default search action
Omaimah Bamasag
Person information
- affiliation: King Abdulaziz University, Jeddah, Saudi Arabia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j17]Peiyun Zhang, Chenxi Li, Mengchu Zhou, Wenjun Huang, Abdullah Abusorrah, Omaimah Omar Bamasag:
Transaction transmission model for blockchain channels based on non-cooperative games. Sci. China Inf. Sci. 66(1) (2023) - [j16]Suhair Alshehri, Omaimah Bamasag, Daniyal M. Alghazzawi, Arwa Jamjoom:
Dynamic Secure Access Control and Data Sharing Through Trusted Delegation and Revocation in a Blockchain-Enabled Cloud-IoT Environment. IEEE Internet Things J. 10(5): 4239-4256 (2023) - [j15]Zhibin Li, Shuai Li, Omaimah Omar Bamasag, Areej Alhothali, Xin Luo:
Diversified Regularization Enhanced Training for Effective Manipulator Calibration. IEEE Trans. Neural Networks Learn. Syst. 34(11): 8778-8790 (2023) - 2022
- [j14]Aseel Alsaedi, Abeer Alhuzali, Omaimah Bamasag:
Effective and scalable black-box fuzzing approach for modern web applications. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 10068-10078 (2022) - [j13]Omaimah Bamasag, Alaa Alsaeedi, Asmaa Munshi, Daniyal M. Alghazzawi, Suhair Alshehri, Arwa Jamjoom:
Real-time DDoS flood attack monitoring and detection (RT-AMD) model for cloud computing. PeerJ Comput. Sci. 8: e814 (2022) - 2021
- [j12]Daniyal M. Alghazzawi, Omaima Bamasaq, Surbhi Bhatia, Ankit Kumar, Pankaj Dadheech, Aiiad Albeshri:
Congestion Control in Cognitive IoT-Based WSN Network for Smart Agriculture. IEEE Access 9: 151401-151420 (2021) - [j11]Ghadah Aldabbagh, Nikos Dimitriou, Samar M. Alkhuraiji, Omaimah Bamasag:
Radio Coverage and Device Capacity Dimensioning Methodologies for IoT LoRaWAN and NB-IoT Deployments in Urban Environments. Future Internet 13(6): 144 (2021) - [j10]PeiYun Zhang, MengChu Zhou, Qixi Zhao, Abdullah Abusorrah, Omaimah Omar Bamasag:
A Performance-Optimized Consensus Mechanism for Consortium Blockchains Consisting of Trust-Varying Nodes. IEEE Trans. Netw. Sci. Eng. 8(3): 2147-2159 (2021) - 2020
- [j9]Lamiaa Fattouh Ibrahim, Hesham Abou El Fetouh Salman, Zaki Taha Fayed, Nadine Akkari, Ghadah Aldabbagh, Omayma Bamasak:
A survey on heterogeneous mobile networks planning in indoor dense areas. Pers. Ubiquitous Comput. 24(4): 487-498 (2020) - [c17]Afaf D. Althobiti, Rabab M. Almohayawi, Omaimah Bamasag:
Machine Learning approach to Secure Software Defined Network: Machine Learning and Artificial Intelligence. ICFNDS 2020: 6:1-6:8 - [c16]Hmdah Alsolami, Omaimah Bamasag, Asia Othman Aljahdali:
A Novel Access Control Security Model Based on Ciphertext Policy Attribute-Based Encryption for Smart Homes. ICFNDS 2020: 7:1-7:5 - [c15]Alaa Alsaeedi, Omaimah Bamasag, Asmaa Munshi:
Real-Time DDoS flood Attack Monitoring and Detection (RT-AMD) Model for Cloud Computing. ICFNDS 2020: 15:1-15:5
2010 – 2019
- 2019
- [j8]Safia Nahhas, Omaimah Bamasag, Maher Khemakhem, Nada Bajnaid:
Bridging Education and Labor Skills by a Novel Competency-Based Course Linked-Data Model. IEEE Access 7: 119087-119098 (2019) - 2018
- [j7]Safia Nahhas, Omaimah Bamasag, Maher Khemakhem, Nada Bajnaid:
Added Values of Linked Data in Education: A Survey and Roadmap. Comput. 7(3): 45 (2018) - [c14]Omaimah Bamasag, Muna Tayeb, Maha Alsaggaf, Fatimah Shams:
