Magdy Saeb
MIMOS
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Magdy Saeb.
international conference on computer and communication engineering | 2010
Khalid A. Saeed Al-Khateeb; Magdy Saeb; Mohammed Munther A. Majeed; Mohamed Ridza Wahiddin
Security is the most tedious problem in highly sensitive communications. Quantum security is the key issue in solving the problem. A key distribution protocol based on the use of hash functions is proposed. The essential part of the protocol depends on sending a string of random characters from sender to receiver. Then, a selected hash or a cascade of two hash functions and a long-term shared secret are used to construct the key. Consequently, the session key is generated on-site by independently applying a hash function on the random string at the sender and receiver sides. However, this protocol requires a reliable method of authentication. Therefore, it is further proposed to use an out-of-band authentication methodology based on the deterministic six-state quantum protocol that is referred to as 6DP.
Archive | 2010
Rabie A. Mahmoud; Magdy Saeb
Archive | 2012
Rabie A. Mahmoud; Magdy Saeb
Archive | 2010
Mohammed Munther A. Majeed; Khalid A. Saeed Al-Khateeb; Mohamed Ridza Wahiddin; Magdy Saeb
Archive | 2010
Rabie A. Mahmoud; Magdy Saeb
Archive | 2010
Mohamed Ridza Wahiddin; Noor Shamila Shanaz; Noor Sham; Magdy Saeb; Mior Hadi; Mior Hamdan
Archive | 2010
Mohammed Munther A. Majeed; Khalid A. Saeed Al-Khateeb; Magdy Saeb; Mohamed Ridza Wahiddin
Journal of Computer Science | 2010
Mohammed Munther A. Majeed; Khalid A. Saeed Al-Khateeb; Mohamed Ridza Wahiddin; Magdy Saeb
Archive | 2010
Khalid A. Saeed Al-Khateeb; Mohammed Munther A. Majeed; Mohamed Ridza; Magdy Saeb
Archive | 2010
Rabie A. Mahmoud; Magdy Saeb