Mohamed H. Eldefrawy
Mohamed H. Eldefrawy
The School of Information Technology, Halmstad University, Sweden.
Verified email at
Cited by
Cited by
OTP-based two-factor authentication using mobile phones
MH Eldefrawy, K Alghathbar, MK Khan
2011 eighth international conference on information technology: new …, 2011
A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography
MH Eldefrawy, MK Khan, K Alghathbar
2010 International Conference on Anti-Counterfeiting, Security and …, 2010
Formal security analysis of LoRaWAN
M Eldefrawy, I Butun, N Pereira, M Gidlund
Computer Networks 148, 328-339, 2019
Mobile one‐time passwords: two‐factor authentication using mobile phones
MH Eldefrawy, MK Khan, K Alghathbar, TH Kim, H Elkamchouchi
Security and Communication Networks 5 (5), 508-516, 2012
Broadcast authentication for wireless sensor networks using nested hashing and the Chinese remainder theorem
MH Eldefrawy, MK Khan, K Alghathbar, ES Cho
Sensors 10 (9), 8683-8695, 2010
One-time password system with infinite nested hash chains
MH Eldefrawy, MK Khan, K Alghathbar
Security Technology, Disaster Recovery and Business Continuity, 161-170, 2010
One-time password authentication with infinite nested hash claims
MK Khan, MHK Eldefrawy, KS Alghathbar
US Patent 8,683,564, 2014
Challenges of securing the industrial internet of things value chain
S Forsström, I Butun, M Eldefrawy, U Jennehag, M Gidlund
2018 Workshop on Metrology for Industry 4.0 and IoT, 218-223, 2018
Hardcopy document authentication based on public key encryption and 2D barcodes
MH Eldefrawy, K Alghathbar, MK Khan
2012 International Symposium on Biometrics and Security Technologies, 77-81, 2012
Key distribution protocol for industrial Internet of Things without implicit certificates
MH Eldefrawy, N Pereira, M Gidlund
IEEE Internet of Things Journal 6 (1), 906-917, 2018
Banknote validation through an embedded rfid chip and an nfc-enabled smartphone
MH Eldefrawy, MK Khan
Mathematical Problems in Engineering 2015, 2015
Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges
T Gebremichael, LP Ledwapa, M Eldefrawy, GP Hancke Jr, N Pereira, ...
IEEE Access, 2020
A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT
MMN Aboelwafa, KG Seddik, MH Eldefrawy, Y Gadallah, M Gidlund
IEEE Internet of Things Journal 7 (9), 8462-8471, 2020
Cryptanalysis and enhancement of a password-based authentication scheme
MH Eldefrawy, JF Al-Muhtadi
2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015
System and method for currency validation
MHK Eldefrawy, MK Khan
US Patent 8,931,688, 2015
BAN logic-based security proof for mobile OTP authentication scheme
MS Alkatheiri, MH Eldefrawy, MK Khan
Future Information Technology, Application, and Service, 53-59, 2012
Mobile Phones
MH Eldefrawy, K Alghathbar, MK Khan
Eighth International Conference on Information Technology, IEEE, 2011
An efficient and confirmed protocol for authenticated key agreement
H Elkamchouchi, M Eldefrawy
Radio Science Conference, 2008. NRSC 2008. National, 1-8, 2008
A new approach for key controlled agreement
H Elkamchouchi, M Eldefrawy
2007 National Radio Science Conference, 1-7, 2007
The use of two authentication factors to enhance the security of mass storage devices
MH Eldefrawy, MK Khan, H Elkamchouchi
2014 11th International Conference on Information Technology: New …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20