default search action
Ali A. Yassin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c18]Zahraa Sh. Alzaidi, Ali A. Yassin, Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi:
Development Anonymous Authentication Maria et al.'s Scheme of VANETs Using Blockchain and Fog Computing with QR Code Technique. CoDIT 2024: 2247-2252 - [c17]Muwafaq Jawad, Ali A. Yassin, Hamid Ali Abed Al-Asadi, Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi:
IoHT System Authentication Through the Blockchain Technology: A Review. CoDIT 2024: 2253-2258 - [c16]Noor Ali Alshuraify, Ali A. Yassin, Zaid Ameen Abduljabbar:
Hyperledger Fabric Blockchain Using CCTV Surveillance Cameras for Pipelines of Oil and Gas Fields. WINCOM 2024: 1-8 - 2023
- [j11]Eman Thabet Khalid, Mustafa Salah Khalefa, Wijdan Yassen, Ali A. Yassin:
Omicron virus emotions understanding system based on deep learning architecture. J. Ambient Intell. Humaniz. Comput. 14(7): 9497-9507 (2023) - 2022
- [j10]Bahaa Hussein Taher Algubili, Neeraj Kumar, Hongwei Lu, Ali A. Yassin, Rihab Boussada, Alzahraa J. Mohammed, Huiyu Liu:
EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment. Peer-to-Peer Netw. Appl. 15(5): 2179-2198 (2022) - 2021
- [j9]Bahaa Hussein Taher, Huiyu Liu, Firas Abedi, Hongwei Lu, Ali A. Yassin, Alzahraa J. Mohammed:
A Secure and Lightweight Three-Factor Remote User Authentication Protocol for Future IoT Applications. J. Sensors 2021: 8871204:1-8871204:18 (2021) - 2020
- [j8]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Ali A. Yassin:
VPPCS: VANET-Based Privacy-Preserving Communication Scheme. IEEE Access 8: 150914-150928 (2020) - [c15]Abdulla J. Y. Aldarwish, Ali A. Yassin, Abdullah Mohammed Rashid, Aqeel A. Yaseen, Hamid Ali Abed Al-Asadi, Ahmed A. Alkadhmawee:
Multi-factor Authentication for an Administrator's Devices in an IoT Environment. ACeS 2020: 27-47
2010 – 2019
- 2019
- [j7]Murtadha A. Alazzawi, Hongwei Lu, Ali A. Yassin, Kai Chen:
Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network. IEEE Access 7: 71424-71435 (2019) - [j6]Bahaa Hussein Taher, Sheng Jiang, Ali A. Yassin, Hongwei Lu:
Low-Overhead Remote User Authentication Protocol for IoT Based on a Fuzzy Extractor and Feature Extraction. IEEE Access 7: 148950-148966 (2019) - [j5]Alzahraa J. Mohammed, Ali A. Yassin:
Efficient and Flexible Multi-Factor Authentication Protocol Based on Fuzzy Extractor of Administrator's Fingerprint and Smart Mobile Device. Cryptogr. 3(3): 24 (2019) - [j4]Murtadha A. Alazzawi, Hongwei Lu, Ali A. Yassin, Kai Chen:
Robust Conditional Privacy-Preserving Authentication based on Pseudonym Root with Cuckoo Filter in Vehicular Ad Hoc Networks. KSII Trans. Internet Inf. Syst. 13(12): 6121-6144 (2019) - [c14]Murtadha A. Alazzawi, Kai Chen, Ali A. Yassin, Hongwei Lu, Firas Abedi:
Authentication and Revocation Scheme for VANETs Based on Chinese Remainder Theorem. HPCC/SmartCity/DSS 2019: 1541-1547 - 2018
- [c13]Bahaa Hussein Taher, Lu Hong Wei, Ali A. Yassin:
Flexible and Efficient Authentication of IoT Cloud Scheme Using Crypto Hash Function. CSAI/ICIMT 2018: 487-494 - 2017
- [j3]Ayad Ibrahim, Hai Jin, Ali A. Yassin, Deqing Zou:
Privacy preserving search over multiple servers. Int. J. Auton. Adapt. Commun. Syst. 10(4): 426-442 (2017) - 2016
- [j2]Ali A. Yassin, Jian Yao, Shiyao Han:
Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors. Comput. 5(3): 15 (2016) - [c12]Zaid Ameen Abduljabbar, Hai Jin, Zaid Alaa Hussien, Ali A. Yassin, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou:
Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment. BigDataSecurity/HPSC/IDS 2016: 146-151 - [c11]Salah H. Abbdal, Hai Jin, Ali A. Yassin, Zaid Ameen Abduljabbar, Mohammed Abdulridha Hussain, Zaid Alaa Hussien, Deqing Zou:
An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage. BigDataSecurity/HPSC/IDS 2016: 412-417 - [c10]Zaid Ameen Abduljabbar, Hai Jin, Ali A. Yassin, Zaid Alaa Hussien, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou:
Robust scheme to protect authentication code of message/image documents in cloud computing. ICNC 2016: 1-5 - 2015
- [c9]Zaid Ameen Abduljabbar, Hai Jin, Zaid Alaa Hussien, Ali A. Yassin, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou:
Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment. IAS 2015: 61-66 - [c8]Zaid Alaa Hussien, Hai Jin, Zaid Ameen Abduljabbar, Ali A. Yassin, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou:
Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext. IAS 2015: 73-78 - 2014
- [j1]Ayad Ibrahim, Hai Jin, Ali A. Yassin, Deqing Zou, Peng Xu:
Towards Efficient Yet Privacy-Preserving Approximate Search in Cloud Computing. Comput. J. 57(2): 241-254 (2014) - [c7]Salah H. Abbdal, Hai Jin, Deqing Zou, Ali A. Yassen:
Secure Third Party Auditor for Ensuring Data Integrity in Cloud Storage. UIC/ATC/ScalCom 2014: 510-517 - 2012
- [c6]Ayad Ibrahim, Hai Jin, Ali A. Yassin, Deqing Zou:
Secure Rank-Ordered Search of Multi-keyword Trapdoor over Encrypted Cloud Data. APSCC 2012: 263-270 - [c5]Ayad Ibrahim, Hai Jin, Ali A. Yassin, Deqing Zou:
Towards Privacy Preserving Mining over Distributed Cloud Databases. CGC 2012: 130-136 - [c4]Ali A. Yassin, Hai Jin, Ayad Ibrahim, Deqing Zou:
Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing. CGC 2012: 282-289 - [c3]Ayad Ibrahim, Hai Jin, Ali A. Yassin, Deqing Zou:
Approximate Keyword-based Search over Encrypted Cloud Data. ICEBE 2012: 238-245 - [c2]Ali A. Yassin, Hai Jin, Ayad Ibrahim, Weizhong Qiang, Deqing Zou:
A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing. IPDPS Workshops 2012: 1210-1217 - [c1]Ali A. Yassin, Hai Jin, Ayad Ibrahim, Deqing Zou:
Encrypted Remote User Authentication Scheme by Using Smart Card. WISM 2012: 314-323
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint