[go: up one dir, main page]

Follow
Ismail M. Bahkali
Ismail M. Bahkali
Other namesIsmail Mohammed Bahkali, Ismail Bahkali
Assistant Professor of Computer Security, King Abdulaziz University
Verified email at kau.edu.sa
Title
Cited by
Cited by
Year
Chaos and cellular automata-based substitution box and its application in cryptography
A Shafique, KH Khan, MM Hazzazi, I Bahkali, Z Bassfar, MU Rehman
Mathematics 11 (10), 2322, 2023
272023
Throughput/area optimized architecture for elliptic-curve Diffie-Hellman protocol
M Rashid, H Kumar, SZ Khan, I Bahkali, A Alhomoud, Z Mehmood
Applied Sciences 12 (8), 4091, 2022
222022
Block cipher’s substitution box generation based on natural randomness in underwater acoustics and knight’s tour chain
MF Khan, K Saleem, T Shah, MM Hazzazi, I Bahkali, PK Shukla
Computational Intelligence and Neuroscience 2022 (1), 8338508, 2022
142022
An efficient fractional Chebyshev chaotic map-based three-factor session initiation protocol for the human-centered IoT architecture
C Meshram, CC Lee, I Bahkali, AL Imoize
Mathematics 11 (9), 2085, 2023
102023
An efficient certificateless group signcryption scheme using Quantum Chebyshev Chaotic Maps in HC-IoT environments
C Meshram, RW Ibrahim, P Yupapin, I Bahkali, AL Imoize, SG Meshram
The Journal of Supercomputing 79 (15), 16914-16939, 2023
72023
A scalable digit-parallel polynomial multiplier architecture for NIST-standardized binary elliptic curves
H Kumar, M Rashid, A Alhomoud, SZ Khan, I Bahkali, SS Alotaibi
Applied Sciences 12 (9), 4312, 2022
72022
Multiple ways for medical data visualization using 3D slicer
IM Bahkali, SK Semwal
2020 International Conference on Computational Science and Computational …, 2020
52020
Medical visualization using 3d imaging and volume data: A survey
I Bahkali, SK Semwal
Proceedings of the Future Technologies Conference, 251-261, 2020
32020
Network virtualization with openflow for large-scale datacenter networks
A Aljaedi, CE Chow, A Elgzil, N Alamri, I Bahkali
IJCSNS 17 (9), 10, 2017
32017
An Efficient Authentication Technique using Convolution Chebyshev Chaotic Maps for TMIS
C Meshram, MS Obaidat, AL Imoize, I Bahkali, P Tambare, KF Hsiao
2022 International Conference on Communications, Computing, Cybersecurity …, 2022
22022
An Efficient Digital Short Signature Scheme using CCM for HC-IoT Environments
C Meshram, MS Obaidat, AL Imoize, I Bahkali, A Meshram, KF Hsiao
2022 International Conference on Communications, Computing, Cybersecurity …, 2022
12022
Block Ciphers Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knights Tour Chain
M Fahad Khan, K Saleem, T Shah, M Mazyad Hazzazi, I Bahkali, ...
arXiv e-prints, arXiv: 2205.13593, 2022
2022
A Linear Pathfinding Algorithm for Planning Laser Treatment
IM Bahkali, SK Semwal
Future of Information and Communication Conference, 658-675, 2022
2022
How Can Organizations Prevent Cyber Attacks Using Proper Cloud Computing Security?
IM Bahkali, SK Semwal
Proceedings of the Future Technologies Conference, 173-183, 2021
2021
3D Slice and Volume Graphs: Computational Cost Structures Using Linear Paths in Volume Data towards Laser Treatment Planning
IM Bahkali
University of Colorado Colorado Springs, 2021
2021
Volume Visualization and Beams Towards Computational Cancer Treatment Planning
I Bahkali, SK Semwal
Proceedings of the Future Technologies Conference, 201-216, 2020
2020
Computational Cancer Treatment Planning
I Bahkali, SK Semwal
Proceedings of the Future Technologies Conference (FTC) 2020, Volume 3 1290, 201, 2020
2020
Baloot Game
IM Bahkali, SK Semwal, E Chow, K Walcott-Justice
University of Colorado at Colorado Springs, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–18