scispace - formally typeset
A

Abdulrahman Alhothaily

Researcher at George Washington University

Publications -  15
Citations -  785

Abdulrahman Alhothaily is an academic researcher from George Washington University. The author has contributed to research in topics: Encryption & Authentication. The author has an hindex of 7, co-authored 15 publications receiving 592 citations. Previous affiliations of Abdulrahman Alhothaily include Salman bin Abdulaziz University.

Papers
More filters
Journal ArticleDOI

Fog Computing for the Internet of Things: Security and Privacy Issues

TL;DR: The authors propose a mechanism that employs fog to improve the distribution of certificate revocation information among IoT devices for security enhancement and present potential research directions aimed at using fog computing to enhance the security and privacy issues in IoT environments.
Journal ArticleDOI

An Attribute-Based Encryption Scheme to Secure Fog Communications

TL;DR: This paper proposes an efficient key exchange protocol based on ciphertext-policy attribute-based encryption (CP-ABE) to establish secure communications among the participants and combines CP-ABe and digital signature techniques to achieve confidentiality, authentication, verifiability, and access control.
Journal ArticleDOI

SecureGuard: A Certificate Validation System in Public Key Infrastructure

TL;DR: This work presents SecureGuard, a certificate validation system that can effectively handle certificate validation during TLS handshakes and introduces a quantitative analysis method that can investigate the costs incurred by the system and other certificate validation approaches under the same evaluation scenarios.
Proceedings ArticleDOI

A secure and verifiable outsourcing scheme for matrix inverse computation

TL;DR: This paper proposes a secure and verifiable outsourcing scheme to compute the matrix inverse in a server and analyzes the proposed scheme in terms of correctness, security, verifiability, and attack resistance, and compares its performance with the state-of-the-art.
Journal ArticleDOI

A Secure and Practical Authentication Scheme Using Personal Devices

TL;DR: This paper proposes an efficient and practical user authentication scheme using personal devices that utilize different cryptographic primitives, such as encryption, digital signature, and hashing that not only is secure against password-related attacks, but also can resist replay attacks, shoulder-surfing attacks, phishing attacks, and data breach incidents.