Saroit, I. A., I. A. Saroit, and A. E. E. A. A. E. Ella, "the 35th Annual ISSR Conference", Cryptograhy for Computer Network Security, November , 2000. paper_abo_el_ela_abdou_master_35issr11-2000.doc
Saroit, I. A., M. R. Mahmoud, and W. M. Abdelwahab, "Proposed Network Coding Solution for Multimedia Streaming over Wireless Networks", International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, issue 7, pp. 2582-2588, 2013. 12.pdf
Saroit, I. A., I. A. Saroit, H. El-Mahdy, and Eid Emary, "Routing Wireless Sensor Networks based on Soft Computing Paradigms: Survey", International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI), issue 4, 2013. 9.pdf
Saroit, I. A., H. S. Hamza, and I. A. Saroit, "Improving Coverage and Connectivity in Mobile Sensor Networks Using Harmony Search", 12th International Symposium on in Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt , Hammamat, Tunisia, May, 2014. 7.pdf
Saroit, I. A., I. A. Saroit, and W. M. Abdelwahab, "A Review of Network Coding and Multimedia Traffic over Wireless Networks within 2013", International Journal of Advanced Research in Computer and Communication Engineering, vol. 3, issue 7, pp. 7343-7350, 2014. 6.pdf
Saroit, I. A., H. S. Hamza, and I. A. Saroit, "Harmony Search-based K-Coverage Enhancement in Wireless Sensor Networks", International Journal of Computer, Information, Systems and Control Engineering, vol. 9, issue 1, pp. 178 186, 2015. 3.pdf
Saroit, I. A., H. S. Hamza, and I. A. Saroit, "An Integrated Security Framework for Access Control and Address Auto-configuration for MANETS", WMNC 2015, 8th IFIP Wireless and Mobile Networking Conference, Minich, Germany, 5-7 October 2015. 2.pdf
Saroit, I. A., M. Mahmoud, S. Taha, and I. A. Saroit, "Secure and Privacy-Preserving AMI-Utility Communications via LTE-A Networks", IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), UAE, Abu Dhabi, 19-21 October 20, 2015. 1.pdf
Mo'men, A. A., H. Hamza, and I. A. Tharwat, "Secure multicast routing protocols in mobile ad-hoc networks", International Journal of Communication Systems, 2013. Abstract

A mobile ad-hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network. Routing protocols in MANETs define how routes between source and destination nodes are established and maintained. Multicast routing provides a bandwidth-efficient means for supporting group-oriented applications. The increasing demand for such applications coupled with the inherent characteristics of MANETs (e.g., lack of infrastructure and node mobility) have made secure multicast
routing a crucial yet challenging issue. Recently, several multicast routing protocols (MRP) have been
proposed in MANETs. Depending on whether security is built-in or added, MRP can be classified into two
types: secure and security-enhanced routing protocols, respectively. This paper presents a survey on secure and security-enhanced MRP along with their security techniques and the types of attacks they can confront. A detailed comparison for the capability of the various routing protocols against some known attacks is also presented and analyzed.

Saroit, I. A., Y. Sabbah, and A. Kotb, "Synchronous Authentication with Bimodal Biometrics for e-Assessment: A Theoretical Model", 6th International Conference (SETIT), Sousse, Tunisia, March, 2012. Abstract

This paper presents a theoretical model for summative e-assessment in distance learning for the future, where exams can be conducted distantly, e.g. at home. This model aims to provide e-learning systems with an authentication approach that guarantees cheating-free summative e-assessment. It utilizes a combination of live video monitoring and a bimodal biometrics approach. Together they form a robust and highly secure model to ensure that the examinee is the correct person throughout the e-assessment period without a need for a proctor. Advanced techniques of image and video processing and feature extraction are required to implement this model.