Publications
Nr. | Authors | Publication Title | Place & Date | Journal Ranking | Impact Factor | Status |
1
|
Naglaa F Saudy, ,Ihab A Ali, ,Reda Al Barkouky
|
Error analysis and detection procedures for elliptic curve cryptography
|
Ain Shams Engineering Journal
,Vol.10 ,Issue3,ppt 587-597 2019
|
|
0
|
Both Fund(No)
|
2
|
Mostafa R Kaseb,Mohamed H Khafagy,Ihab A Ali
|
Multi-Split HDFS Technique for Improving Data Confidentiality in Big Data Replication
|
WorldCIST'19 - 7th World Conference on Information Systems and Technologies, Spain, 2019. ,Vol.--- ,Issue--,ppt --- 2019
|
|
0
|
Applied Fund(No)
|
3
|
Mostafa R Kaseb, , Mohamed H Khafagy, ,Ihab A Ali,
|
“An improved technique for increasing availability in Big Data replication,”
|
Future Generation Computer Systems Journal, February 2019. ,Vol.-- ,Issue--,ppt -- 2019
|
|
0
|
Applied Fund(No)
|
4
|
Eman Abd Elnaby. kamel, ,Ihab AbdelWahab. Ali,,Ahmed M. Abd El-Haleem,
|
SoftSectored Fractional Frequency Reuse in LTE-Advanced Networks
|
18th International Conference on Aerospace Sciences and Aviation Technology, April, 2019. ,Vol.18 ,Issue1,ppt 11 2019
|
|
0
|
Applied Fund(No)
|
5
|
Mostafa R Kaseb,,Mohamed H Khafagy, , Ihab A Ali,
|
"Redundant Independent Files (RIF): A Technique for Reducing Storage and Resources in Big Data Replication,"
|
World Conference on Information Systems and Technologies, Naples, Italy, March 2018, pp 182-193. ,Vol.-- ,Issue--,ppt 182-193 2018
|
|
0
|
Applied Fund(No)
|
6
|
Naglaa F. Saudy,Ihab A. Ali,Reda Al Barkouky
|
Error Analysis and Detection Procedures for Signature and Authentication Schemes,
|
Journal of Advances in Mathematics and Computer Science ,Vol.29 ,Issue1,ppt 1-12 2018
|
|
0
|
Theoretical Fund(No)
|
7
|
1. Ahmed F.Sayed, ,Tamer M. Barakat , ,Ihab A. Ali,
|
A Novel Dispersion Compensation Model using an Efficient CFBG Reflectors for WDM Optical Networks
|
INTERNATIONAL JOURNAL OF MICROWAVE AND OPTICAL TECHNOLOGY, ,Vol.12 ,Issue3,ppt 230-238 2017
|
|
0
|
Applied Fund(No)
|
8
|
Ali M Allam, ,Ihab A Ali,,Shereen M Mahgoub
|
A provably secure certificateless organizational signature schemes
|
International Journal of Communication Systems
,Vol.30 ,Issue5,ppt 30-38 2017
|
|
0
|
Applied Fund(No)
|
9
|
Ahmed Samir, ,Mahmoud M. Elmesalawy, ,Ahmed Salah EL-Din Ali
|
Partial Contention Free Random access Protocol for M2M communications in LTE Networks
|
Journal of Wireless Networking and Communications
,Vol.6 ,Issue3,ppt 66-72 2016
|
|
0
|
Both Fund(No)
|
10
|
Ahmed Samir, ,Mahmoud M. Elmesalawy, ,A. S. Ali
|
An Improved LTE RACH Protocol for M2M Applications
|
Mobile Information Systems
,Vol.2016 ,Issue7,ppt 11 2016
|
|
0
|
Both Fund(No)
|
11
|
Mohamed Ouda, ,Sameh Salem,,Ihab Ali,
|
Privacy-Preserving Data Mining in Homogeneous Collaborative Clustering.
|
604 The International Arab Journal of Information Technology, Vol. 12, No. 6, November 2015
,Vol.12 ,Issue6,ppt 604-612 2015
|
|
0
|
Applied Fund(No)
|
12
|
Ali M. Allam, ,Mohamed Saied, Ihab Ali
|
Adapting LTE M-2-M Protocol Standard to Fulfil Latency Requirements for IEC 61850 GOOSE Messages
|
International Journal of Communications, Network and System Sciences
,Vol.8 ,Issue5,ppt 154-160 2015
|
|
0
|
Applied Fund(No)
|
13
|
Fatty M Salem, ,Maged H Ibrahim, ,Ihab A Ali,
|
Matched-filter-based spectrum sensing for secure cognitive radio network communications
|
International Journal of Computer Applications
,Vol.87 ,Issue18,ppt 41-46 2014
|
|
0
|
Both Fund(No)
|
14
|
Shereen M Mahgoub, ,Ali M Allam, ,Ihab Abdel-Wahab Ali
|
An Efficient Organizational Signature Schemes based on the Elliptic Curve Cryptography
|
International Journal of Applied Information Systems
,Vol.7 ,Issue11,ppt 7-10 2014
|
|
0
|
Both Fund(No)
|
|