default search action
Mohammad El-Hajj 0001
Person information
- affiliation: Twente University, Enschede, Netherlands
- affiliation: University of Sciences and Arts in Lebanon, USAL, Lebanon
- affiliation (PhD 2020): Saint Joseph University, USJ, Lebanon
Other persons with the same name
- Mohammad El-Hajj — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Adrian-Catalin Rus, Mohammad El-Hajj, Dipti Kapoor Sarmah:
NAISS: A reverse proxy approach to mitigate MageCart's e-skimmers in e-commerce. Comput. Secur. 140: 103797 (2024) - [j10]Mohammed El-Hajj, Pim Beune:
Decentralized Zone-Based PKI: A Lightweight Security Framework for IoT Ecosystems. Inf. 15(6): 304 (2024) - [j9]Mohammed El-Hajj, Bjorn Oude Roelink:
Evaluating the Efficiency of zk-SNARK, zk-STARK, and Bulletproof in Real-World Scenarios: A Benchmark Study. Inf. 15(8): 463 (2024) - [j8]Gilian Schrijver, Dipti Kapoor Sarmah, Mohammed El-Hajj:
Automobile insurance fraud detection using data mining: A systematic literature review. Intell. Syst. Appl. 21: 200340 (2024) - [j7]Mohammed Elhajj, Pim Beune:
Lightweight public key infrastructure for the Internet of Things: A systematic literature review. J. Ind. Inf. Integr. 41: 100670 (2024) - [j6]Mohammed El-Hajj, Teklit Haftu Gebremariam:
Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0. Network 4(3): 260-294 (2024) - [j5]Mohammed El-Hajj, Taru Itäpelto, Teklit Haftu Gebremariam:
Systematic literature review: Digital twins' role in enhancing security for Industry 4.0 applications. Secur. Priv. 7(5) (2024) - [j4]Bjorn Oude Roelink, Mohammad El-Hajj, Dipti Kapoor Sarmah:
Systematic review: Comparing zk-SNARK, zk-STARK, and bulletproof protocols for privacy-preserving authentication. Secur. Priv. 7(5) (2024) - 2023
- [j3]Mohammed El-hajj, Hussien Mousawi, Ahmad Fadlallah:
Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform. Future Internet 15(2): 54 (2023) - [c12]Ewout Willem van der Wal, Mohammed El-Hajj:
Securing IoT Device Networks: A Digital Twin and Automated Adversary Emulation Approach. DTPI 2023: 1-6 - [c11]Vitomir Pavlov, Florian Hahn, Mohammad El-Hajj:
Security Aspects of Digital Twins in IoT. ICISSP 2023: 560-567 - [c10]Nerea Ramón Gómez, Mohammed El-Hajj:
An end-to-end Approach to a Reinforcement Learning in Transport Logistics. ICSPCS 2023: 1-10 - [c9]Zein Al-Abidin Mohammad Fneish, Mohammad El-Hajj, Khouloud Samrouth:
Survey on IoT Multi-Factor Authentication Protocols: A Systematic Literature Review. ISDFS 2023: 1-7 - [c8]Floris Breggeman, Mohammad El-Hajj, Florian Hahn:
A Comparison of Authentication Protocols for Unified Client Applications. ISNCC 2023: 1-7 - [c7]Toghrul Garalov, Mohammad El-Hajj:
Enhancing IoT Security: Design and Evaluation of a Raspberry Pi-Based Intrusion Detection System. ISNCC 2023: 1-7 - [c6]Catalin Rus, Dipti Kapoor Sarmah, Mohammed El-Hajj:
Defeating MageCart Attacks in a NAISS Way. SECRYPT 2023: 691-697 - [i1]Eduard-Matei Constantinescu, Mohammed Elhajj, Luca Mariot:
Smooth Number Message Authentication Code in the IoT Landscape. CoRR abs/2310.13954 (2023) - 2022
- [c5]Mohammed El-Hajj, Ahmad Fadlallah:
Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platforms. ITNAC 2022: 121-126 - [c4]Mohammed Elhajj, Hassan Jradi, Maroun Chamoun, Ahmad Fadlallah:
LASII: Lightweight Authentication Scheme using IOTA in IoT Platforms. MedComNet 2022: 74-83 - 2021
- [j2]Mohammad El-Hajj, Ahmad Fadlallah, Maroun Chamoun, Ahmed Serhrouchni:
A taxonomy of PUF Schemes with a novel Arbiter-based PUF resisting machine learning attacks. Comput. Networks 194: 108133 (2021)
2010 – 2019
- 2019
- [j1]Mohammed El-hajj, Ahmad Fadlallah, Maroun Chamoun, Ahmed Serhrouchni:
A Survey of Internet of Things (IoT) Authentication Schemes. Sensors 19(5): 1141 (2019) - [c3]Mohammad El-Hajj, Ahmad Fadlallah, Maroun Chamoun, Ahmed Serhrouchni:
Ethereum for Secure Authentication of IoT using Pre-Shared Keys (PSKs). WINCOM 2019: 1-7 - 2018
- [c2]Mohammed El-hajj, Maroun Chamoun, Ahmad Fadlallah, Ahmed Serhrouchni:
Analysis of Cryptographic Algorithms on IoT Hardware platforms. CSNet 2018: 1-5 - 2017
- [c1]Mohammed El-hajj, Maroun Chamoun, Ahmad Fadlallah, Ahmed Serhrouchni:
Analysis of authentication techniques in Internet of Things (IoT). CSNet 2017: 1-3
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint