


Остановите войну!
for scientists:


default search action
Amr M. Youssef
Person information

- affiliation: Concordia University, Montreal, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j81]Mouna Nakkar, Riham AlTawy
, Amr M. Youssef
:
GASE: A Lightweight Group Authentication Scheme With Key Agreement for Edge Computing Applications. IEEE Internet Things J. 10(1): 840-854 (2023) - [j80]Hisham S. Galal
, Amr M. Youssef
:
Aegis: Privacy-Preserving Market for Non-Fungible Tokens. IEEE Trans. Netw. Sci. Eng. 10(1): 92-102 (2023) - [i39]Amir Mohammad Naseri, Walter Lucia, Amr M. Youssef:
An Observer-Based Key Agreement Scheme for Remotely Controlled Mobile Robots. CoRR abs/2303.04931 (2023) - [i38]Hisham S. Galal, Amr M. Youssef:
Aegis: Privacy-Preserving Market for Non-Fungible Tokens. IACR Cryptol. ePrint Arch. 2023: 144 (2023) - 2022
- [j79]Hisham S. Galal
, Mohammad Mannan, Amr M. Youssef:
Blindfold: Keeping private keys in PKIs and CDNs out of sight. Comput. Secur. 118: 102731 (2022) - [j78]Amir Mohammad Naseri
, Walter Lucia
, Amr M. Youssef
:
Encrypted Cloud-Based Set-Theoretic Model Predictive Control. IEEE Control. Syst. Lett. 6: 3032-3037 (2022) - [j77]Mohammed Elbayoumi
, Walaa Hamouda
, Amr M. Youssef
:
Edge Computing and Multiple-Association in Ultra-Dense Networks: Performance Analysis. IEEE Trans. Commun. 70(8): 5098-5112 (2022) - [j76]Abdullah Albarakati, Chantale Robillard, Mark Karanfil, Marthe Kassouf
, Mourad Debbabi
, Amr M. Youssef
, Mohsen Ghafouri, Rachid Hadjidj:
Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management. IEEE Trans. Ind. Informatics 18(3): 1641-1653 (2022) - [j75]Ahmad Mohammad Saber
, Amr M. Youssef
, Davor Svetinovic
, Hatem H. Zeineldin
, Ehab F. El-Saadany
:
Anomaly-Based Detection of Cyberattacks on Line Current Differential Relays. IEEE Trans. Smart Grid 13(6): 4787-4800 (2022) - [j74]Walter Lucia
, Amr M. Youssef
:
A Key-Agreement Scheme for Cyber-Physical Systems. IEEE Trans. Syst. Man Cybern. Syst. 52(8): 5368-5373 (2022) - [c122]Maryna Kluban, Mohammad Mannan, Amr M. Youssef:
On Measuring Vulnerable JavaScript Functions in the Wild. AsiaCCS 2022: 917-930 - [c121]Nayanamana Samarasinghe, Pranay Kapoor, Mohammad Mannan, Amr M. Youssef:
No Salvation from Trackers: Privacy Analysis of Religious Websites and Mobile Apps. DPM/CBT@ESORICS 2022: 151-166 - [c120]Amir Mohammad Naseri, Walter Lucia, Amr M. Youssef:
A Privacy Preserving Solution for Cloud-Enabled Set-Theoretic Model Predictive Control. ECC 2022: 894-899 - [c119]Xiufen Yu, Nayanamana Samarasinghe, Mohammad Mannan, Amr M. Youssef:
Got Sick and Tracked: Privacy Analysis of Hospital Websites. EuroS&P Workshops 2022: 278-286 - [c118]Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr M. Youssef:
SAUSAGE: Security Analysis of Unix domain Socket usAGE in Android. EuroS&P 2022: 572-586 - [c117]Nayanamana Samarasinghe, Aashish Adhikari, Mohammad Mannan, Amr M. Youssef:
Et tu, Brute? Privacy Analysis of Government Websites and Mobile Apps. WWW 2022: 564-575 - [i37]Muhammad ElSheikh, Amr M. Youssef:
Dispute-free Scalable Open Vote Network using zk-SNARKs. CoRR abs/2203.03363 (2022) - [i36]Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr M. Youssef:
