Mohamed H. Eldefrawy
Mohamed H. Eldefrawy
The School of Information Technology, Halmstad University, Sweden.
Verified email at hh.se
Title
Cited by
Cited by
Year
OTP-based two-factor authentication using mobile phones
MH Eldefrawy, K Alghathbar, MK Khan
2011 eighth international conference on information technology: new …, 2011
892011
A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography
MH Eldefrawy, MK Khan, K Alghathbar
2010 International Conference on Anti-Counterfeiting, Security and …, 2010
552010
Formal security analysis of LoRaWAN
M Eldefrawy, I Butun, N Pereira, M Gidlund
Computer Networks 148, 328-339, 2019
502019
Mobile one‐time passwords: two‐factor authentication using mobile phones
MH Eldefrawy, MK Khan, K Alghathbar, TH Kim, H Elkamchouchi
Security and Communication Networks 5 (5), 508-516, 2012
382012
Broadcast authentication for wireless sensor networks using nested hashing and the Chinese remainder theorem
MH Eldefrawy, MK Khan, K Alghathbar, ES Cho
Sensors 10 (9), 8683-8695, 2010
262010
Challenges of securing the industrial internet of things value chain
S Forsström, I Butun, M Eldefrawy, U Jennehag, M Gidlund
2018 Workshop on Metrology for Industry 4.0 and IoT, 218-223, 2018
252018
One-time password system with infinite nested hash chains
MH Eldefrawy, MK Khan, K Alghathbar
Security Technology, Disaster Recovery and Business Continuity, 161-170, 2010
252010
Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges
T Gebremichael, LP Ledwapa, M Eldefrawy, GP Hancke Jr, N Pereira, ...
IEEE Access, 2020
242020
One-time password authentication with infinite nested hash claims
MK Khan, MHK Eldefrawy, KS Alghathbar
US Patent 8,683,564, 2014
242014
Hardcopy document authentication based on public key encryption and 2D barcodes
MH Eldefrawy, K Alghathbar, MK Khan
2012 International Symposium on Biometrics and Security Technologies, 77-81, 2012
182012
A machine-learning-based technique for false data injection attacks detection in industrial IoT
MMN Aboelwafa, KG Seddik, MH Eldefrawy, Y Gadallah, M Gidlund
IEEE Internet of Things Journal 7 (9), 8462-8471, 2020
162020
Key distribution protocol for industrial Internet of Things without implicit certificates
MH Eldefrawy, N Pereira, M Gidlund
IEEE Internet of Things Journal 6 (1), 906-917, 2018
162018
Banknote validation through an embedded rfid chip and an nfc-enabled smartphone
MH Eldefrawy, MK Khan
Mathematical Problems in Engineering 2015, 2015
132015
BAN logic-based security proof for mobile OTP authentication scheme
MS Alkatheiri, MH Eldefrawy, MK Khan
Future Information Technology, Application, and Service, 53-59, 2012
62012
Cryptanalysis and enhancement of a password-based authentication scheme
MH Eldefrawy, JF Al-Muhtadi
2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015
52015
System and method for currency validation
MHK Eldefrawy, MK Khan
US Patent 8,931,688, 2015
52015
An efficient and confirmed protocol for authenticated key agreement
H Elkamchouchi, M Eldefrawy
Radio Science Conference, 2008. NRSC 2008. National, 1-8, 2008
52008
A new approach for key controlled agreement
H Elkamchouchi, M Eldefrawy
2007 National Radio Science Conference, 1-7, 2007
52007
Guest Editorial: Security, privacy, and trust for industrial internet of things
M Gidlund, GP Hancke Jr, M Eldefrawy, J Åkerberg
IEEE Transactions on Industrial Informatics 16 (1), 625-628, 2020
42020
The use of two authentication factors to enhance the security of mass storage devices
MH Eldefrawy, MK Khan, H Elkamchouchi
2014 11th International Conference on Information Technology: New …, 2014
42014
The system can't perform the operation now. Try again later.
Articles 1–20