Pre-shared key ciphersuites for transport layer security (TLS) P Eronen, H Tschofenig RFC 4279, December, 2005 | 394 | 2005 |
Network layer inter-operation of Device-to-Device communication technologies in Internet of Things (IoT) O Bello, S Zeadally, M Badra Ad Hoc Networks 57, 52-62, 2017 | 182 | 2017 |
Towards privacy protection in smart grid S Zeadally, ASK Pathan, C Alcaraz, M Badra Wireless personal communications 73, 23-50, 2013 | 119 | 2013 |
Design and Performance Analysis of a Virtual Ring Architecture for Smart Grid Privacy M Badra, S Zeadally IEEE Transactions on Information Forensics and Security 9 (2), 321-329, 2014 | 82 | 2014 |
Lightweight and Efficient Privacy-Preserving Data Aggregation Approach for the Smart Grid M Badra, S Zeadally Ad Hoc Networks, 2017 | 57 | 2017 |
Handbook of research on wireless security Y Zhang, J Zheng, M Ma IGI global, 2008 | 47 | 2008 |
A lightweight security protocol for NFC-based mobile payments M Badra, RB Badra Procedia Computer Science 83, 705-711, 2016 | 46 | 2016 |
Phishing attacks and solutions M Badra, S El-Sawda, I Hajjeh 3rd International ICST Conference on Mobile Multimedia Communications, 2010 | 36 | 2010 |
Privacy in a Digital, Networked World: Technologies, Implications and Solutions S Zeadally, M Badra Springer, 2015 | 35 | 2015 |
EAP-TLS smarteards, from dream to reality P Urien, M Badra, M Dandjinou 2004 4th Workshop on Applications and Services in Wireless Networks, 2004 …, 2004 | 33 | 2004 |
Techniques, taxonomy, and challenges of privacy protection in the smart grid S Uludag, S Zeadally, M Badra Privacy in a Digital, Networked World: Technologies, Implications and …, 2015 | 31 | 2015 |
NETCONF over transport layer security (TLS) M Badra | 30 | 2009 |
Key-exchange authentication using shared secrets M Badra, I Hajjeh Computer 39 (3), 58-66, 2006 | 28 | 2006 |
Toward SSL integration in SIM smartcards M Badra, P Urien 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No …, 2004 | 27 | 2004 |
Pre-shared key cipher suites for TLS with SHA-256/384 and AES galois counter mode M Badra | 26 | 2009 |
Mutual Authentication for SIP: A semantic meaning for the SIP opaque values T Guillet, A Serhrouchni, M Badra 2008 New Technologies, Mobility and Security, 1-6, 2008 | 25 | 2008 |
Analysis of blockchain solutions for E-voting: A systematic literature review A Benabdallah, A Audras, L Coudert, N El Madhoun, M Badra IEEE Access, 2022 | 22 | 2022 |
ECDHE_PSK cipher suites for transport layer security (TLS) M Badra, I Hajjeh | 20 | 2009 |
Agent-Based Framework for Sensor-to-Sensor Personalization N Sahli, N Jabeura, M Badra Journal of Computer and System Sciences 81 (3), 487-495, 2015 | 16 | 2015 |
Hardware implementations of elliptic curve cryptography in wireless sensor networks H Houssain, M Badra, TF Al-Somani 2011 International Conference for Internet Technology and Secured …, 2011 | 16 | 2011 |