SAUSAGE: Security Analysis of Unix domain Socket Usage in Android. CoRR abs/2204.01516 (2022) - [i35]Hisham S. Galal, Mohammad Mannan, Amr M. Youssef:
Blindfold: Keeping Private Keys in PKIs and CDNs out of Sight. CoRR abs/2207.09335 (2022) - [i34]Muhammad ElSheikh, Amr M. Youssef:
Dispute-free Scalable Open Vote Network using zk-SNARKs. IACR Cryptol. ePrint Arch. 2022: 310 (2022) - 2021
- [j73]Ahmed Abdelwahab
, Walter Lucia
, Amr M. Youssef
:
Covert Channels in Cyber-Physical Systems. IEEE Control. Syst. Lett. 5(4): 1273-1278 (2021) - [j72]Suzan Ali, Mounir Elgharabawy, Quentin Duchaussoy, Mohammad Mannan, Amr M. Youssef
:
Parental Controls: Safer Internet Solutions or New Pitfalls? IEEE Secur. Priv. 19(6): 36-46 (2021) - [j71]Walter Lucia
, Amr M. Youssef
:
Covert channels in stochastic cyber-physical systems. IET Cyper-Phys. Syst.: Theory & Appl. 6(4): 228-237 (2021) - [j70]Mohammed Elbayoumi
, Walaa Hamouda
, Amr M. Youssef
:
Multiple-Association Supporting HTC/MTC in Limited-Backhaul Capacity Ultra-Dense Networks. IEEE Trans. Commun. 69(6): 4113-4127 (2021) - [j69]Olivier Cabana
, Amr M. Youssef
, Mourad Debbabi, Bernard Lebel
, Marthe Kassouf
, Ribal Atallah, Basile L. Agba:
Threat Intelligence Generation Using Network Telescope Data for Industrial Control Systems. IEEE Trans. Inf. Forensics Secur. 16: 3355-3370 (2021) - [j68]Omniyah Gul M. Khan
, Ehab F. El-Saadany
, Amr M. Youssef
, Mostafa F. Shaaban
:
Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems. IEEE Trans. Ind. Informatics 17(12): 8142-8153 (2021) - [j67]Mohamed Seifelnasr, Riham AlTawy
, Amr M. Youssef
:
Efficient Inter-Cloud Authentication and Micropayment Protocol for IoT Edge Computing. IEEE Trans. Netw. Serv. Manag. 18(4): 4420-4433 (2021) - [c116]Muhammad ElSheikh, Amr M. Youssef:
On MILP-Based Automatic Search for Bit-Based Division Property for Ciphers with (Large) Linear Layers. ACISP 2021: 111-131 - [c115]Ahmed Abdelwahab, Walter Lucia, Amr M. Youssef:
Covert Channels in Cyber-Physical Systems. ACC 2021: 4649-4654 - [c114]Hisham S. Galal
, Amr M. Youssef:
Publicly Verifiable and Secrecy Preserving Periodic Auctions. Financial Cryptography Workshops 2021: 348-363 - [c113]Mohammed Elbayoumi, Walaa Hamouda, Amr M. Youssef:
Ergodic Secrecy Rate Analysis of Ultra-Dense Networks with Multiple Antennas. ICC 2021: 1-6 - [c112]Md Shahab Uddin, Mohammad Mannan, Amr M. Youssef:
Horus: A Security Assessment Framework for Android Crypto Wallets. SecureComm (2) 2021: 120-139 - [c111]Mouna Nakkar, Riham AlTawy, Amr M. Youssef:
Lightweight Authentication and Key Agreement Protocol for Edge Computing Applications. WF-IoT 2021: 415-420 - [i33]Omniyah Gul M. Khan, Ehab F. El-Saadany, Amr M. Youssef, Mostafa F. Shaaban:
Impact of Electric Vehicles Botnets on the Power Grid. CoRR abs/2103.09153 (2021) - [i32]Amir Mohammad Naseri, Walter Lucia, Mohammad Mannan, Amr M. Youssef:
On Securing Cloud-hosted Cyber-physical Systems Using Trusted Execution Environments. CoRR abs/2104.01011 (2021) - [i31]Walter Lucia, Amr M. Youssef:
Wyner wiretap-like encoding scheme for cyber-physical systems. CoRR abs/2105.03509 (2021) - [i30]Omniyah Gul M. Khan, Amr M. Youssef, Ehab F. El-Saadany, Magdy M. A. Salama:
LSTM-based approach to detect cyber attacks on market-based congestion management methods. CoRR abs/2109.13312 (2021) - [i29]Muhammad ElSheikh, Amr M. Youssef:
