Publications

Export 8 results:
Sort by: Author Title Type [ Year  (Desc)]
2015
Refaie, R., A. A. A. El-Aziz, N. Hamza, M. A. Mahmood, and H. Hefny, "A New Efficient Algorithm for Executing Queries over Encrypted Data", International Conference on Computing, Communication and Security (ICCCS), Dec, 2015.
Hussein, O., N. Hamza, and H. Hefny, "A Proposed Approach to Detect and Thwart Previously Unknown code Injection Attacks", the seventh International IEEE Conference on Intelligent Computing and Information System (ICICIS’15), 2015.
2014
Ibrahim, M. H., H. A. Hefny, and N. Hamza, "Contextual View-based Access Control Model for Spatial Data on Web", International Journal of Computer Applications, vol. 87, issue 15, 2014.
Hussein, O., N. Hamza, and H. Hefny, "Limitations of Current Security Measures to Address Information Leakage Attacks", International Journal of Computer Science and Information Security, vol. 12, issue 8, 2014.
2013
Hussien, A. -el-ela A., N. Hamza, and H. A. Hefny, "Attacks on Anonymization-Based Privacy-Preserving: A Survey for Data Mining and Data Publishing", Journal of Information Security, Scientific Research Publishing Inc 2013, vol. 4, issue , pp. 101-112, 2013.
2010
Hamza, N., and D. B. E. - D. M.Hassan, "A Dynamic ID-based authentication scheme with smart token ", , International Conference on: Computer Engineering & Systems, ICCES 2009. , cairo, egypt, 2009, 2010.
thneibat, A. A. M. A., B. E. M. Hasan, A. E. F. A. Hegazy, and N. Hamza, "Secure Outsourced Database Architecture", International Journal of Computer Science and Network Security, vol. 10, issue 5, 2010.
2009
Hamza, N., and B. E. - D. M.Hassan, "A proposal for an ID-Based authentication scheme using smart token", scientific conference on cyber-crime information security,, ACU, 2009.
Tourism