Mohamed H. Eldefrawy
Mohamed H. Eldefrawy
The School of Information Technology, Halmstad University, Sweden.
Verified email at
Cited by
Cited by
OTP-based two-factor authentication using mobile phones
MH Eldefrawy, K Alghathbar, MK Khan
2011 eighth international conference on information technology: new …, 2011
Formal security analysis of LoRaWAN
M Eldefrawy, I Butun, N Pereira, M Gidlund
Computer Networks 148, 328-339, 2019
A machine-learning-based technique for false data injection attacks detection in industrial IoT
MMN Aboelwafa, KG Seddik, MH Eldefrawy, Y Gadallah, M Gidlund
IEEE Internet of Things Journal 7 (9), 8462-8471, 2020
A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography
MH Eldefrawy, MK Khan, K Alghathbar
2010 International Conference on Anti-Counterfeiting, Security and …, 2010
Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges
T Gebremichael, LP Ledwapa, M Eldefrawy, GP Hancke Jr, N Pereira, ...
IEEE Access, 2020
Mobile one‐time passwords: two‐factor authentication using mobile phones
MH Eldefrawy, MK Khan, K Alghathbar, TH Kim, H Elkamchouchi
Security and Communication Networks 5 (5), 508-516, 2012
Challenges of securing the industrial internet of things value chain
S Forsström, I Butun, M Eldefrawy, U Jennehag, M Gidlund
2018 Workshop on Metrology for Industry 4.0 and IoT, 218-223, 2018
Broadcast authentication for wireless sensor networks using nested hashing and the Chinese remainder theorem
MH Eldefrawy, MK Khan, K Alghathbar, ES Cho
Sensors 10 (9), 8683-8695, 2010
One-time password authentication with infinite nested hash claims
MK Khan, MHK Eldefrawy, KS Alghathbar
US Patent 8,683,564, 2014
Key distribution protocol for industrial Internet of Things without implicit certificates
MH Eldefrawy, N Pereira, M Gidlund
IEEE Internet of Things Journal 6 (1), 906-917, 2018
One-time password system with infinite nested Hash chains
MH Eldefrawy, MK Khan, K Alghathbar
Security Technology, Disaster Recovery and Business Continuity …, 2010
Hardcopy document authentication based on public key encryption and 2D barcodes
MH Eldefrawy, K Alghathbar, MK Khan
2012 International Symposium on Biometrics and Security Technologies, 77-81, 2012
Banknote validation through an embedded RFID chip and an NFC-enabled smartphone
MH Eldefrawy, MK Khan
Mathematical Problems in Engineering 2015, 2015
Guest editorial: Security, privacy, and trust for Industrial Internet of Things
M Gidlund, GP Hancke Jr, M Eldefrawy, J Åkerberg
IEEE Transactions on Industrial Informatics 16 (1), 625-628, 2020
Cryptanalysis and enhancement of a password-based authentication scheme
MH Eldefrawy, JF Al-Muhtadi
2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015
System and method for currency validation
MHK Eldefrawy, MK Khan
US Patent 8,931,688, 2015
BAN logic-based security proof for mobile OTP authentication scheme
MS Alkatheiri, MH Eldefrawy, MK Khan
Future Information Technology, Application, and Service: FutureTech 2012 …, 2012
An efficient and confirmed protocol for authenticated key agreement
H Elkamchouchi, M Eldefrawy
Radio Science Conference, 2008. NRSC 2008. National, 1-8, 2008
A new approach for key controlled agreement
H Elkamchouchi, M Eldefrawy
2007 National Radio Science Conference, 1-7, 2007
The use of two authentication factors to enhance the security of mass storage devices
MH Eldefrawy, MK Khan, H Elkamchouchi
2014 11th International Conference on Information Technology: New …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20