2003 | ||
---|---|---|
7 | EE | Mohamed Al-Ibrahim, Anton Cerný: Proxy and Threshold One-Time Signatures. ACNS 2003: 123-136 |
6 | EE | Mohamed Al-Ibrahim: A Signcryption Scheme Based on Secret Sharing Technique. MMM-ACNS 2003: 279-288 |
5 | EE | Mohamed Al-Ibrahim, Anton Cerný: Authentication of Anycast Communication. MMM-ACNS 2003: 419-423 |
2002 | ||
4 | Mohamed Al-Ibrahim, Josef Pieprzyk: Authentication of transit flows and k-siblings one-time signature. Communications and Multimedia Security 2002: 41-55 | |
3 | EE | Mohamed Al-Ibrahim, Hossein Ghodosi, Josef Pieprzyk: Authentication of Concast Communication. INDOCRYPT 2002: 185-198 |
2001 | ||
2 | EE | Mohamed Al-Ibrahim, Mehmet Savsar, Wael Adi: A Security Analysis for Label Switching Routers. AICCSA 2001: 526-530 |
1 | EE | Mohamed Al-Ibrahim, Josef Pieprzyk: Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques. ICN (2) 2001: 239-249 |
1 | Wael Adi | [2] |
2 | Anton Cerný | [5] [7] |
3 | Hossein Ghodosi | [3] |
4 | Josef Pieprzyk | [1] [3] [4] |
5 | Mehmet Savsar | [2] |