Name
Affiliation
Papers
AMR YOUSSEF
Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ, Canada
67
Collaborators
Citations 
PageRank 
69
238
29.69
Referers 
Referees 
References 
699
1168
592
Search Limit
1001000
Title
Citations
PageRank
Year
Encrypted Cloud-Based Set-Theoretic Model Predictive Control00.342022
Edge Computing and Multiple-Association in Ultra-Dense Networks: Performance Analysis00.342022
Covert Channels in Cyber-Physical Systems10.352021
Lightweight Authentication and Key Agreement Protocol for Edge Computing Applications00.342021
Uplink Coverage and Capacity Analysis of mMTC in Ultra-Dense Networks50.402020
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE.00.342020
NOMA-Assisted Machine-Type Communications in UDN: State-of-the-Art and Challenges100.462020
Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management<sup>1</sup>10.392019
Capacity Analysis of Downlink NOMA-Based Coexistent HTC/MTC in UDN00.342019
Fault Analysis of the New Ukrainian Hash Function Standard - Kupyna.00.342018
Impossible Differential Cryptanalysis Of Reduced-Round Skinny30.392017
Physical Layer Security in Ultra-Dense Networks.40.442017
Average Downlink Rate In Ultra-Dense Networks00.342017
Improved Multiple Impossible Differential Cryptanalysis Of Midori12800.342017
Security, Privacy, and Safety Aspects of Civilian Drones: A Survey.301.182017
Fault analysis on Kalyna10.352017
Lelantos: A Blockchain-Based Anonymous Physical Delivery System00.342017
BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection.50.422017
Performance Analysis of Multiple Association in Ultra-Dense Networks.90.562017
Impossible Differential Attack On Reduced Round Sparx-64/12820.402017
Detection techniques for data-level spoofing in GPS-based phasor measurement units10.352016
A Meet In The Middle Attack On Reduced Round Kiasu-Bc10.492016
Generalized MitM attacks on full TWINE.20.372016
Truncated And Multiple Differential Cryptanalysis Of Reduced Round Midori12800.342016
An empirical study on supply chain practices and their effect on financial performance: a case from Egypt.00.342016
Improved Linear Cryptanalysis Of Round-Reduced Aria00.342016
Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting.20.382015
Meet-in-the-Middle Attacks on Round-Reduced Khudra.50.422015
Meet-in-the-Middle Attacks on Reduced Round Piccolo.00.342015
Selected Areas in Cryptography - SAC 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers10.362014
Characterization of Covert Channels in DNS.30.402014
A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images.00.342013
A Markov Decision Process Model for High Interaction Honeypots40.462013
Second order collision for the 42-step reduced DHA-256 hash function10.352013
Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks.70.502013
Progress in Cryptology - AFRICACRYPT 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings261.032013
Dempster-Shafer Evidence Combining for Anti-Honeypot Technologies30.412012
Cryptanalysis of the Loiss Stream Cipher.20.402012
Comments on the security of Chen's authenticated encryption scheme10.382011
Cryptanalysis Of A Public Key Encryption Scheme Using Ergodic Matrices10.372011
Fault Analysis Of The Ntruencrypt Cryptosystem60.532011
A framework to strengthen password authentication using mobile devices and browser extensions00.342010
Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat110.762010
Em Channel Estimation And Data Detection For Mimo-Cdma Systems Over Slow-Fading Channels00.342010
EM-Based Joint Channel Estimation and Data Detection for MIMO-CDMA Systems120.562010
IDENTIFICATION OF MYOCARDIAL INFARCTION USING THREE-DIMENSIONAL STRAIN TENSOR FRACTIONAL ANISOTROPY.10.412010
Cryptanalysis Of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes20.452010
Joint Iterative Channel Estimation and Data Detection for MIMO-CDMA Systems over Frequency-Selective Fading Channels00.342010
On the security of image encryption schemes based on Multiple Parameters Transforms30.402010
Applications of SAT Solvers to AES Key Recovery from Decayed Key Schedule Images140.862010
  • 1
  • 2