Mohamed H. Eldefrawy
Mohamed H. Eldefrawy
The School of Information Technology, Halmstad University, Sweden.
Verified email at hh.se
Title
Cited by
Cited by
Year
OTP-based two-factor authentication using mobile phones
MH Eldefrawy, K Alghathbar, MK Khan
2011 Eighth International Conference on Information Technology: New …, 2011
632011
A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography
MH Eldefrawy, MK Khan, K Alghathbar
2010 International Conference on Anti-Counterfeiting, Security and …, 2010
512010
Mobile one‐time passwords: two‐factor authentication using mobile phones
MH Eldefrawy, MK Khan, K Alghathbar, TH Kim, H Elkamchouchi
Security and Communication Networks 5 (5), 508-516, 2012
322012
Broadcast authentication for wireless sensor networks using nested hashing and the Chinese remainder theorem
MH Eldefrawy, MK Khan, K Alghathbar, ES Cho
Sensors 10 (9), 8683-8695, 2010
252010
One-time password system with infinite nested hash chains
MH Eldefrawy, MK Khan, K Alghathbar
Security Technology, Disaster Recovery and Business Continuity, 161-170, 2010
202010
One-time password authentication with infinite nested hash claims
MK Khan, MHK Eldefrawy, KS Alghathbar
US Patent 8,683,564, 2014
192014
Formal security analysis of LoRaWAN
M Eldefrawy, I Butun, N Pereira, M Gidlund
Computer Networks 148, 328-339, 2019
162019
Hardcopy document authentication based on public key encryption and 2D barcodes
MH Eldefrawy, K Alghathbar, MK Khan
2012 International Symposium on Biometrics and Security Technologies, 77-81, 2012
112012
Challenges of securing the industrial internet of things value chain
S Forsström, I Butun, M Eldefrawy, U Jennehag, M Gidlund
2018 Workshop on Metrology for Industry 4.0 and IoT, 218-223, 2018
92018
Banknote validation through an embedded RFID chip and an NFC-enabled smartphone
MH Eldefrawy, MK Khan
Mathematical Problems in Engineering 2015, 2015
92015
BAN logic-based security proof for mobile OTP authentication scheme
MS Alkatheiri, MH Eldefrawy, MK Khan
Future Information Technology, Application, and Service, 53-59, 2012
52012
An efficient and confirmed protocol for authenticated key agreement
H Elkamchouchi, M Eldefrawy
Radio Science Conference, 2008. NRSC 2008. National, 1-8, 2008
52008
A new approach for key controlled agreement
H Elkamchouchi, M Eldefrawy
2007 National Radio Science Conference, 1-7, 2007
52007
System and method for currency validation
MHK Eldefrawy, MK Khan
US Patent 8,931,688, 2015
42015
The use of two authentication factors to enhance the security of mass storage devices
MH Eldefrawy, MK Khan, H Elkamchouchi
2014 11th International Conference on Information Technology: New …, 2014
42014
Key distribution protocol for industrial Internet of Things without implicit certificates
MH Eldefrawy, N Pereira, M Gidlund
IEEE Internet of Things Journal 6 (1), 906-917, 2018
32018
Cryptanalysis and enhancement of a password-based authentication scheme
MH Eldefrawy, JF Al-Muhtadi
2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015
32015
Detecting counterfeit-money using RFID-enabled mobile devices
MH Eldefrawy, MK Khan
2012 International Conference for Internet Technology and Secured …, 2012
32012
Secure instant messaging protocol for centralized communication group
MH Eldefrawy, K Alghathbar, MK Khan, H Elkamchouchi
2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011
32011
Dynamic password based remote user authentication without time stamping
MH Eldefrawy, MK Khan, K Alghathbar
22011
The system can't perform the operation now. Try again later.
Articles 1–20