default search action
Mahmood Al Shareeda
Person information
- affiliation: Universiti Sains Malaysia, Penang, Malaysia
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Badiea Abdulkarem Mohammed, Mahmood A. Al-Shareeda, Zeyad Ghaleb Al-Mekhlafi, Jalawi Sulaiman Alshudukhi, Kawther A. Al-Dhlan:
HAFC: Handover Authentication Scheme Based on Fog Computing for 5G-Assisted Vehicular Blockchain Networks. IEEE Access 12: 6251-6261 (2024) - [j28]Abdulwahab Ali Almazroi, Monagi H. Alkinani, Mahmood A. Al-Shareeda, Mohammed A. Alqarni, Alaa Atallah Almazroey, Tarek Gaber:
FC-LSR: Fog Computing-Based Lightweight Sybil Resistant Scheme in 5G-Enabled Vehicular Networks. IEEE Access 12: 30101-30112 (2024) - [j27]Badiea Abdulkarem Mohammed, Mahmood A. Al-Shareeda, Abeer Abdullah Alsadhan, Zeyad Ghaleb Al-Mekhlafi, Amer A. Sallam, Bassam Ali Al-Qatab, Mohammad T. Alshammari, Abdulaziz M. Alayba:
Efficient Blockchain-Based Pseudonym Authentication Scheme Supporting Revocation for 5G-Assisted Vehicular Fog Computing. IEEE Access 12: 33089-33099 (2024) - [j26]Zeyad Ghaleb Al-Mekhlafi, Hussam Dheaa Kamel Al-Janabi, Ayman Khalil, Mahmood A. Al-Shareeda, Badiea Abdulkarem Mohammed, Abeer Abdullah Alsadhan, Abdulaziz M. Alayba, Ahmed M. Shamsan Saleh, Hamad A. Al-Reshidi, Khalil Almekhlafi:
Lattice-Based Cryptography and Fog Computing Based Efficient Anonymous Authentication Scheme for 5G-Assisted Vehicular Communications. IEEE Access 12: 71232-71247 (2024) - [j25]Hussam Dheaa Kamel Al-Janabi, Saima Anwar Lashari, Mahmood A. Al-Shareeda, Ayman Khalil, Abeer Abdullah Alsadhan, Mohammed Amin Almaiah, Tayseer Alkhdour:
D-BlockAuth: An Authentication Scheme-Based Dual Blockchain for 5G-Assisted Vehicular Fog Computing. IEEE Access 12: 99321-99332 (2024) - [j24]Zeyad Ghaleb Al-Mekhlafi, Saima Anwar Lashari, Jalal Mohammed Hachim Altmemi, Mahmood A. Al-Shareeda, Badiea Abdulkarem Mohammed, Amer A. Sallam, Bassam Ali Al-Qatab, Mohammad T. Alshammari, Abdulaziz M. Alayba:
Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing. IEEE Access 12: 100152-100166 (2024) - [j23]Zeyad Ghaleb Al-Mekhlafi, Saima Anwar Lashari, Mahmood A. Al-Shareeda, Badiea Abdulkarem Mohammed, Abdulaziz M. Alayba, Ahmed M. Shamsan Saleh, Hamad A. Al-Reshidi, Khalil Almekhlafi:
CLA-FC5G: A Certificateless Authentication Scheme Using Fog Computing for 5G-Assisted Vehicular Networks. IEEE Access 12: 141514-141527 (2024) - [j22]Zeyad Ghaleb Al-Mekhlafi, Mahmood A. Al-Shareeda, Badiea Abdulkarem Mohammed, Abdulaziz M. Alayba, Ahmed M. Shamsan Saleh, Hamad A. Al-Reshidi, Khalil Almekhlafi:
Integrating Safety in VANETs: A Taxonomy and Systematic Review of VEINS Models. IEEE Access 12: 148935-148960 (2024) - [j21]Abdulwahab Ali Almazroi, Mohammed A. Alqarni, Mahmood A. Al-Shareeda, Monagi H. Alkinani, Alaa Atallah Almazroey, Tarek Gaber:
FCA-VBN: Fog computing-based authentication scheme for 5G-assisted vehicular blockchain network. Internet Things 25: 101096 (2024) - [j20]Badiea Abdulkarem Mohammed, Mahmood A. Al-Shareeda, Abeer Abdullah Alsadhan, Zeyad Ghaleb Al-Mekhlafi, Amer A. Sallam, Bassam Ali Al-Qatab, Mohammad T. Alshammari, Abdulaziz M. Alayba:
Service based VEINS framework for vehicular Ad-hoc network (VANET): A systematic review of state-of-the-art. Peer Peer Netw. Appl. 17(4): 2259-2281 (2024) - 2023
- [j19]Badiea Abdulkarem Mohammed, Mahmood A. Al-Shareeda, Selvakumar Manickam, Zeyad Ghaleb Al-Mekhlafi, Abdulrahman Alreshidi, Meshari Alazmi, Jalawi Sulaiman Alshudukhi, Mohammad Salih Alsaffar:
FC-PA: Fog Computing-Based Pseudonym Authentication Scheme in 5G-Enabled Vehicular Networks. IEEE Access 11: 18571-18581 (2023) - [j18]Sham-ul-Arfeen Laghari, Selvakumar Manickam, Ayman Khallel Ibrahim Al-Ani, Mahmood A. Al-Shareeda, Shankar Karuppayah:
ES-SECS/GEM: An Efficient Security Mechanism for SECS/GEM Communications. IEEE Access 11: 31813-31828 (2023) - [j17]Mahmood A. Al-Shareeda, Selvakumar Manickam:
A Systematic Literature Review on Security of Vehicular Ad-Hoc Network (VANET) Based on VEINS Framework. IEEE Access 11: 46218-46228 (2023) - [j16]Mahmood A. Al-Shareeda, Selvakumar Manickam, Murtaja Ali Saare:
Enhancement of NTSA Secure Communication with One-Time Pad (OTP) in IoT. Informatica (Slovenia) 47(1) (2023) - [j15]Zeyad Ghaleb Al-Mekhlafi, Mahmood A. Al-Shareeda, Selvakumar Manickam, Badiea Abdulkarem Mohammed, Abdulrahman Alreshidi, Meshari Alazmi, Jalawi Sulaiman Alshudukhi, Mohammad Salih Alsaffar, Taha H. Rassem:
Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing. Sensors 23(7): 3543 (2023) - 2022
- [j14]Mahmood A. Al-Shareeda, Selvakumar Manickam:
MSR-DoS: Modular Square Root-Based Scheme to Resist Denial of Service (DoS) Attacks in 5G-Enabled Vehicular Networks. IEEE Access 10: 120606-120615 (2022) - [j13]Mahmood A. Al-Shareeda, Selvakumar Manickam, Murtaja Ali Saare, Nazrool Omar:
SADetection: Security Mechanisms to Detect SLAAC Attack in IPv6 Link-Local Network. Informatica (Slovenia) 46(9) (2022) - [j12]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah:
A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks. Sensors 22(5): 1696 (2022) - [j11]Mahmood A. Al Shareeda, Selvakumar Manickam, Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi, Amjad Qtaish, Abdullah J. Alzahrani, Gharbi Alshammari, Amer A. Sallam, Khalil Almekhlafi:
CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks. Sensors 22(13): 5026 (2022) - [j10]Mahmood A. Al Shareeda, Selvakumar Manickam:
Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation. Symmetry 14(8): 1543 (2022) - [i3]Mahmood A. Al-Shareeda, Selvakumar Manickam:
Security Methods in Internet of vehicles. CoRR abs/2207.05269 (2022) - [i2]Wong Yan Shen, Selvakumar Manickam, Mahmood A. Al-Shareeda:
Review of Advanced Monitoring Mechanisms in Peer-to-Peer (P2P) Botnets. CoRR abs/2207.12936 (2022) - [i1]Khoh Choon Hwa, Selvakumar Manickam, Mahmood A. Al-Shareeda:
Review of Peer-to-Peer Botnets and Detection Mechanisms. CoRR abs/2207.12937 (2022) - 2021
- [j9]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah:
Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Access 9: 113226-113238 (2021) - [j8]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Ayman Khalil, Iznan Husainy Hasbullah:
Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey. IEEE Access 9: 121522-121531 (2021) - [j7]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah:
SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks. Sensors 21(24): 8206 (2021) - 2020
- [j6]Mahmood Al Shareeda, Mohammed Anbar, Iznan Husainy Hasbullah, Selvakumar Manickam, Sabri M. Hanshi:
Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks. IEEE Access 8: 144957-144968 (2020) - [j5]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Ali A. Yassin:
VPPCS: VANET-Based Privacy-Preserving Communication Scheme. IEEE Access 8: 150914-150928 (2020) - [j4]Mahmood Al Shareeda, Mohammed Anbar, Murtadha A. Alazzawi, Selvakumar Manickam, Ahmed Shakir Al-Hiti:
LSWBVM: A Lightweight Security Without Using Batch Verification Method Scheme for a Vehicle Ad Hoc Network. IEEE Access 8: 170507-170518 (2020) - [j3]Mustafa Maad Hamdi, Lukman Audah, Sami AbdulJabbar Rashid, Mahmood Al Shareeda:
Techniques of Early Incident Detection and Traffic Monitoring Centre in VANETs: A Review. J. Commun. 15(12): 896-904 (2020) - [j2]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah:
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network. Symmetry 12(10): 1687 (2020) - [c3]Murtadha A. Alazzawi, Hasanain Abbas Hasan Al-Behadili, Mohsin N. Srayyih Almalki, Aqeel Luaibi Challoob, Mahmood Al Shareeda:
ID-PPA: Robust Identity-Based Privacy-Preserving Authentication Scheme for a Vehicular Ad-Hoc Network. ACeS 2020: 80-94 - [c2]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah, Ayman Khalil, Murtadha A. Alazzawi, Ahmed Shakir Al-Hiti:
Proposed Efficient Conditional Privacy-Preserving Authentication Scheme for V2V and V2I Communications Based on Elliptic Curve Cryptography in Vehicular Ad Hoc Networks. ACeS 2020: 588-603
2010 – 2019
- 2019
- [j1]Mahmoud Al Shareeda, Ayman Khalil, Walid Fahs:
Realistic heterogeneous genetic-based RSU placement solution for V2I networks. Int. Arab J. Inf. Technol. 16(3A): 540-547 (2019) - 2018
- [c1]Mahmoud Al Shareeda, Ayman Khalil, Walid Fahs:
Towards the Optimization of Road Side Unit Placement Using Genetic Algorithm. ACIT 2018: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint