Mohamed H. Eldefrawy
Mohamed H. Eldefrawy
The School of Information Technology, Halmstad University, Sweden.
Verified email at - Homepage
Cited by
Cited by
A machine-learning-based technique for false data injection attacks detection in industrial IoT
MMN Aboelwafa, KG Seddik, MH Eldefrawy, Y Gadallah, M Gidlund
IEEE Internet of Things Journal 7 (9), 8462-8471, 2020
Formal security analysis of LoRaWAN
M Eldefrawy, I Butun, N Pereira, M Gidlund
Computer Networks 148, 328-339, 2019
Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges
T Gebremichael, LP Ledwapa, M Eldefrawy, GP Hancke Jr, N Pereira, ...
IEEE Access, 2020
OTP-based two-factor authentication using mobile phones
MH Eldefrawy, K Alghathbar, MK Khan
2011 eighth international conference on information technology: new …, 2011
A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography
MH Eldefrawy, MK Khan, K Alghathbar
2010 International Conference on Anti-Counterfeiting, Security and …, 2010
Mobile one‐time passwords: two‐factor authentication using mobile phones
MH Eldefrawy, MK Khan, K Alghathbar, TH Kim, H Elkamchouchi
Security and Communication Networks 5 (5), 508-516, 2012
Challenges of securing the industrial internet of things value chain
S Forsström, I Butun, M Eldefrawy, U Jennehag, M Gidlund
2018 Workshop on Metrology for Industry 4.0 and IoT, 218-223, 2018
Key distribution protocol for industrial Internet of Things without implicit certificates
MH Eldefrawy, N Pereira, M Gidlund
IEEE Internet of Things Journal 6 (1), 906-917, 2018
Broadcast authentication for wireless sensor networks using nested hashing and the Chinese remainder theorem
MH Eldefrawy, MK Khan, K Alghathbar, ES Cho
Sensors 10 (9), 8683-8695, 2010
One-time password authentication with infinite nested hash claims
MK Khan, MHK Eldefrawy, KS Alghathbar
US Patent 8,683,564, 2014
One-time password system with infinite nested hash chains
MH Eldefrawy, MK Khan, K Alghathbar
Security Technology, Disaster Recovery and Business Continuity …, 2010
Hardcopy document authentication based on public key encryption and 2D barcodes
MH Eldefrawy, K Alghathbar, MK Khan
2012 International Symposium on Biometrics and Security Technologies, 77-81, 2012
Banknote Validation through an Embedded RFID Chip and an NFC‐Enabled Smartphone
MH Eldefrawy, MK Khan
Mathematical Problems in Engineering 2015 (1), 264514, 2015
Guest editorial: Security, privacy, and trust for industrial internet of things
M Gidlund, GP Hancke Jr, M Eldefrawy, J Åkerberg
IEEE Transactions on Industrial Informatics 16 (1), 625-628, 2020
BAN logic-based security proof for mobile OTP authentication scheme
MS Alkatheiri, MH Eldefrawy, MK Khan
Future Information Technology, Application, and Service: FutureTech 2012 …, 2012
Dynamic user authentication protocol for industrial IoT without timestamping
MH Eldefrawy, N Ferrari, M Gidlund
2019 15th IEEE International Workshop on Factory Communication Systems (WFCS …, 2019
System and method for currency validation
MHK Eldefrawy, MK Khan
US Patent 8,931,688, 2015
Cryptanalysis and enhancement of a password-based authentication scheme
MH Eldefrawy, JF Al-Muhtadi
2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015
An efficient and confirmed protocol for authenticated key agreement
H Elkamchouchi, M Eldefrawy
Radio Science Conference, 2008. NRSC 2008. National, 1-8, 2008
Secure instant messaging protocol for centralized communication group
MH Eldefrawy, K Alghathbar, MK Khan, H Elkamchouchi
2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20