default search action
Mohamed E. Nasr
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Mohamed S. Abouzeid, Heba Ali El-Khobby, Mahmoud A. A. Ali, Mohamed E. Nasr:
Full Diversity Space Time Codes for Next Generation Wireless Sensor Networks. Int. J. Comput. 23(2): 196-204 (2024) - 2023
- [j16]Basant S. Abd El-Wahab, Mohamed E. Nasr, Salah A. Khamis, Amira S. Ashour:
BTC-fCNN: Fast Convolution Neural Network for Multi-class Brain Tumor Classification. Health Inf. Sci. Syst. 11(1): 3 (2023) - [j15]Roayat Ismail Abdelfatah, Hager Mohamed Saqr, Mohamed E. Nasr:
An efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map. Multim. Tools Appl. 82(14): 22213-22227 (2023) - [j14]Roayat Ismail Abdelfatah, Hager Mohamed Saqr, Mohamed E. Nasr:
Correction to: An efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map. Multim. Tools Appl. 82(14): 22229 (2023) - [j13]Sahar M. Abusalim, Mohamed A. Abdou, Mohamed A. Abdel-Aty, Mohamed E. Nasr:
Hybrid Functions Approach via Nonlinear Integral Equations with Symmetric and Nonsymmetrical Kernel in Two Dimensions. Symmetry 15(7): 1408 (2023) - [c7]Ahmed Abdelhady, Nancy Alshaer, Mohamed E. Nasr:
On PAPR Reduction Technique for Indoor VLC Systems Based on Noise Cancellation. NILES 2023: 71-75 - 2022
- [j12]Roayat Ismail Abdelfatah, Nermeen M. Abdal-Ghafour, Mohamed E. Nasr:
Secure VANET Authentication Protocol (SVAP) Using Chebyshev Chaotic Maps for Emergency Conditions. IEEE Access 10: 1096-1115 (2022) - 2021
- [j11]Roayat Ismail Abdelfatah, Esraa Abdelkhalek Baka, Mohamed E. Nasr:
Keyed Parallel Hash Algorithm Based on Multiple Chaotic Maps (KPHA-MCM). IEEE Access 9: 130399-130409 (2021) - 2020
- [j10]Mona Awad, Shady M. Ibraheem, Sameh A. Napoleon, Waleed Saad, Mona Shokair, Mohamed E. Nasr:
Secrecy Enhancement of Cooperative NOMA Networks With Two-Way Untrusted Relaying. IEEE Access 8: 216349-216364 (2020) - [j9]Fatma A. Al Emam, Mohamed E. Nasr, Sherif E. Kishk:
Context-aware parallel handover optimization in heterogeneous wireless networks. Ann. des Télécommunications 75(1-2): 43-57 (2020) - [j8]Nancy Alshaer, Tawfik Ismail, Mohamed E. Nasr:
Performance evaluation and security analysis of ground-to-satellite FSO system with CV-QKD protocol. IET Commun. 14(10): 1534-1542 (2020) - [j7]Nancy Alshaer, Tawfik Ismail, Mohamed E. Nasr:
Generic evaluation of FSO system over Málaga turbulence channel with MPPM and non-zero-boresight pointing errors. IET Commun. 14(18): 3294-3302 (2020) - [j6]Fatma A. Al Emam, Mohamed E. Nasr, Sherif E. Kishk:
Coordinated Handover Signaling and Cross-Layer Adaptation in Heterogeneous Wireless Networking. Mob. Networks Appl. 25(1): 285-299 (2020) - [j5]Roayat Ismail Abdelfatah, Mohamed E. Nasr, Mohammed A. Alsharqawy:
Encryption for multimedia based on chaotic map: Several scenarios. Multim. Tools Appl. 79(27-28): 19717-19738 (2020) - [j4]Fatma A. Al Emam, Mohamed E. Nasr, Sherif E. Kishk:
Collaborative cross-layer framework for handover decision in overlay networks. Telecommun. Syst. 73(2): 189-203 (2020) - [j3]Fatma A. Al Emam, Mohamed E. Nasr, Sherif E. Kishk:
Mobility management using dynamic cross-layer signaling in heterogeneous wireless networks. Wirel. Networks 26(1): 543-555 (2020)
2010 – 2019
- 2019
- [j2]Mohammed Alnahhal, Tawfik Ismail, Mohamed E. Nasr:
Spectral efficiency improvement with SISO and SIMO in M-QAM over millimeter-wave links. Int. J. Commun. Syst. 32(6) (2019) - [c6]Nancy Alshaer, Tawfik Ismail, Hussein Seleem, Mohamed E. Nasr:
Optimized Beam Size of Optical Ground-to-Satellite Link over Turbulence and Beam-Wandering. ICTON 2019: 1-4 - 2018
- [c5]Mohamed Saber, A. Nader, Mohamed E. Nasr:
Low Power Implementation of FBMC Transceiver for 5G Wireless Networks. IINTEC 2018: 103-108 - 2017
- [c4]Mohamed Al-Nahhal, Hossam M. Kasem, Tawfik Ismail, Mohamed E. Nasr:
FSO-SIMO system with SIM-DPSK over log-normal atmospheric turbulence and misalignment. ICTON 2017: 1-4 - 2016
- [c3]Nermeen M. Abdal-Ghafour, Ayman A. Abdel-Hamid, Mohamed E. Nasr, Salah Eldeen A. Khamis:
Authentication enhancement techniques for BAC in 2G E-passport. IIT 2016: 1-6
2000 – 2009
- 2009
- [j1]Hassan M. Elkamchouchi, Mohamed E. Nasr, Roayat Ismail:
Secure and Fast Hashing Algorithm with Multiple Security Levels. J. Softw. 4(9): 935-942 (2009) - [c2]Hassan M. Elkamchouchi, Mohamed E. Nasr, Roayat Ismail:
A New Efficient Multiple Broadcasters Signcryption Scheme (MBSS) for Secure Distributed Networks. ICNS 2009: 204-209 - [c1]Hassan M. Elkamchouchi, Mohamed E. Nasr, Roayat Ismail Elseedy:
A New Efficient Strong Proxy Signcryption Scheme Based on a Combination of Hard Problems. SMC 2009: 5123-5127
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint