Follow
Shimaa A. Abdel Hakeem
Shimaa A. Abdel Hakeem
Shimaa A. Abdel Hakeem ,Postdoctoral Fellow at Brain Korea 21 Plus (BK21) ,South Korea
Verified email at chungbuk.ac.kr
Title
Cited by
Cited by
Year
5G-V2X: Standardization, architecture, use cases, network-slicing, and edge-computing
SA Abdel Hakeem, AA Hady, HW Kim
Wireless Networks 26 (8), 6015-6041, 2020
1102020
Security Requirements and Challenges of 6G Technologies and Applications
HyungWon Kim, Shimaa A. Abdel Hakeem,Hanan H. Hussein
Sensors 2022, 22 (5), 1969, 2022
101*2022
Vision and research directions of 6G technologies and applications
SAA Hakeem, HH Hussein, HW Kim
Journal of King Saud University-Computer and Information Sciences 34 (6 …, 2022
792022
RPL routing protocol performance in smart grid applications based wireless sensors: Experimental and simulated analysis
SA Abdel Hakeem, AA Hady, HW Kim
Electronics 8 (2), 186, 2019
632019
A decentralized lightweight authentication and privacy protocol for vehicular networks
SAA Hakeem, MA Abd El-Gawad, HW Kim
IEEE Access 7, 119689-119705, 2019
522019
Current and future developments to improve 5G-NewRadio performance in vehicle-to-everything communications
SA Abdel Hakeem, AA Hady, HW Kim
Telecommunication systems 75 (3), 331-353, 2020
362020
Multi-zone authentication and privacy-preserving protocol (MAPP) based on the bilinear pairing cryptography for 5G-V2X
SAA Hakeem, HW Kim
Sensors 21 (2), 665, 2021
202021
Comparative experiments of V2X security protocol based on hash chain cryptography
SAA Hakeem, MAA El-Gawad, HW Kim
Sensors 20 (19), 5719, 2020
182020
A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks
HK Shimaa A. Abdel Hakeem,Sherine M Abd El-Kader
Sensors 21 (17), 5838, 2021
132021
Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication
HWK Shimaa A. Abdel Hakeem
Sensors 22 (1), 331, 2022
122022
Optimizing 5G in V2X communications: Technologies, requirements, challenges, and standards
SA AbdelHakeem, AA Hady, HW Kim
Fundamental and supportive technologies for 5G mobile networks, 269-308, 2020
102020
New real evaluation study of rpl routing protocol based on cortex m3 nodes of iot-lab test bed
SAA Hakeem, TM Barakat, RAA Seoud
Middle-East Journal of Scientific Research 23 (8), 1639-1651, 2015
82015
IKE hardware engine based on CAM for concurrent processing of massive user sessions
SA Naby, S Arslan, HW Kim
2017 13th international computer engineering conference (icenco), 154-159, 2017
42017
Authentication and encryption protocol with revocation and reputation management for enhancing 5G-V2X security
SAA Hakeem, H Kim
Journal of King Saud University-Computer and Information Sciences 35 (7), 101638, 2023
22023
Implementation of IPsec-VPN Tunnel Using GNS3
S Abdelnaby, HW Kim
한국통신학회 학술대회논문집, 177-179, 2018
12018
Evaluation and analysis of a secure voting-based aggregated signatures authentication and revocation protocol for 5 G-V2X communication
SAA Hakeem, HW Kim
Alexandria Engineering Journal 85, 160-176, 2023
2023
Authentication and encryption protocol with revocation and reputation management for enhancing 5G-V2X security
SA Abdel Hakeem, H Kim
2023
Unicast Encryption Protocol for Vehicular Communication
S Abdelnaby, HW Kim
한국통신학회 학술대회논문집, 1499-1500, 2019
2019
Time Efficient Lightweight Authentication Protocol for V2X Networks
S Abdelnaby, MA Abd El-Gawad, HW Kim
한국통신학회 학술대회논문집, 443-444, 2018
2018
Efficient Vehicular Network Authentication Using Aggregate Message Authentication Code
S Abdelnaby, HW Kim
한국통신학회 학술대회논문집, 1559-1560, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20