Get my own profile
Public access
View all0 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Saru Kumari Senior Member IEEE (Hi...Associate Professor, Department of Mathematics, Ch. Charan Singh University, MeerutVerified email at ccsuniversity.ac.in
Fatty SalemEgypt University of InformaticsVerified email at eui.edu.eg
Ashok Kumar DasProfessor of Computer Science, Center for Security, Theory and Algorithmic Research, IIIT HyderabadVerified email at iiit.ac.in
Odelu Vanga, Senior Member, IEEEIndian Institute of Information Technology Sri City, IndiaVerified email at maths.iitkgp.ernet.in
Mohammad WazidDepartment of Computer Science and Engineering, Graphic Era Deemed to be University Dehradun IndiaVerified email at research.iiit.ac.in
Ahmed Hatem SolimanOctober University for Modern Sciences and Arts (MSA)Verified email at msa.edu.eg
Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGVerified email at ed.ac.uk
Hong-Sheng ZhouVirginia Commonwealth UniversityVerified email at vcu.edu
Moti YungDistinguished Research Scientist Google; Adjunct Research Prof. Columbia U.Verified email at cs.columbia.edu
Follow![Maged Hamada Ibrahim](/citations/images/avatar_scholar_128.png)
![Maged Hamada Ibrahim](/citations/images/avatar_scholar_128.png)
Maged Hamada Ibrahim
Associate Professor of Cryprography and Communication Security, Helwan University
Verified email at h-eng.helwan.edu.eg