default search action
Amr M. Youssef
Person information
- affiliation: Concordia University, Montreal, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j94]Francesca Stabile, Walter Lucia, Amr M. Youssef, Giuseppe Franzè:
A Verifiable Computing Scheme for Encrypted Control Systems. IEEE Control. Syst. Lett. 8: 1096-1101 (2024) - [j93]Philippe Mangeard, Bhaskar Tejaswi, Mohammad Mannan, Amr M. Youssef:
WARNE: A stalkerware evidence collection tool. Forensic Sci. Int. Digit. Investig. 48: 301677 (2024) - [j92]Mohamed Seifelnasr, Riham AlTawy, Amr M. Youssef:
SKAFS: Symmetric Key Authentication Protocol With Forward Secrecy for Edge Computing. IEEE Internet Things J. 11(1): 510-525 (2024) - [j91]Bhaskar Tejaswi, Mohammad Mannan, Amr M. Youssef:
Security Weaknesses in IoT Management Platforms. IEEE Internet Things J. 11(1): 1572-1588 (2024) - [j90]Mohamed Seifelnasr, Riham AlTawy, Amr M. Youssef, Essam Ghadafi:
Privacy-Preserving Mutual Authentication Protocol With Forward Secrecy for IoT-Edge-Cloud. IEEE Internet Things J. 11(5): 8105-8117 (2024) - [j89]Omniyah Gul M. Khan, Fadi Elghitani, Amr M. Youssef, Magdy M. A. Salama, Ehab Fahmy El-Saadany:
Real-Time Congestion-Aware Charging Station Assignment Model for EVs. IEEE Internet Things J. 11(7): 11723-11736 (2024) - [j88]Ahmed Aly, Shahrear Iqbal, Amr M. Youssef, Essam Mansour:
MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning. IEEE Trans. Inf. Forensics Secur. 19: 5257-5271 (2024) - [j87]Ahmad Mohammad Saber, Amr M. Youssef, Davor Svetinovic, Hatem H. Zeineldin, Ehab F. El-Saadany:
Cyber-Immune Line Current Differential Relays. IEEE Trans. Ind. Informatics 20(3): 3597-3608 (2024) - [j86]Maryna Kluban, Mohammad Mannan, Amr M. Youssef:
On Detecting and Measuring Exploitable JavaScript Functions in Real-world Applications. ACM Trans. Priv. Secur. 27(1): 8:1-8:37 (2024) - [j85]Mouna Nakkar, Riham AlTawy, Amr M. Youssef:
Lightweight Group Authentication Scheme Leveraging Shamir's Secret Sharing and PUFs. IEEE Trans. Netw. Sci. Eng. 11(4): 3412-3429 (2024) - [c135]Abdelrahman Ragab, Mohammad Mannan, Amr M. Youssef:
"Trust Me Over My Privacy Policy": Privacy Discrepancies in Romantic AI Chatbot Apps. EuroS&P Workshops 2024: 484-495 - [c134]Sajjad Pourali, Xiufen Yu, Lianying Zhao, Mohammad Mannan, Amr M. Youssef:
Racing for TLS Certificate Validation: A Hijacker's Guide to the Android TLS Galaxy. USENIX Security Symposium 2024 - [i44]Ahmad Mohammad Saber, Amr M. Youssef, Davor Svetinovic, Hatem H. Zeineldin, Deepa Kundur, Ehab F. El-Saadany:
Enhancing Power Quality Event Classification with AI Transformer Models. CoRR abs/2402.14949 (2024) - [i43]Francesca Stabile, Walter Lucia, Amr M. Youssef, Giuseppe Franzè:
A Verifiable Computing Scheme for Encrypted Control Systems. CoRR abs/2405.18586 (2024) - 2023
- [j84]Mouna Nakkar, Riham AlTawy, Amr M. Youssef:
GASE: A Lightweight Group Authentication Scheme With Key Agreement for Edge Computing Applications. IEEE Internet Things J. 10(1): 840-854 (2023) - [j83]Mohammed Elbayoumi, Mohamed Ibrahim, Salah Elhoushy, Walaa Hamouda, Amr M. Youssef:
Performance Analysis of Cellular Ultradense IoT Networks With Wireless Backhauls. IEEE Internet Things J. 10(17): 15774-15787 (2023) - [j82]Omniyah Gul M. Khan, Amr M. Youssef, Magdy M. A. Salama, Ehab F. El-Saadany:
Management of Congestion in Distribution Networks Utilizing Demand Side Management and Reinforcement Learning. IEEE Syst. J. 17(3): 4452-4463 (2023) - [j81]Hisham S. Galal, Amr M. Youssef:
