = {10.1007/3-540-45311-3\_20}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/YoussefG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/YoussefG01, author = {Amr M. Youssef and Guang Gong}, editor = {Serge Vaudenay and Amr M. Youssef}, title = {Boolean Functions with Large Distance to All Bijective Monomials: {N} Odd Case}, booktitle = {Selected Areas in Cryptography, 8th Annual International Workshop, {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2259}, pages = {49--59}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45537-X\_4}, doi = {10.1007/3-540-45537-X\_4}, timestamp = {Tue, 01 Jun 2021 15:22:31 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/YoussefG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacrypt/2001, editor = {Serge Vaudenay and Amr M. Youssef}, title = {Selected Areas in Cryptography, 8th Annual International Workshop, {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2259}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45537-X}, doi = {10.1007/3-540-45537-X}, isbn = {3-540-43066-0}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/YoussefG00, author = {Amr M. Youssef and Guang Gong}, editor = {Bruce Schneier}, title = {On the Interpolation Attacks on Block Ciphers}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {109--120}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_8}, doi = {10.1007/3-540-44706-7\_8}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/YoussefG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Youssef00, author = {Amr M. Youssef}, editor = {Douglas R. Stinson and Stafford E. Tavares}, title = {Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97}, booktitle = {Selected Areas in Cryptography, 7th Annual International Workshop, {SAC} 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2012}, pages = {29--38}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44983-3\_3}, doi = {10.1007/3-540-44983-3\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Youssef00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/GongY00, author = {Guang Gong and Amr M. Youssef}, editor = {Douglas R. Stinson and Stafford E. Tavares}, title = {On Welch-Gong Transformation Sequence Generators}, booktitle = {Selected Areas in Cryptography, 7th Annual International Workshop, {SAC} 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2012}, pages = {217--232}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44983-3\_16}, doi = {10.1007/3-540-44983-3\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/GongY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/YoussefT96, author = {Amr M. Youssef and Stafford E. Tavares}, title = {Comment on "Bounds on the Number of Functions Satisfying the Strict Avalanche Criterion"}, journal = {Inf. Process. Lett.}, volume = {60}, number = {5}, pages = {271--275}, year = {1996}, url = {https://doi.org/10.1016/S0020-0190(96)00166-4}, doi = {10.1016/S0020-0190(96)00166-4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/YoussefT96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/YoussefT95, author = {Amr M. Youssef and Stafford E. Tavares}, title = {Resistance of Balanced s-Boxes to Linear and Differential Cryptanalysis}, journal = {Inf. Process. Lett.}, volume = {56}, number = {5}, pages = {249--252}, year = {1995}, url = {https://doi.org/10.1016/0020-0190(95)00156-6}, doi = {10.1016/0020-0190(95)00156-6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/YoussefT95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ita/YoussefT95, author = {Amr M. Youssef and Stafford E. Tavares}, editor = {Jean{-}Yves Chouinard and Paul Fortier and T. Aaron Gulliver}, title = {Information Leakage of a Randomly Selected Boolean Function}, booktitle = {Information Theory and Applications II, 4th Canadian Workshop, Lac Delage, Qu{\'{e}}bec, Canada, May 28-30, 1995, Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {1133}, pages = {41--52}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/BFb0025134}, doi = {10.1007/BFB0025134}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/ita/YoussefT95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.