Publications
Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies. International Journal of Information Security [Internet]. 2020;19 :163–187 . Publisher's VersionAbstract
.
Using priced timed automata for the specification and verification of CSMA/CA in WSNs. International Journal of Information and Communication Technology [Internet]. 2020;17 (2). Publisher's VersionAbstract
.
A new approach agent-based for distributing association rules by business to improve decision process in ERP systems. International Journal of Information and Decision Sciences [Internet]. 2020;12 (1) :1-35. Publisher's VersionAbstract
.
A Hybrid Protocol to Solve Authenticated Byzantine Consensus. Fundamenta Informaticae [Internet]. 2020;173 (1) :73-89. Publisher's VersionAbstract
.
Tracking covid-19 by tracking infectious trajectories. IEEE Access [Internet]. 2020;8 :145242 - 145255. Publisher's VersionAbstract
.
A Novel Image Encryption Approach Using Polar Decomposition and Orthogonal Matrices. Malaysian Journal of Computing and Applied Mathematics [Internet]. 2020;3 (1) :27-34. Publisher's VersionAbstract
.
New chaotic cryptosystem for the image encryption. International Journal of Information and Computer Security [Internet]. 2020;12 (4) :450-463. Publisher's VersionAbstract
.
Sensitive and Energetic IoT Access Control for Managing Cloud Electronic Health Records. IEEE Access . 2019;7 :86384 - 86393.Abstract
.
Two dimensional ElGamal public key cryptosystem. Information Security Journal: A Global Perspective . 2019;28 (4-5) : 120-126.Abstract
.
Security and robustness of a modified ElGamal encryption scheme. International Journal of Information and Communication Technology. 2018;13 (3).Abstract
.
A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration. Multidimensional Systems and Signal Processing [Internet]. 2018;30 :1093–1112. Publisher's VersionAbstract
.
A lossless image encryption algorithm using matrix transformations and XOR operation. International Journal of Information and Communication Technology. 2018;13 (1).Abstract
.
A new steganography algorithm using polar decomposition. Information Security Journal: A Global Perspective . 2018;27 (3) :133-144.Abstract
.
A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration. Multidimensional Systems and Signal Processing. 2018;30 :pages1093–1112.Abstract
.
Secure video summarization framework for personalized wireless capsule endoscopy. Pervasive and Mobile Computing. 2017;41 :436-450.Abstract
.