Liverpool Skyline

Department of Computer Science

Dr Abir Awad

Dr Abir Awad

Publications

Journal Articles

Awad A, Matthews A, Qiao Y, Lee B. 2015. Chaotic Searchable Encryption for Mobile Cloud Storage IEEE Transactions on Cloud Computing, :1-1 >DOI

Awad A, Saadane A. 2010. New Chaotic Permutation Methods for Image Encryption IAENG International Journal of Computer Science, 37

Awad A, Awad D. 2010. Efficient Image Chaotic Encryption Algorithm with No Propagation Error ETRI Journal, 32 :774-783 >DOI

Awad A, El Assad S, Qianxue W, Vlădeanu C, Bakhache B. 2008. Comparative Study of 1-D Chaotic Generators for Digital Data Encryption IAENG International Journal of Computer Science, 35

Books

AWAD A. 2011. Cryptographie, Chaos et Images 9786131569104

Conference Publication (journal proceedings)

Awad A, Lee B. A metaphone based chaotic searchable encryption algorithm for border management The 13th International Conference on Security and Cryptography (SECRYPT 2016)

Awad A, Kadry S, Lee B, Maddodi G, O'Meara E. Integrity Assurance in the Cloud by Combined PBA and Provenance NGMAST

Awad A, Kadry S, Gill S, Lee B. Data Leakage Detection using System Call Provenance Security and Privacy in Systems and Communication Networks, SecureSysComm, INCoS-2016

Awad A. Security Analytics on Asset Vulnerability for Information Abstraction and Risk Analysis UKSim-AMSS 18th International Conference on Modelling & Simulation

Ahmad F, Kazim M, Adnane A, Awad A. Vehicular Cloud Networks: Architecture, Applications and Security Issues The 7th IEEE/ACM International Conference on Utility and Cloud Computing

Vlădeanu C, El Assad S, Awad A. Optimum Chaotic Quantized Sequences for Chip-Synchronous DS-CDMA MCSEAI

Awad A, El Assad S, Carragata D. A Robust Cryptosystem Based Chaos for Secure Data ISIVC

Awad A, Ahmad K, El Assad S, Caragata D. Chaos-Based Cryptosystem for Secure Transmitted Images International Conference on Telecommunications and Multimedia, TEMU-2010

Awad A, Saadane A. Efficient chaotic permutations for image encryption algorithms WCE, ICSIE, International Conference of Signal and Image Engineering

Awad A, Miri A. A new image encryption algorithm based on a chaotic DNA substitution method IEEE, ICC 2012 Communication and Information Systems Security Symposium :1011-1015

Rostom R, Bakhache B, Salami H, Awad A. Quantum Cryptography and Chaos for the transmission of security keys in 802.11 networks MELECON 2014, 17th IEEE Mediterranean Electrotechnical Conference

Awad A, Matthews A, Lee B. Secure cloud storage and search scheme for mobile devices MELECON, 17th IEEE Mediterranean Electrotechnical Conference

Awad A, Kadry S, Lee B, Zhang S. Property based attestation for a secure cloud monitoring system The 7th IEEE/ACM International Conference on Utility and Cloud Computing

Flanagan K, Fallon E, Awad A, Connolly P. Classification of Asset Vulnerability for Information Abstraction and Risk Analysis The 14th IT&T annual conference

Awad A, Lee B, Awad M. Toward Secure Provenance in the Cloud: A Survey The 8th IEEE/ACM International Conference on Utility and Cloud Computing