No photo of Hoda Alkhzaimi
20112024

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    Securing Smart Homes: A Cloud-Based IoT Approach to Intelligent Home Security

    Alkhzaimi, H. A., Thabit, F., Can, O., Abougarair, A. J., Abdaljlil, S. & Alhomdy, S., 2024, Artificial Intelligence and Its Practical Applications in the Digital Economy - Proceedings of the International Conference on Artificial Intelligence and Its Practical Applications in the Age of Digital Transformation 2024. Elhadj, Y. M., Nanne, M. F., Koubaa, A., Meziane, F. & Deriche, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 244-263 20 p. (Lecture Notes in Networks and Systems; vol. 861 LNNS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2023

    Towards Mutual Trust-Based Matching For Federated Learning Client Selection

    Wehbi, O., Wahab, O. A., Mourad, A., Otrok, H., Alkhzaimi, H. & Guizani, M., 2023, 2023 International Wireless Communications and Mobile Computing, IWCMC 2023. Institute of Electrical and Electronics Engineers Inc., p. 1112-1117 6 p. (2023 International Wireless Communications and Mobile Computing, IWCMC 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2020

    MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors

    Darabseh, A., Alkhzaimi, H. & Pöpper, C., Jul 8 2020, WiSec 2020 - Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, p. 53-64 12 p. (WiSec 2020 - Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2019

    Side channel analysis of SPARX-64/128: Cryptanalysis and countermeasures

    Ramesh, S. M. & AlKhzaimi, H., 2019, Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Proceedings. Buchmann, J., Nitaj, A. & Rachidi, T. (eds.). Springer Verlag, p. 352-369 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11627 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2018

    Cryptanalysis of 1-round KECCAK

    Kumar, R., Rajasree, M. S. & AlKhzaimi, H., 2018, Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings. Nitaj, A., Rachidi, T. & Joux, A. (eds.). Springer Verlag, p. 124-137 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10831 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2015

    Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48

    Abdelraheem, M. A., Alizadeh, J., Alkhzaimi, H. A., Aref, M. R., Bagheri, N. & Gauravaram, P., 2015, Progress in Cryptology – INDOCRYPT 2015 - 16th International Conference on Cryptology in India, Proceedings. Biryukov, A. & Goyal, V. (eds.). Springer Verlag, p. 153-179 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9462).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Links among impossible differential, integral and zero correlation linear cryptanalysis

    Sun, B., Liu, Z., Rijmen, V., Li, R., Cheng, L., Wang, Q., Alkhzaimi, H. & Li, C., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). Springer Verlag, p. 95-115 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9215).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2011

    A cryptanalysis of PRINTcipher: The invariant subspace attack

    Leander, G., Abdelraheem, M. A., Alkhzaimi, H. & Zenner, E., 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. Springer Verlag, p. 206-221 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
Your message has successfully been sent.
Your message was not sent due to an error.