On MILP-based Automatic Search for Bit-Based Division Property for Ciphers with (large) Linear Layers. IACR Cryptol. ePrint Arch. 2021: 643 (2021) - 2020
- [b1]Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr M. Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna:
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting. Advances in Information Security 78, Springer 2020, ISBN 978-3-030-34237-1, pp. 1-233 - [j66]Mohammed Elbayoumi
, Mahmoud I. Kamel
, Walaa Hamouda
, Amr M. Youssef
:
NOMA-Assisted Machine-Type Communications in UDN: State-of-the-Art and Challenges. IEEE Commun. Surv. Tutorials 22(2): 1276-1304 (2020) - [j65]Abdelrahman Ayad
, Hany E. Z. Farag, Amr M. Youssef, Ehab F. El-Saadany:
Cyber-physical attacks on power distribution systems. IET Cyper-Phys. Syst.: Theory & Appl. 5(2): 218-225 (2020) - [j64]Walter Lucia
, Amr M. Youssef:
Wyner wiretap-like encoding scheme for cyber-physical systems. IET Cyper-Phys. Syst.: Theory & Appl. 5(4): 359-365 (2020) - [j63]Mahmoud I. Kamel
, Walaa Hamouda
, Amr M. Youssef
:
Uplink Performance of NOMA-Based Combined HTC and MTC in Ultradense Networks. IEEE Internet Things J. 7(8): 7319-7333 (2020) - [j62]Mouna Nakkar
, Riham AlTawy
, Amr M. Youssef
:
Lightweight Broadcast Authentication Protocol for Edge-Based Applications. IEEE Internet Things J. 7(12): 11766-11777 (2020) - [j61]Amir Ameli
, Ali Hooshyar
, Ehab F. El-Saadany
, Amr M. Youssef
:
An Intrusion Detection Method for Line Current Differential Relays. IEEE Trans. Inf. Forensics Secur. 15: 329-344 (2020) - [j60]Mahmoud I. Kamel
, Walaa Hamouda
, Amr M. Youssef
:
Uplink Coverage and Capacity Analysis of mMTC in Ultra-Dense Networks. IEEE Trans. Veh. Technol. 69(1): 746-759 (2020) - [c110]Suzan Ali, Mounir Elgharabawy, Quentin Duchaussoy, Mohammad Mannan, Amr M. Youssef:
Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions. ACSAC 2020: 69-83 - [c109]Mohamed Tolba, Muhammad ElSheikh, Amr M. Youssef:
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE. AFRICACRYPT 2020: 91-113 - [c108]Muhammad ElSheikh, Amr M. Youssef:
Integral Cryptanalysis of Reduced-Round Tweakable TWINE. CANS 2020: 485-504 - [c107]Ahmed Abdelwahab, Walter Lucia, Amr M. Youssef:
Set-Theoretic Control for Active Detection of Replay Attacks with Applications to Smart Grid. CCTA 2020: 1004-1009 - [c106]Mohamed Seifelnasr, Mouna Nakkar, Amr M. Youssef, Riham AlTawy:
A Lightweight Authentication and Inter-Cloud Payment Protocol for Edge Computing. CloudNet 2020: 1-4 - [c105]Hisham S. Galal, Amr M. Youssef:
Privacy Preserving Netting Protocol for Inter-bank Payments. DPM/CBT@ESORICS 2020: 319-334 - [c104]Mohamed Seifelnasr, Hisham S. Galal, Amr M. Youssef:
Scalable Open-Vote Network on Ethereum. Financial Cryptography Workshops 2020: 436-450 - [c103]Mohammed Elbayoumi, Walaa Hamouda, Amr M. Youssef:
A Hybrid NOMA/OMA Scheme for MTC in Ultra-Dense Networks. GLOBECOM 2020: 1-6 - [c102]Mohammed Elbayoumi, Walaa Hamouda, Amr M. Youssef:
Secrecy Performance in Ultra-Dense Networks with Multiple Associations. GLOBECOM (Workshops) 2020: 1-6 - [c101]Elizabeth Stobert, Tina Safaie, Heather Molyneaux, Mohammad Mannan, Amr M. Youssef:
ByPass: Reconsidering the Usability of Password Managers. SecureComm (1) 2020: 446-466 - [e5]Abderrahmane Nitaj
, Amr M. Youssef:
Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings. Lecture Notes in Computer Science 12174, Springer 2020, ISBN 978-3-030-51937-7 [contents] - [i28]Mohammed Elbayoumi, Walaa Hamouda, Amr M. Youssef:
Multiple-Association Supporting HTC/MTC in Limited-Backhaul Capacity Ultra-Dense Networks. CoRR abs/2009.13456 (2020) - [i27]Suzan Ali, Mounir Elgharabawy, Quentin Duchaussoy, Mohammad Mannan, Amr M. Youssef:
Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions. CoRR abs/2012.06502 (2020) - [i26]Mohamed Seifelnasr, Hisham S. Galal, Amr M. Youssef:
Scalable Open-Vote Network on Ethereum. IACR Cryptol. ePrint Arch. 2020: 33 (2020) - [i25]Mohamed Tolba, Muhammad ElSheikh, Amr M. Youssef:
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE. IACR Cryptol. ePrint Arch. 2020: 52 (2020) - [i24]Muhammad ElSheikh, Amr M. Youssef:
A cautionary note on the use of Gurobi for cryptanalysis. IACR Cryptol. ePrint Arch. 2020: 1112 (2020) - [i23]Muhammad ElSheikh, Amr M. Youssef:
Integral Cryptanalysis of Reduced-Round Tweakable TWINE. IACR Cryptol. ePrint Arch. 2020: 1227 (2020)
2010 – 2019
- 2019
- [j59]Sharon Shasha
, Moustafa Mahmoud, Mohammad Mannan
, Amr M. Youssef
:
Playing With Danger: A Taxonomy and Evaluation of Threats to Smart Toys. IEEE Internet Things J. 6(2): 2986-3002 (2019) - [j58]Mohsen Khalaf
, Amr M. Youssef
, Ehab F. El-Saadany
:
Joint Detection and Mitigation of False Data Injection Attacks in AGC Systems. IEEE Trans. Smart Grid 10(5): 4985-4995 (2019) - [c100]Tousif Osman, Mohammad Mannan, Urs Hengartner, Amr M. Youssef:
AppVeto: mobile application self-defense through resource access veto. ACSAC 2019: 366-377 - [c99]Muhammad ElSheikh, Ahmed Abdelkhalek, Amr M. Youssef:
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T. AFRICACRYPT 2019: 273-296 - [c98]Olivier Cabana, Amr M. Youssef, Mourad Debbabi, Bernard Lebel, Marthe Kassouf, Basile L. Agba:
Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems. DIMVA 2019: 89-108 - [c97]Suzan Ali, Tousif Osman, Mohammad Mannan, Amr M. Youssef:
On Privacy Risks of Public WiFi Captive Portals. DPM/CBT@ESORICS 2019: 80-98 - [c96]Hisham S. Galal
, Muhammad ElSheikh, Amr M. Youssef:
An Efficient Micropayment Channel on Ethereum. DPM/CBT@ESORICS 2019: 211-218 - [c95]Muhammad ElSheikh, Jeremy Clark, Amr M. Youssef:
Short Paper: Deploying PayWord on Ethereum. Financial Cryptography Workshops 2019: 82-90 - [c94]Hisham S. Galal
, Amr M. Youssef:
Trustee: Full Privacy Preserving Vickrey Auction on Top of Ethereum. Financial Cryptography Workshops 2019: 190-207 - [c93]Mohammed Elbayoumi, Mahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef:
Capacity Analysis of Downlink NOMA-Based Coexistent HTC/MTC in UDN. ICCSPA 2019: 1-6 - [c92]Abdullah Albarakati, Chantale Robillard, Mark Karanfil, Marthe Kassouf, Rachid Hadjidj, Mourad Debbabi, Amr M. Youssef:
Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management1. SmartGridComm 2019: 1-7 - [c91]Muhammad ElSheikh, Amr M. Youssef:
Related-Key Differential Cryptanalysis of Full Round CRAFT. SPACE 2019: 50-66 - [i22]Hisham S. Galal, Amr M. Youssef:
Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum. CoRR abs/1905.06280 (2019) - [i21]Suzan Ali, Tousif Osman, Mohammad Mannan, Amr M. Youssef:
On Privacy Risks of Public WiFi Captive Portals. CoRR abs/1907.02142 (2019) - [i20]Hisham S. Galal, Amr M. Youssef:
Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum. IACR Cryptol. ePrint Arch. 2019: 102 (2019) - [i19]Muhammad ElSheikh, Ahmed Abdelkhalek, Amr M. Youssef:
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T. IACR Cryptol. ePrint Arch. 2019: 476 (2019) - [i18]Muhammad ElSheikh, Amr M. Youssef:
Related-key Differential Cryptanalysis of Full Round CRAFT. IACR Cryptol. ePrint Arch. 2019: 932 (2019) - [i17]Hisham S. Galal, Muhammad ElSheikh, Amr M. Youssef:
An Efficient Micropayment Channel on Ethereum. IACR Cryptol. ePrint Arch. 2019: 1322 (2019) - 2018
- [j57]Muhammad ElSheikh, Mohamed Tolba, Amr M. Youssef:
Impossible Differential Attack on Reduced Round SPARX-128/256. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(4): 731-733 (2018) - [j56]Ahmed Abdelkhalek, Mohamed Tolba, Amr M. Youssef:
Related-Key Differential Attack on Round-Reduced Bel-T-256. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(5): 859-862 (2018) - [j55]Amir Ameli
, Ali Hooshyar
, Ameen Hassan Yazdavar, Ehab F. El-Saadany
, Amr M. Youssef:
Attack Detection for Load Frequency Control Systems Using Stochastic Unknown Input Estimators. IEEE Trans. Inf. Forensics Secur. 13(10): 2575-2590 (2018) - [c90]Louis Waked, Mohammad Mannan, Amr M. Youssef:
To Intercept or Not to Intercept: Analyzing TLS Interception in Network Appliances. AsiaCCS 2018: 399-412 - [c89]Hisham S. Galal
, Amr M. Youssef:
Succinctly Verifiable Sealed-Bid Auction Smart Contract. DPM/CBT@ESORICS 2018: 3-19 - [c88]Hisham S. Galal
, Amr M. Youssef:
Verifiable Sealed-Bid Auction on the Ethereum Blockchain. Financial Cryptography Workshops 2018: 265-278 - [c87]Onur Duman, Amr M. Youssef:
Fault Analysis of the New Ukrainian Hash Function Standard: Kupyna. FPS 2018: 225-240 - [c86]Mahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef:
Uplink Coverage of Machine-Type Communications in Ultra-Dense Networks. GLOBECOM 2018: 1-6 - [c85]Abdelrahman Ayad
, Hany E. Z. Farag, Amr M. Youssef, Ehab F. El-Saadany
:
Detection of false data injection attacks in smart grids using Recurrent Neural Networks. ISGT 2018: 1-5 - [c84]Muhammad ElSheikh, Mohamed Tolba, Amr M. Youssef:
Integral Attacks on Round-Reduced Bel-T-256. SAC 2018: 73-91 - [c83]Abdullah Albarakati, Bassam Moussa, Mourad Debbabi, Amr M. Youssef, Basile L. Agba, Marthe Kassouf:
OpenStack-Based Evaluation Framework for Smart Grid Cyber Security. SmartGridComm 2018: 1-6 - [i16]Sharon Shasha, Moustafa Mahmoud, Mohammad Mannan, Amr M. Youssef:
Smart But Unsafe: Experimental Evaluation of Security and Privacy Practices in Smart Toys. CoRR abs/1809.05556 (2018) - [i15]Louis Waked, Mohammad Mannan, Amr M. Youssef:
The Sorry State of TLS Security in Enterprise Interception Appliances. CoRR abs/1809.08729 (2018) - [i14]Hisham S. Galal, Amr M. Youssef:
Verifiable Sealed-Bid Auction on the Ethereum Blockchain. IACR Cryptol. ePrint Arch. 2018: 704 (2018) - 2017
- [j54]Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef:
Improved Multiple Impossible Differential Cryptanalysis of Midori128. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(8): 1733-1737 (2017) - [j53]Onur Duman, Amr M. Youssef:
Fault analysis on Kalyna. Inf. Secur. J. A Glob. Perspect. 26(5): 249-265 (2017) - [j52]Mahmoud I. Kamel, Walaa Hamouda
, Amr M. Youssef:
Performance Analysis of Multiple Association in Ultra-Dense Networks. IEEE Trans. Commun. 65(9): 3818-3831 (2017) - [j51]Riham AlTawy, Amr M. Youssef:
Security, Privacy, and Safety Aspects of Civilian Drones: A Survey. ACM Trans. Cyber Phys. Syst. 1(2): 7:1-7:25 (2017) - [j50]Ahmed Abdelkhalek, Yu Sasaki, Yosuke Todo, Mohamed Tolba, Amr M. Youssef:
MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics. IACR Trans. Symmetric Cryptol. 2017(4): 99-129 (2017) - [j49]Mahmoud I. Kamel, Walaa Hamouda
, Amr M. Youssef:
Physical Layer Security in Ultra-Dense Networks. IEEE Wirel. Commun. Lett. 6(5): 690-693 (2017) - [c82]Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef:
Impossible Differential Cryptanalysis of Reduced-Round SKINNY. AFRICACRYPT 2017: 117-134 - [c81]Ahmed Abdelkhalek, Mohamed Tolba, Amr M. Youssef:
Impossible Differential Attack on Reduced Round SPARX-64/128. AFRICACRYPT 2017: 135-146 - [c80]He Huang, Amr M. Youssef, Mourad Debbabi:
BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection. AsiaCCS 2017: 155-166 - [c79]Mahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef:
Coverage and Capacity Analysis with Stretched Exponential Path Loss in Ultra-Dense Networks. GLOBECOM 2017: 1-6 - [c78]Mahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef:
Average downlink rate in Ultra-Dense Networks. ICC 2017: 1-6 - [c77]Mohamed Tolba, Amr M. Youssef
:
Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik. ICISC 2017: 26-38 - [c76]Moustafa Mahmoud, Mouna Nakkar
, Amr M. Youssef:
A power analysis resistant FPGA implementation of NTRUEncrypt. ICM 2017: 1-4 - [c75]Mouna Nakkar
, Moustafa Mahmoud, Amr M. Youssef:
Fault analysis-resistant implementation of Rainbow Signature scheme. ICM 2017: 1-5 - [c74]Mahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef:
Downlink coverage and average cell load of M2M and H2H in ultra-dense networks. PIMRC 2017: 1-5 - [c73]Riham AlTawy, Muhammad ElSheikh, Amr M. Youssef, Guang Gong:
Lelantos: A Blockchain-Based Anonymous Physical Delivery System. PST 2017: 15-24 - [c72]Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef:
Multidimensional Zero-Correlation Linear Cryptanalysis of Reduced Round SPARX-128. SAC 2017: 423-441 - [c71]Moustafa Mahmoud, Md Zakir Hossen, Hesham Barakat, Mohammad Mannan, Amr M. Youssef:
Towards a comprehensive analytical framework for smart toy privacy practices. STAST 2017: 64-75 - [i13]Riham AlTawy, Muhammad ElSheikh, Amr M. Youssef, Guang Gong:
Lelantos: A Blockchain-based Anonymous Physical Delivery System. IACR Cryptol. ePrint Arch. 2017: 465 (2017) - 2016
- [j48]Riham AlTawy, Amr M. Youssef:
Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices. IEEE Access 4: 959-979 (2016) - [j47]Mahmoud I. Kamel, Walaa Hamouda
, Amr M. Youssef:
Ultra-Dense Networks: A Survey. IEEE Commun. Surv. Tutorials 18(4): 2522-2545 (2016) - [j46]Riham AlTawy, Ahmed Abdelkhalek, Amr M. Youssef:
A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b. IEICE Trans. Inf. Syst. 99-D(4): 1246-1250 (2016) - [j45]