Aegis: Privacy-Preserving Market for Non-Fungible Tokens. IEEE Trans. Netw. Sci. Eng. 10(1): 92-102 (2023) - [j80]Riham AlTawy, Hisham S. Galal, Amr M. Youssef:
Mjolnir: Breaking the Glass in a Publicly Verifiable Yet Private Manner. IEEE Trans. Netw. Serv. Manag. 20(3): 2942-2956 (2023) - [c133]Bhaskar Tejaswi, Mohammad Mannan, Amr M. Youssef:
All Your IoT Devices Are Belong to Us: Security Weaknesses in IoT Management Platforms. CODASPY 2023: 245-250 - [c132]Abdelrahman Ragab, Mohammad Mannan, Amr M. Youssef:
Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps. ESORICS Workshops (1) 2023: 232-248 - [c131]Ismail Afia, Hisham S. Galal, Riham AlTawy, Amr M. Youssef:
vPass: Publicly Verifiable Fair Exchange Protocol for Vehicle Passports. ICBC 2023: 1-9 - [c130]Mohammed Elbayoumi, Mohamed Ibrahim, Salah Elhoushy, Walaa Hamouda, Amr M. Youssef:
Machine-Type Communications in mmWave Ultra-Dense Networks: Performance Analysis. ICC 2023: 5843-5848 - [c129]Ahmad Mohammad Saber, Amr M. Youssef, Davor Svetinovic, Hatem H. Zeineldin, Ehab F. El-Saadany:
Learning-Based Detection of Malicious Volt-VAr Control Parameters in Smart Inverters. IECON 2023: 1-6 - [c128]Philippe Mangeard, Xiufen Yu, Mohammad Mannan, Amr M. Youssef:
No Place to Hide: Privacy Exposure in Anti-stalkerware Apps and Support Websites. NordSec 2023: 18-36 - [c127]Supraja Baskaran, Lianying Zhao, Mohammad Mannan, Amr M. Youssef:
Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case. RAID 2023: 727-743 - [c126]Rohan Pagey, Mohammad Mannan, Amr M. Youssef:
All Your Shops Are Belong to Us: Security Weaknesses in E-commerce Platforms. WWW 2023: 2144-2154 - [i42]Amir Mohammad Naseri, Walter Lucia, Amr M. Youssef:
An Observer-Based Key Agreement Scheme for Remotely Controlled Mobile Robots. CoRR abs/2303.04931 (2023) - [i41]Supraja Baskaran, Lianying Zhao, Mohammad Mannan, Amr M. Youssef:
Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case. CoRR abs/2307.09317 (2023) - [i40]Bhaskar Tejaswi, Mohammad Mannan, Amr M. Youssef:
Security Weaknesses in IoT Management Platforms. CoRR abs/2307.13952 (2023) - [i39]Ahmad Mohammad Saber, Amr M. Youssef, Davor Svetinovic, Hatem H. Zeineldin, Ehab F. El-Saadany:
Learning-Based Detection of Malicious Volt-VAr Control Parameters in Smart Inverters. CoRR abs/2309.10304 (2023) - [i38]Hisham S. Galal, Amr M. Youssef:
Aegis: Privacy-Preserving Market for Non-Fungible Tokens. IACR Cryptol. ePrint Arch. 2023: 144 (2023) - 2022
- [j79]Hisham S. Galal, Mohammad Mannan, Amr M. Youssef:
Blindfold: Keeping private keys in PKIs and CDNs out of sight. Comput. Secur. 118: 102731 (2022) - [j78]Amir Mohammad Naseri, Walter Lucia, Amr M. Youssef:
Encrypted Cloud-Based Set-Theoretic Model Predictive Control. IEEE Control. Syst. Lett. 6: 3032-3037 (2022) - [j77]Mohammed Elbayoumi, Walaa Hamouda, Amr M. Youssef:
Edge Computing and Multiple-Association in Ultra-Dense Networks: Performance Analysis. IEEE Trans. Commun. 70(8): 5098-5112 (2022) - [j76]Abdullah Albarakati, Chantale Robillard, Mark Karanfil, Marthe Kassouf, Mourad Debbabi, Amr M. Youssef, Mohsen Ghafouri, Rachid Hadjidj:
Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management. IEEE Trans. Ind. Informatics 18(3): 1641-1653 (2022) - [j75]Ahmad Mohammad Saber, Amr M. Youssef, Davor Svetinovic, Hatem H. Zeineldin, Ehab F. El-Saadany:
Anomaly-Based Detection of Cyberattacks on Line Current Differential Relays. IEEE Trans. Smart Grid 13(6): 4787-4800 (2022) - [j74]Walter Lucia, Amr M. Youssef:
A Key-Agreement Scheme for Cyber-Physical Systems. IEEE Trans. Syst. Man Cybern. Syst. 52(8): 5368-5373 (2022) - [c125]Maryna Kluban, Mohammad Mannan, Amr M. Youssef:
On Measuring Vulnerable JavaScript Functions in the Wild. AsiaCCS 2022: 917-930 - [c124]Bhaskar Tejaswi, Nayanamana Samarasinghe, Sajjad Pourali, Mohammad Mannan, Amr M. Youssef:
Leaky Kits: The Increased Risk of Data Exposure from Phishing Kits. eCrime 2022: 1-13 - [c123]Nayanamana Samarasinghe, Pranay Kapoor, Mohammad Mannan, Amr M. Youssef:
No Salvation from Trackers: Privacy Analysis of Religious Websites and Mobile Apps. DPM/CBT@ESORICS 2022: 151-166 - [c122]Amir Mohammad Naseri, Walter Lucia, Amr M. Youssef:
A Privacy Preserving Solution for Cloud-Enabled Set-Theoretic Model Predictive Control. ECC 2022: 894-899 - [c121]Xiufen Yu, Nayanamana Samarasinghe, Mohammad Mannan, Amr M. Youssef:
Got Sick and Tracked: Privacy Analysis of Hospital Websites. EuroS&P Workshops 2022: 278-286 - [c120]Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr M. Youssef:
SAUSAGE: Security Analysis of Unix domain Socket usAGE in Android. EuroS&P 2022: 572-586 - [c119]Muhammad ElSheikh, Amr M. Youssef:
Dispute-Free Scalable Open Vote Network Using zk-SNARKs. Financial Cryptography Workshops 2022: 499-515 - [c118]Pranay Kapoor, Rohan Pagey, Mohammad Mannan, Amr M. Youssef:
Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly. SecureComm 2022: 673-691 - [c117]Nayanamana Samarasinghe, Aashish Adhikari, Mohammad Mannan, Amr M. Youssef:
Et tu, Brute? Privacy Analysis of Government Websites and Mobile Apps. WWW 2022: 564-575 - [i37]Muhammad ElSheikh, Amr M. Youssef:
Dispute-free Scalable Open Vote Network using zk-SNARKs. CoRR abs/2203.03363 (2022) - [i36]Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr M. Youssef:
SAUSAGE: Security Analysis of Unix domain Socket Usage in Android. CoRR abs/2204.01516 (2022) - [i35]Hisham S. Galal, Mohammad Mannan, Amr M. Youssef:
Blindfold: Keeping Private Keys in PKIs and CDNs out of Sight. CoRR abs/2207.09335 (2022) - [i34]Muhammad ElSheikh, Amr M. Youssef:
Dispute-free Scalable Open Vote Network using zk-SNARKs. IACR Cryptol. ePrint Arch. 2022: 310 (2022) - 2021
- [j73]Ahmed Abdelwahab, Walter Lucia, Amr M. Youssef:
Covert Channels in Cyber-Physical Systems. IEEE Control. Syst. Lett. 5(4): 1273-1278 (2021) - [j72]Suzan Ali, Mounir Elgharabawy, Quentin Duchaussoy, Mohammad Mannan, Amr M. Youssef:
Parental Controls: Safer Internet Solutions or New Pitfalls? IEEE Secur. Priv. 19(6): 36-46 (2021) - [j71]Walter Lucia, Amr M. Youssef:
Covert channels in stochastic cyber-physical systems. IET Cyper-Phys. Syst.: Theory & Appl. 6(4): 228-237 (2021) - [j70]Mohammed Elbayoumi, Walaa Hamouda, Amr M. Youssef:
Multiple-Association Supporting HTC/MTC in Limited-Backhaul Capacity Ultra-Dense Networks. IEEE Trans. Commun. 69(6): 4113-4127 (2021) - [j69]Olivier Cabana, Amr M. Youssef, Mourad Debbabi, Bernard Lebel, Marthe Kassouf, Ribal Atallah, Basile L. Agba:
Threat Intelligence Generation Using Network Telescope Data for Industrial Control Systems. IEEE Trans. Inf. Forensics Secur. 16: 3355-3370 (2021) - [j68]Omniyah Gul M. Khan, Ehab F. El-Saadany, Amr M. Youssef, Mostafa F. Shaaban:
Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems. IEEE Trans. Ind. Informatics 17(12): 8142-8153 (2021) - [j67]Mohamed Seifelnasr, Riham AlTawy, Amr M. Youssef:
Efficient Inter-Cloud Authentication and Micropayment Protocol for IoT Edge Computing. IEEE Trans. Netw. Serv. Manag. 18(4): 4420-4433 (2021) - [c116]Muhammad ElSheikh, Amr M. Youssef:
On MILP-Based Automatic Search for Bit-Based Division Property for Ciphers with (Large) Linear Layers. ACISP 2021: 111-131 - [c115]Ahmed Abdelwahab, Walter Lucia, Amr M. Youssef:
Covert Channels in Cyber-Physical Systems. ACC 2021: 4649-4654 - [c114]Hisham S. Galal, Amr M. Youssef:
Publicly Verifiable and Secrecy Preserving Periodic Auctions. Financial Cryptography Workshops 2021: 348-363 - [c113]Mohammed Elbayoumi, Walaa Hamouda, Amr M. Youssef:
Ergodic Secrecy Rate Analysis of Ultra-Dense Networks with Multiple Antennas. ICC 2021: 1-6 - [c112]Md Shahab Uddin, Mohammad Mannan, Amr M. Youssef:
Horus: A Security Assessment Framework for Android Crypto Wallets. SecureComm (2) 2021: 120-139 - [c111]Mouna Nakkar, Riham AlTawy, Amr M. Youssef:
Lightweight Authentication and Key Agreement Protocol for Edge Computing Applications. WF-IoT 2021: 415-420 - [i33]Omniyah Gul M. Khan, Ehab F. El-Saadany, Amr M. Youssef, Mostafa F. Shaaban:
Impact of Electric Vehicles Botnets on the Power Grid. CoRR abs/2103.09153 (2021) - [i32]Amir Mohammad Naseri, Walter Lucia, Mohammad Mannan, Amr M. Youssef:
On Securing Cloud-hosted Cyber-physical Systems Using Trusted Execution Environments. CoRR abs/2104.01011 (2021) - [i31]Walter Lucia, Amr M. Youssef:
Wyner wiretap-like encoding scheme for cyber-physical systems. CoRR abs/2105.03509 (2021) - [i30]Omniyah Gul M. Khan, Amr M. Youssef, Ehab F. El-Saadany, Magdy M. A. Salama:
LSTM-based approach to detect cyber attacks on market-based congestion management methods. CoRR abs/2109.13312 (2021) - [i29]Muhammad ElSheikh, Amr M. Youssef:
On MILP-based Automatic Search for Bit-Based Division Property for Ciphers with (large) Linear Layers. IACR Cryptol. ePrint Arch. 2021: 643 (2021) - 2020
- [b1]Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr M. Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna:
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting. Advances in Information Security 78, Springer 2020, ISBN 978-3-030-34237-1, pp. 1-233 - [j66]Mohammed Elbayoumi, Mahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef:
NOMA-Assisted Machine-Type Communications in UDN: State-of-the-Art and Challenges. IEEE Commun. Surv. Tutorials 22(2): 1276-1304 (2020) - [j65]Abdelrahman Ayad, Hany Essa Zidan Farag, Amr M. Youssef, Ehab F. El-Saadany:
Cyber-physical attacks on power distribution systems. IET Cyper-Phys. Syst.: Theory & Appl. 5(2): 218-225 (2020) - [j64]Walter Lucia, Amr M. Youssef:
Wyner wiretap-like encoding scheme for cyber-physical systems. IET Cyper-Phys. Syst.: Theory & Appl. 5(4): 359-365 (2020) - [j63]Mahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef:
Uplink Performance of NOMA-Based Combined HTC and MTC in Ultradense Networks. IEEE Internet Things J. 7(8): 7319-7333 (2020) - [j62]Mouna Nakkar, Riham AlTawy, Amr M. Youssef:
Lightweight Broadcast Authentication Protocol for Edge-Based Applications. IEEE Internet Things J. 7(12): 11766-11777 (2020) - [j61]Amir Ameli, Ali Hooshyar, Ehab F. El-Saadany, Amr M. Youssef:
An Intrusion Detection Method for Line Current Differential Relays. IEEE Trans. Inf. Forensics Secur. 15: 329-344 (2020) - [j60]Mahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef:
Uplink Coverage and Capacity Analysis of mMTC in Ultra-Dense Networks. IEEE Trans. Veh. Technol. 69(1): 746-759 (2020) - [c110]Suzan Ali, Mounir Elgharabawy, Quentin Duchaussoy, Mohammad Mannan, Amr M. Youssef:
Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions. ACSAC 2020: 69-83 - [c109]Mohamed Tolba, Muhammad ElSheikh, Amr M. Youssef:
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE. AFRICACRYPT 2020: 91-113 - [c108]Muhammad ElSheikh, Amr M. Youssef:
Integral Cryptanalysis of Reduced-Round Tweakable TWINE. CANS 2020: 485-504 - [c107]Ahmed Abdelwahab, Walter Lucia, Amr M. Youssef:
Set-Theoretic Control for Active Detection of Replay Attacks with Applications to Smart Grid. CCTA 2020: 1004-1009 - [c106]Mohamed Seifelnasr, Mouna Nakkar, Amr M. Youssef, Riham AlTawy:
A Lightweight Authentication and Inter-Cloud Payment Protocol for Edge Computing. CloudNet 2020: 1-4 - [c105]Hisham S. Galal, Amr M. Youssef:
Privacy Preserving Netting Protocol for Inter-bank Payments. DPM/CBT@ESORICS 2020: 319-334 - [c104]Mohamed Seifelnasr, Hisham S. Galal, Amr M. Youssef:
Scalable Open-Vote Network on Ethereum. Financial Cryptography Workshops 2020: 436-450 - [c103]Mohammed Elbayoumi, Walaa Hamouda, Amr M. Youssef:
A Hybrid NOMA/OMA Scheme for MTC in Ultra-Dense Networks. GLOBECOM 2020: 1-6 - [c102]Mohammed Elbayoumi, Walaa Hamouda, Amr M. Youssef:
Secrecy Performance in Ultra-Dense Networks with Multiple Associations. GLOBECOM (Workshops) 2020: 1-6 - [c101]Elizabeth Stobert, Tina Safaie, Heather Molyneaux, Mohammad Mannan, Amr M. Youssef:
ByPass: Reconsidering the Usability of Password Managers. SecureComm (1) 2020: 446-466 - [e5]Abderrahmane Nitaj, Amr M. Youssef:
Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings. Lecture Notes in Computer Science 12174, Springer 2020, ISBN 978-3-030-51937-7 [contents] - [i28]Mohammed Elbayoumi, Walaa Hamouda, Amr M. Youssef:
Multiple-Association Supporting HTC/MTC in Limited-Backhaul Capacity Ultra-Dense Networks. CoRR abs/2009.13456 (2020) - [i27]Suzan Ali, Mounir Elgharabawy, Quentin Duchaussoy, Mohammad Mannan, Amr M. Youssef:
Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions. CoRR abs/2012.06502 (2020) - [i26]Mohamed Seifelnasr, Hisham S. Galal, Amr M. Youssef:
Scalable Open-Vote Network on Ethereum. IACR Cryptol. ePrint Arch. 2020: 33 (2020) - [i25]Mohamed Tolba, Muhammad ElSheikh, Amr M. Youssef:
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE. IACR Cryptol. ePrint Arch. 2020: 52 (2020) - [i24]Muhammad ElSheikh, Amr M. Youssef:
A cautionary note on the use of Gurobi for cryptanalysis. IACR Cryptol. ePrint Arch. 2020: 1112 (2020) - [i23]Muhammad ElSheikh, Amr M. Youssef:
Integral Cryptanalysis of Reduced-Round Tweakable TWINE. IACR Cryptol. ePrint Arch. 2020: 1227 (2020)
2010 – 2019
- 2019
- [j59]Sharon Shasha, Moustafa Mahmoud, Mohammad Mannan, Amr M. Youssef:
Playing With Danger: A Taxonomy and Evaluation of Threats to Smart Toys. IEEE Internet Things J. 6(2): 2986-3002 (2019) - [j58]Mohsen Khalaf, Amr M. Youssef, Ehab F. El-Saadany:
Joint Detection and Mitigation of False Data Injection Attacks in AGC Systems. IEEE Trans. Smart Grid 10(5): 4985-4995 (2019) - [c100]Tousif Osman, Mohammad Mannan, Urs Hengartner, Amr M. Youssef:
AppVeto: mobile application self-defense through resource access veto. ACSAC 2019: 366-377 - [c99]Muhammad ElSheikh, Ahmed Abdelkhalek, Amr M. Youssef:
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T. AFRICACRYPT 2019: 273-296 - [c98]Olivier Cabana, Amr M. Youssef, Mourad Debbabi, Bernard Lebel, Marthe Kassouf, Basile L. Agba:
Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems. DIMVA 2019: 89-108 - [c97]Suzan Ali, Tousif Osman, Mohammad Mannan, Amr M. Youssef:
On Privacy Risks of Public WiFi Captive Portals. DPM/CBT@ESORICS 2019: 80-98 - [c96]Hisham S. Galal, Muhammad ElSheikh, Amr M. Youssef:
An Efficient Micropayment Channel on Ethereum. DPM/CBT@ESORICS 2019: 211-218 - [c95]Muhammad ElSheikh, Jeremy Clark, Amr M. Youssef:
Short Paper: Deploying PayWord on Ethereum. Financial Cryptography Workshops 2019: 82-90 - [c94]Hisham S. Galal, Amr M. Youssef:
Trustee: Full Privacy Preserving Vickrey Auction on Top of Ethereum. Financial Cryptography Workshops 2019: 190-207 - [c93]Mohammed Elbayoumi, Mahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef:
Capacity Analysis of Downlink NOMA-Based Coexistent HTC/MTC in UDN. ICCSPA 2019: 1-6 - [c92]Abdullah Albarakati, Chantale Robillard, Mark Karanfil, Marthe Kassouf, Rachid Hadjidj, Mourad Debbabi, Amr M. Youssef:
Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management1. SmartGridComm 2019: 1-7 - [c91]Muhammad ElSheikh, Amr M. Youssef:
Related-Key Differential Cryptanalysis of Full Round CRAFT. SPACE 2019: 50-66 - [i22]Hisham S. Galal, Amr M. Youssef:
Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum. CoRR abs/1905.06280 (2019) - [i21]Suzan Ali, Tousif Osman, Mohammad Mannan, Amr M. Youssef:
On Privacy Risks of Public WiFi Captive Portals. CoRR abs/1907.02142 (2019) - [i20]Hisham S. Galal, Amr M. Youssef:
Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum. IACR Cryptol. ePrint Arch. 2019: 102 (2019) - [i19]Muhammad ElSheikh, Ahmed Abdelkhalek, Amr M. Youssef:
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T. IACR Cryptol. ePrint Arch. 2019: 476 (2019) - [i18]Muhammad ElSheikh, Amr M. Youssef:
Related-key Differential Cryptanalysis of Full Round CRAFT. IACR Cryptol. ePrint Arch. 2019: 932 (2019) - [i17]Hisham S. Galal, Muhammad ElSheikh, Amr M. Youssef:
An Efficient Micropayment Channel on Ethereum. IACR Cryptol. ePrint Arch. 2019: 1322 (2019) - 2018
- [j57]Muhammad ElSheikh, Mohamed Tolba, Amr M. Youssef:
Impossible Differential Attack on Reduced Round SPARX-128/256. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(4): 731-733 (2018) - [j56]Ahmed Abdelkhalek, Mohamed Tolba, Amr M. Youssef:
Related-Key Differential Attack on Round-Reduced Bel-T-256. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(5): 859-862 (2018) - [j55]Amir Ameli, Ali Hooshyar, Ameen Hassan Yazdavar, Ehab F. El-Saadany, Amr M. Youssef:
Attack Detection for Load Frequency Control Systems Using Stochastic Unknown Input Estimators. IEEE Trans. Inf. Forensics Secur. 13(10): 2575-2590 (2018) - [c90]Louis Waked, Mohammad Mannan, Amr M. Youssef:
To Intercept or Not to Intercept: Analyzing TLS Interception in Network Appliances. AsiaCCS 2018: 399-412 - [c89]Hisham S. Galal, Amr M. Youssef:
Succinctly Verifiable Sealed-Bid Auction Smart Contract. DPM/CBT@ESORICS 2018: 3-19 - [c88]Hisham S. Galal, Amr M. Youssef:
Verifiable Sealed-Bid Auction on the Ethereum Blockchain. Financial Cryptography Workshops 2018: 265-278 - [c87]Onur Duman, Amr M. Youssef:
Fault Analysis of the New Ukrainian Hash Function Standard: Kupyna. FPS 2018: 225-240 - [c86]