thneibat, A. A. M. A., B. E. M. Hasan, A. E. F. A. Hegazy, and N. Hamza, "Secure Outsourced Database Architecture", International Journal of Computer Science and Network Security, vol. 10, issue 5, 2010.
Hamza, N., and D. B. E. - D. M.Hassan, "A Dynamic ID-based authentication scheme with smart token ", , International Conference on: Computer Engineering & Systems, ICCES 2009. , cairo, egypt, 2009, 2010.
Refaie, R., A. A. A. El-Aziz, N. Hamza, M. A. Mahmood, and H. Hefny, "A New Efficient Algorithm for Executing Queries over Encrypted Data", International Conference on Computing, Communication and Security (ICCCS), Dec, 2015.
Hussein, O., N. Hamza, and H. Hefny, "Limitations of Current Security Measures to Address Information Leakage Attacks", International Journal of Computer Science and Information Security, vol. 12, issue 8, 2014.
Hussein, O., N. Hamza, and H. Hefny, "A Proposed Approach to Detect and Thwart Previously Unknown code Injection Attacks", the seventh International IEEE Conference on Intelligent Computing and Information System (ICICIS’15), 2015.
Ibrahim, M. H., H. A. Hefny, and N. Hamza, "Contextual View-based Access Control Model for Spatial Data on Web", International Journal of Computer Applications, vol. 87, issue 15, 2014.
Hussien, A. -el-ela A., N. Hamza, and H. A. Hefny, "Attacks on Anonymization-Based Privacy-Preserving: A Survey for Data Mining and Data Publishing", Journal of Information Security, Scientific Research Publishing Inc 2013, vol. 4, issue , pp. 101-112, 2013.
Hamza, N., and B. E. - D. M.Hassan, "A proposal for an ID-Based authentication scheme using smart token", scientific conference on cyber-crime information security,, ACU, 2009.