• A Domain Specific Language for Secure Outsourcing of Computation to the Cloud 

      Nassar, Mohamed; Erradi, Abdelkarim; Malluhi, Qutaibah M. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Secure outsourcing of computation has gained importance with the proliferation of cloud services. However, existing outsourcing protocol specification languages are mainly suitable for secure multi-party computation. They ...
    • A model driven framework for secure outsourcing of computation to the cloud 

      Nassar, Mohamed; Erradi, Abdelkarim; Sabry, Farida; Malluhi, Qutaibah M. ( IEEE Computer Society , 2014 , Conference Paper)
      This paper presents a model driven approach to define then coordinate the execution of protocols for secure outsourcing of computation of large datasets in cloud computing environments. First we present our Outsourcing ...
    • A Scheme for Three-way Secure and Verifiable E-Voting 

      Nassar, Mohamed; Malluh, Qutaibahi; Khan, Tanveer ( IEEE Computer Society , 2019 , Conference Paper)
      Online voting systems are gaining acceptance with the widespread use of secure web services and cloud computing such as electronic currency and online banking. However, they still face privacy, security and accountability ...
    • Automatic generation of optimized workflow for distributed computations on large-scale matrices 

      Sabry, Farida; Erradi, Abdelkarim; Nassar, Mohamed; Malluhi, Qutaibah M. ( Springer Verlag , 2014 , Conference Paper)
      Efficient evaluation of distributed computation on large-scale data is prominent in modern scientific computation; especially analysis of big data, image processing and data mining applications. This problem is particularly ...
    • Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control Systems 

      Nassar, Mohamed; Khoury, Joseph; Erradi, Abdelkarim; Bou-Harb, Elias ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      Supervisory Control and Data Acquisition (SCADA) and Distributed Control Systems (DCS) use advanced computing, sensors, control systems, and communication networks to monitor and control industrial processes and distributed ...
    • Paillier's encryption: Implementation and cloud applications 

      Nassar, Mohamed; Erradi, Abdelkarim; Malluhi, Qutaibah M. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Paillier's additive homomorphic encryption is increasingly used in recent research in the field of cloud secure outsourcing and privacy-preserving computation in addition to other cryptographic tools such as garbled circuits. ...
    • Practical and secure outsourcing of matrix computations to the cloud 

      Nassar, Mohamed; Erradi, Abdelkarim; Malluhi, Qutaibah M. ( IEEE , 2013 , Conference Paper)
      Cloud computing enables a cost effective outsourcing of storage and resource-intensive computations. Secure outsourcing of data and computation is challenging in this emerging computing model. In particular, outsourcing ...