Rafik Hamza
Rafik Hamza
Tokyo International University, Tokyo, Japan
Verified email at - Homepage
Cited by
Cited by
Secure surveillance framework for IoT systems using probabilistic image encryption
K Muhammad, R Hamza, J Ahmad, J Lloret, H Wang, SW Baik
IEEE Transactions on Industrial Informatics 14 (8), 3679-3689, 2018
A privacy-preserving cryptosystem for IoT E-healthcare
R Hamza, Z Yan, K Muhammad, P Bellavista, F Titouna
Information Sciences 527, 493-510, 2020
Hash based encryption for keyframes of diagnostic hysteroscopy
R Hamza, K Muhammad, N Arunkumar, G Ramirez-Gonzalez
IEEE Access 6, 60160-60170, 2017
Sensitive and energetic IoT access control for managing cloud electronic health records
K Riad, R Hamza, H Yan
IEEE Access 7, 86384-86393, 2019
A novel pseudo random sequence generator for image-cryptographic applications
R Hamza
Journal of Information Security and Applications 35, 119-127, 2017
A novel sensitive image encryption algorithm based on Zaslavsky chaotic map
R Hamza, F Titouna
Information Security Journal: A Global Perspective, 1-18, 2016
Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts
AS Patil, R Hamza, A Hassan, N Jiang, H Yan, J Li
Computers & Security 97, 101958, 2020
Secure video summarization framework for personalized wireless capsule endoscopy
R Hamza, K Muhammad, Z Lv, F Titouna
Pervasive and Mobile Computing 41, 436-450, 2017
A novel image encryption algorithm based on hybrid chaotic maps using a key image
S Benaissi, N Chikouche, R Hamza
Optik 272, 170316, 2023
An efficient outsourced privacy preserving machine learning scheme with public verifiability
A Hassan, R Hamza, H Yan, P Li
IEEE Access 1 (PP(99)), 1-1, 2019
An efficient cryptosystem for video surveillance in the internet of things environment
R Hamza, A Hassan, T Huang, L Ke, H Yan
Complexity 2019 (1), 1625678, 2019
Towards secure big data analysis via fully homomorphic encryption algorithms
R Hamza, A Hassan, A Ali, MB Bashir, SM Alqhtani, TM Tawfeeg, A Yousif
Entropy 24 (4), 519, 2022
Blockchain-PUF-based secure authentication protocol for Internet of Things
AS Patil, R Hamza, H Yan, A Hassan, J Li
Algorithms and Architectures for Parallel Processing: 19th International …, 2020
Greedy firefly algorithm for optimizing job scheduling in iot grid computing
A Yousif, SM Alqhtani, MB Bashir, A Ali, R Hamza, A Hassan, TM Tawfeeg
sensors 22 (3), 850, 2022
A lightweight secure IoT surveillance framework based on DCT-DFRT algorithms
R Hamza, A Hassan, AS Patil
Machine Learning for Cyber Security: Second International Conference, ML4CS …, 2019
A survey of intellectual property rights protection in big data applications
R Hamza, H Pradana
Algorithms 15 (11), 418, 2022
Cloud dynamic load balancing and reactive fault tolerance techniques: a systematic literature review (SLR)
TM Tawfeeg, A Yousif, A Hassan, SM Alqhtani, R Hamza, MB Bashir, A Ali
IEEE Access 10, 71853-71873, 2022
Privacy-preserving deep learning techniques for wearable sensor-based big data applications
R Hamza, D Minh-Son
Virtual Reality & Intelligent Hardware 4 (3), 210-222, 2022
Investigation on privacy-preserving techniques for personal data
R Hamza, K Zettsu
Proceedings of the 2021 ACM Workshop on Intelligent Cross-Data Analysis and …, 2021
Machine Learning for Cyber Security: Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings
X Chen, X Huang, J Zhang
Springer Nature, 2019
The system can't perform the operation now. Try again later.
Articles 1–20