• A ciphertext-policy attribute-based encryption scheme with optimized ciphertext size and fast decryption 

      Malluhi, Qutaibah M.; Shikfa, Abdullatif; Trinh, Viet Cuong ( Association for Computing Machinery, Inc , 2017 , Conference Paper)
      We address the problem of ciphertext-policy attribute-based encryption with fine access control, a cryptographic primitive which has many concrete application scenarios such as Pay-TV, e-Health, Cloud Storage and so on. ...
    • A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids 

      Hussain, Shahbaz; Iqbal, Atif; Hussain, S. M. Suhail; Zanero, Stefano; Shikfa, Abdullatif; ... more authors ( Nature Research , 2023 , Article)
      IEC 61850 is emerging as a popular communication standard for smart grids. Standardized communication in smart grids has an unwanted consequence of higher vulnerability to cyber-attacks. Attackers exploit the standardized ...
    • A novel methodology to validate cyberattacks and evaluate their impact on power systems using real time digital simulation 

      Hussain, Shahbaz; Iqbal, Atif; Zanero, Stefano; Suhail Hussain, ShahbazM.; Shikfa, Abdullatif; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      The traditional power systems are rapidly digitalized and automated for increased monitoring and control. This automation of power system communication has made it possible to monitor and control operations remotely in a ...
    • An efficient instance hiding scheme 

      Malluhi, Qutaibah M.; Shikfa, Abdullatif; Trinh, Viet Cuong ( Association for Computing Machinery , 2016 , Conference Paper)
      Delegating computation, which is applicable to many practical contexts such as cloud computing or pay-TV system, concerns the task where a computationally weak client wants to securely compute a very complex function f on ...
    • Application of artificial intelligence in electrical power systems 

      Hussain, Shahbaz; Alammari, Rashid; Iqbal, Atif; Shikfa, Abdullatif ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      In this paper, the application of heuristic and optimization algorithms based on artificial intelligence (AI) is investigated on electrical power systems. Three distinct areas have been categorized validating the application ...
    • Exploiting bluetooth vulnerabilities in e-health IoT devices 

      Zubair, Mohammed; Unal, Devrim; Al-Ali, Abdulla; Shikfa, Abdullatif ( Association for Computing Machinery , 2019 , Conference Paper)
      Internet of Things (IoT) is an interconnected network of heterogeneous things through the Internet. The current and next generation of e-health systems are dependent on IoT devices such as wireless medical sensors. One of ...
    • Latent Semantic Indexing (LSI) Based Distributed System and Search On Encrypted Data 

      Shouman, Abdelrahman Mossad (2018 , Master Thesis)
      Latent semantic indexing (LSI) was initially introduced to overcome the issues of synonymy and polysemy of the traditional vector space model (VSM). LSI, however, has challenges of its own, mainly scalability. Despite being ...
    • Optimal sizing of a stand-alone hybrid PV-WT-BT system using artificial intelligence based technique 

      Hussain, Shahbaz; Alammari, Rashid; Iqbal, Atif; Shikfa, Abdullatif ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Nowadays, conventional energy system is being replaced by renewable energy system. Especially, PV systems and wind energy systems are gaining much attention due to their future sustainability and eco-friendly nature. ...
    • Private Function Evaluation Using Intel's SGX 

      Abdurahiman, Nihal; Qadeib alban, Ahmad; shikfa, abdullatif; Malluhi, Qutaibah ( Qatar University Press , 2020 , Poster)
      Private Function Evaluation (PFE) is the problem of evalu- ating one party's private data using a private function owned by another party. Several techniques were presented to tackle PFE by running universal circuits in ...
    • Substring search over encrypted data 

      Shikfa, Abdullatif ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Our data, be it personal or professional, is increasingly outsourced. This results from the development of cloud computing in the past ten years, a paradigm that shifts computing to a utility. Even without realizing it, ...