Follow
Abubaker Wahaballa
Title
Cited by
Cited by
Year
A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing
Z Qin, J Sun, A Wahaballa, W Zheng, H Xiong, Z Qin
Computer Standards & Interfaces 54, 55-60, 2017
652017
Toward unified DevOps model
A Wahaballa, O Wahballa, M Abdellatief, H Xiong, Z Qin
2015 6th IEEE international conference on software engineering and service …, 2015
532015
Medical Image Encryption Scheme Based on Arnold Transformation and ID-AK Protocol.
O Wahballa, A Wahaballa, F Li, II Idris, C Xu
Int. J. Netw. Secur. 19 (5), 776-784, 2017
112017
Digital image confidentiality depends upon Arnold transformation and rc4 algorithms
K Hamdnaalla, A Wahaballa, O Wahballa
International Journal of Video&Image Processing and Network Security 13 (04 …, 2013
112013
Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme.
H Abdalla, H Xiong, A Wahaballa, AA Ali, M Ramadan, Z Qin
Int. J. Netw. Secur. 19 (1), 27-38, 2017
92017
A taxonomy of secure electronic English auction protocols
A Wahaballa, Z Qin, H Xiong, Z Qin, M Ramadan
International Journal of Computers and Applications 37 (1), 28-36, 2015
52015
A Secure and Robust Certificateless Public Key Steganography Based on SVD-DDWT.
O Wahballa, A Wahaballa, F Li, C Xu
Int. J. Netw. Secur. 18 (5), 888-899, 2016
42016
Complexity metrics for component-based software systems: developer perspective
S Ali, M Abdellatief, MA Elfaki, A Wahaballa
Indian Journal of Science and Technology 11 (32), 2018
32018
Efficient functional encryption and proxy re-cryptography for secure public cloud data sharing
H Abdallai, X Hu, A Wahaballa, N Eltayieb, M Ramadan, Q Zhiguang
2016 IEEE International Conference of Online Analysis and Computing Science …, 2016
32016
Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System.
H Abdalla, H Xiong, A Wahaballa, P Avornyo, Z Qin
Int. J. Netw. Secur. 18 (2), 235-243, 2016
32016
Multiple-layered securities using steganography and cryptography
A Wahaballa, O Wahballa, F Li, M Ramadan, Z Qin
International Journal of Computers and Applications 36 (3), 93-100, 2014
32014
Assessing the changeability of component-based system design: a controlled experiment
M Abdellatief, AB Md Sultan, AA Abdul Ghani, A Wahaballa
International Journal of Computers and Applications 44 (6), 513-520, 2022
22022
Equality test with an anonymous authorization in cloud computing
H Abdalla, H Xiong, A Wahaballa, M Ramadan, Z Qin
Wireless Networks 27 (2), 1063-1076, 2021
22021
Digital Rights Management-Current Status and Future Trends
H Abdalla, X Hu, A Wahaballa, A Abdalla, M Ramadan, Q Zhiguang
2016 3rd International Conference on Information Science and Control …, 2016
12016
Secure mobile agent-based English auction protocol using identity-based signature scheme
A Wahaballa, H Xiong, F Li, Z Qin, Z Qin
International Journal of Security and Networks 11 (4), 175-187, 2016
12016
Lightweight and Secure IoT-based Payment Protocols from an Identity-Based Signature Scheme
A Wahaballa
Electronics 11 (21), 3445, 2022
2022
Oblivious transfer with hidden access control and outsourced decryption from deterministic finite automata‐based functional encryption for an in‐vehicle sensor database system
A Wahaballa, Z Qin, H Abdalla, M Abdellatief, MA Elfaki
Transactions on Emerging Telecommunications Technologies 33 (5), e3870, 2022
2022
A Literature Review on Collaborative Caching Techniques in MANETs
M Abdellatief
Engineering, Technology & Applied Science Research 9 (5), 4729-4734, 2019
2019
IOV-Based Payment System for Fuel Pump
SK Hussein, A Wahaballa, NA Baabdullah
The system can't perform the operation now. Try again later.
Articles 1–19