Nateq Reading Arabic Text for Visually Impaired People. HCI (7) 2018: 311-326 - 2017
- [c13]Amina H. Gamlo, Ning Zhang, Omaimah Bamasag:
Mobile Cloud Computing: Security Analysis. MobileCloud 2017: 191-198 - 2016
- [j6]Huda Elmogazy, Omaimah Bamasag:
Securing Healthcare Records in the Cloud Using Attribute-Based Encryption. Comput. Inf. Sci. 9(4): 60-67 (2016) - [j5]Aisha Aseeri, Omaimah Bamasag:
Achieving protection against man-in-the-middle attack in HB family protocols implemented in RFID tags. Int. J. Pervasive Comput. Commun. 12(3): 375-390 (2016) - 2015
- [c12]Omaimah Omar Bamasag, Kamal Youcef-Toumi:
Towards Continuous Authentication in Internet of Things Based on Secret Sharing Scheme. WESS 2015: 1 - 2013
- [c11]Omaima Bamasak, Roa'a Braik, Hadeel Al-Tayari, Shatha Al-Harbi, Ghadeer Al-Semairi, Malak Abu-Hnaidi:
Improving Autistic Children's Social Skills Using Virtual Reality. HCI (10) 2013: 342-351 - [c10]Huda Elmogazy, Omaima Bamasak:
Towards healthcare data security in cloud computing. ICITST 2013: 363-368 - 2012
- [c9]Samar M. Alkhuraiji, Barry M. G. Cheetham, Mohammed Abdel Razek, Omaima Bamasak:
A flexible approach for providing adaptivity in learning management system based on learning styles. ISDA 2012: 718-722 - 2011
- [j4]Omaima Bamasak:
Exploring consumers acceptance of mobile payments - an empirical study. Int. J. Inf. Technol. Commun. Convergence 1(2): 173-185 (2011) - [c8]Samar M. Alkhuraiji, Barry M. G. Cheetham, Omaima Bamasak:
Dynamic Adaptive Mechanism in Learning Management System Based on Learning Styles. ICALT 2011: 215-217 - 2010
- [j3]Omaima Bamasak:
A Collusion-Resistant Distributed Agent-Based Signature Delegation (CDASD) Protocol for E-Commerce Applications. Intell. Inf. Manag. 2(4): 262-277 (2010) - [j2]Jay Chin, Ning Zhang, Aleksandra Nenadic, Omaima Bamasak:
A context-constrained authorisation (CoCoA) framework for pervasive grid computing. Wirel. Networks 16(6): 1541-1556 (2010)
2000 – 2009
- 2009
- [c7]Amina Gamlo, Omaima Bamasak:
Towards securing e-transactions in e-government systems of Saudi Arabia. ICITST 2009: 1-7 - 2006
- [j1]Omaima Bamasak, Ning Zhang:
Reputation management and signature delegation: A distributed approach. Electron. Commer. Res. 6(3-4): 227-263 (2006) - 2005
- [c6]Omaima Bamasak, Ning Zhang:
A Distributed Reputation Management Scheme for Mobile Agent-Based E-Commerce Applications . EEE 2005: 270-275 - [c5]Omaima Bamasak, Ning Zhang, Doug Edwards:
DiSigncryption: An Integration of Agent-Based Signature Delegation with Distributed Reputation Management Schem. IPDPS 2005 - 2004
- [c4]Omaima Bamasak, Ning Zhang:
A secure proxy signature protocol for agent-based M-commerce applications. ISCC 2004: 399-406 - [c3]Omaima Bamasak, Ning Zhang:
Achieving Distributed Trusted Services. ITCC (1) 2004: 56-61 - [c2]Omaima Bamasak, Ning Zhang:
A secure method for signature delegation to mobile agents. SAC 2004: 813-818 - 2003
- [c1]Omaima Bamasak, Ning Zhang:
Towards a Secure Mobile Agent Based M-Commerce System. ICEIS (4) 2003: 408-412
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-10 00:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint