A
Abdulrahman Alhothaily
Researcher at George Washington University
Publications - 15
Citations - 785
Abdulrahman Alhothaily is an academic researcher from George Washington University. The author has contributed to research in topics: Encryption & Authentication. The author has an hindex of 7, co-authored 15 publications receiving 592 citations. Previous affiliations of Abdulrahman Alhothaily include Salman bin Abdulaziz University.
Papers
More filters
Journal ArticleDOI
Fog Computing for the Internet of Things: Security and Privacy Issues
TL;DR: The authors propose a mechanism that employs fog to improve the distribution of certificate revocation information among IoT devices for security enhancement and present potential research directions aimed at using fog computing to enhance the security and privacy issues in IoT environments.
Journal ArticleDOI
An Attribute-Based Encryption Scheme to Secure Fog Communications
TL;DR: This paper proposes an efficient key exchange protocol based on ciphertext-policy attribute-based encryption (CP-ABE) to establish secure communications among the participants and combines CP-ABe and digital signature techniques to achieve confidentiality, authentication, verifiability, and access control.
Journal ArticleDOI
SecureGuard: A Certificate Validation System in Public Key Infrastructure
TL;DR: This work presents SecureGuard, a certificate validation system that can effectively handle certificate validation during TLS handshakes and introduces a quantitative analysis method that can investigate the costs incurred by the system and other certificate validation approaches under the same evaluation scenarios.
Proceedings ArticleDOI
A secure and verifiable outsourcing scheme for matrix inverse computation
TL;DR: This paper proposes a secure and verifiable outsourcing scheme to compute the matrix inverse in a server and analyzes the proposed scheme in terms of correctness, security, verifiability, and attack resistance, and compares its performance with the state-of-the-art.
Journal ArticleDOI
A Secure and Practical Authentication Scheme Using Personal Devices
TL;DR: This paper proposes an efficient and practical user authentication scheme using personal devices that utilize different cryptographic primitives, such as encryption, digital signature, and hashing that not only is secure against password-related attacks, but also can resist replay attacks, shoulder-surfing attacks, phishing attacks, and data breach incidents.