Naya Nagy
Naya Nagy
Imam Abdulrahman Bin Faisal University
Verified email at iau.edu.sa
Title
Cited by
Cited by
Year
The maximum flow problem: A real-time approach
N Nagy, SG Akl
Parallel Computing 29 (6), 767-794, 2003
262003
Authenticated quantum key distribution without classical communication
N Nagy, SG Akl
Parallel processing letters 17 (03), 323-335, 2007
202007
Computations with uncertain time constraints: effects on parallelism and universality
N Nagy, SG Akl
International Conference on Unconventional Computation, 152-163, 2011
132011
Quantum security in wireless sensor networks
N Nagy, M Nagy, SG Akl
Natural Computing 9 (4), 819-830, 2010
122010
Key distribution versus key enhancement in quantum cryptography
N Nagy, M Nagy, SG Akl
Parallel processing letters 20 (03), 239-250, 2010
112010
Computing with uncertainty and its implications to universality
N Nagy, SG Akl
International Journal of Parallel, Emergent and Distributed Systems 27 (2 …, 2012
82012
An information-theoretic perspective on the quantum bit commitment impossibility theorem
M Nagy, N Nagy
Entropy 20 (3), 193, 2018
72018
Quantum authenticated key distribution
N Nagy, SG Akl
International Conference on Unconventional Computation, 127-136, 2007
72007
Aspects of biomolecular computing
N Nagy, SG Akl
Parallel processing letters 17 (02), 185-211, 2007
72007
Active Directory and Related Aspects of Security
A Binduf, HO Alamoudi, H Balahmar, S Alshamrani, H Al-Omar, N Nagy
2018 21st Saudi Computer Society National Computer Conference (NCC), 4474-4479, 2018
62018
Carving Secret Messages out of Public Information.
N Nagy, M Nagy, SG Akl
J. Comput. Sci. 11 (1), 64-70, 2015
62015
A quantum cryptographic solution to the problem of access control in a hierarchy
N Nagy, SG Akl
Parallel processing letters 20 (03), 251-261, 2010
62010
Quantum cryptography on IBM QX
ALM Dhoha, ALK Mashael, ALA Ghadeer, ALA Manal, M Al Fosail, ...
2019 2nd International Conference on Computer Applications & Information …, 2019
52019
Quantum Bit Commitment-Within an Equivalence Class.
N Nagy, M Nagy
International Journal of Unconventional Computing 12, 2016
52016
Unconditionally secure quantum bit commitment protocol based on incomplete information
N Nagy, M Nagy
International Conference on Theory and Practice of Natural Computing, 134-143, 2014
52014
Molecular Codebreaking and Double Encoding--Laboratory Experiments--.
CD McKay, JG Affleck, N Nagy, SG Akl, VK Walker
International Journal of Unconventional Computing 5 (6), 2009
52009
Quantum wireless sensor networks
N Nagy, M Nagy, SG Akl
International Conference on Unconventional Computation, 177-188, 2008
52008
Quantum-based secure communications with no prior key distribution
M Nagy, N Nagy
Soft Computing 20 (1), 87-101, 2016
42016
Security Related Issues In Saudi Arabia Small Organizations: A Saudi Case Study
D Almubayedh, G Alazman, M Alabdali, R Al-Refai, N Nagy
2018 21st Saudi Computer Society National Computer Conference (NCC), 1-6, 2018
32018
Quantum Oblivious Transfer: a secure practical implementation
M Nagy, N Nagy
Quantum Information Processing 15 (12), 5037-5050, 2016
32016
The system can't perform the operation now. Try again later.
Articles 1–20