default search action
Max Eiza
Person information
- affiliation: University of Central Lancashire, School of Physical Sciences and Computing, Preston, UK
- affiliation (2015 - 2016): Liverpool John Moores University, UK
- affiliation (PhD 2015): Brunel University, London, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Yingzhe Hou, Yue Cao, Hu Xiong, Yulin Hu, Mahmoud Hashem Eiza:
Heterogeneous Signcryption Scheme With Group Equality Test for Satellite-Enabled IoVs. IEEE Internet Things J. 11(6): 10666-10681 (2024) - 2023
- [j16]Alessandro Raschellà, Max Hashem Eiza, Michael Mackay, Qi Shi, Matthew Banton:
A Trust-Based Cooperative System for Efficient Wi-Fi Radio Access Networks. IEEE Access 11: 136136-136149 (2023) - [j15]Romanus Izuchukwu Okeke, Max Hashem Eiza:
The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies. Inf. Syst. Frontiers 25(2): 451-472 (2023) - [j14]Lampis Alevizos, Vinh-Thong Ta, Max Hashem Eiza:
A Novel Efficient Dynamic Throttling Strategy for Blockchain-Based Intrusion Detection Systems in 6G-Enabled VSNs. Sensors 23(18): 8006 (2023) - [c7]Max Hashem Eiza, Alessandro Raschellà, Michael Mackay, Qi Shi, Faycal Bouhafs:
Towards Trusted and Accountable Win-Win SDWN Platform for Trading Wi-Fi Network Access. CCNC 2023: 1-6 - [c6]Max Hashem Eiza, Alessandro Raschellà:
A Hybrid SDN-based Architecture for Secure and QoS aware Routing in Space-Air-Ground Integrated Networks (SAGINs). WCNC 2023: 1-6 - 2022
- [j13]Lampis Alevizos, Max Hashem Eiza, Ta Vinh Thong, Qi Shi, Janet C. Read:
Blockchain-Enabled Intrusion Detection and Prevention System of APTs Within Zero Trust Architecture. IEEE Access 10: 89270-89288 (2022) - [j12]Vinh-Thong Ta, Max Hashem Eiza:
DataProVe: Fully Automated Conformance Verification Between Data Protection Policies and System Architectures. Proc. Priv. Enhancing Technol. 2022(1): 565-585 (2022) - [j11]Lampis Alevizos, Vinh-Thong Ta, Max Hashem Eiza:
Augmenting zero trust architecture to endpoints using blockchain: A state-of-the-art review. Secur. Priv. 5(1) (2022) - [i2]Max Hashem Eiza, Vinh-Thong Ta:
An Indirect Social Trust Model for Vehicular Social Networks Using Evolving Graph Theory. CoRR abs/2206.13144 (2022) - 2021
- [i1]Lampis Alevizos, Vinh-Thong Ta, Max Hashem Eiza:
Augmenting Zero Trust Architecture to Endpoints Using Blockchain: A Systematic Review. CoRR abs/2104.00460 (2021) - 2020
- [j10]Max Eiza, Romanus Izuchukwu Okeke, John Dempsey, Vinh-Thong Ta:
Keep Calm and Carry on with Cybersecurity @Home: A Framework for Securing Homeworking IT Environment. Int. J. Cyber Situational Aware. 5(1): 1-25 (2020)
2010 – 2019
- 2019
- [j9]Yue Cao, Tong Wang, Xing Zhang, Omprakash Kaiwartya, Mahmoud Hashem Eiza, Ghanim Putrus:
Toward Anycasting-Driven Reservation System for Electric Vehicle Battery Switch Service. IEEE Syst. J. 13(1): 906-917 (2019) - [j8]Mahmoud Hashem Eiza, Qi Shi, Angelos K. Marnerides, Thomas J. Owens, Qiang Ni:
Efficient, Secure, and Privacy-Preserving PMIPv6 Protocol for V2G Networks. IEEE Trans. Veh. Technol. 68(1): 19-33 (2019) - 2018
- [j7]Kemedi Moara-Nkwe, Qi Shi, Gyu Myoung Lee, Mahmoud Hashem Eiza:
A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks. IEEE Access 6: 11374-11387 (2018) - 2017
- [j6]Mahmoud Hashem Eiza, Qiang Ni:
Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cybersecurity. IEEE Veh. Technol. Mag. 12(2): 45-51 (2017) - 2016
- [j5]Mahmoud Hashem Eiza, Thomas J. Owens, Qiang Ni:
Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs. IEEE Trans. Dependable Secur. Comput. 13(1): 32-45 (2016) - [j4]Mahmoud Hashem Eiza, Qiang Ni, Qi Shi:
Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks. IEEE Trans. Veh. Technol. 65(10): 7868-7881 (2016) - [c5]Tim Panton, David Llewellyn-Jones, Nathan Shone, Mahmoud Hashem Eiza:
Secure proximity-based identity pairing using an untrusted signalling service. CCNC 2016: 942-947 - [c4]Mirghiasaldin Seyedebrahimi, Alessandro Raschellà, Faycal Bouhafs, Michael Mackay, Qi Shi, Mahmoud Hashem Eiza:
A centralised Wi-Fi management framework for D2D communications in dense Wi-Fi networks. CSCN 2016: 269-274 - [c3]Mahmoud Hashem Eiza, Qi Shi, Angelos K. Marnerides, Thomas J. Owens:
Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks. ICC 2016: 1-6 - 2015
- [j3]Mahmoud Hashem Eiza, Thomas J. Owens, Qiang Ni, Qi Shi:
Situation-Aware QoS Routing Algorithm for Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 64(12): 5520-5535 (2015) - [c2]Mahmoud Hashem Eiza, Martin Randles, Princy Johnson, Nathan Shone, Jennifer Pang, Amhmed Bhih:
Rail Internet of Things: An Architectural Platform and Assured Requirements Model. CIT/IUCC/DASC/PICom 2015: 364-370 - 2013
- [j2]Mahmoud Hashem Eiza, Qiang Ni, Thomas J. Owens, Geyong Min:
Investigation of routing reliability of vehicular ad hoc networks. EURASIP J. Wirel. Commun. Netw. 2013: 179 (2013) - [j1]Mahmoud Hashem Eiza, Qiang Ni:
An Evolving Graph-Based Reliable Routing Scheme for VANETs. IEEE Trans. Veh. Technol. 62(4): 1493-1504 (2013) - 2012
- [c1]Mahmoud Hashem Eiza, Qiang Ni:
A Reliability-Based Routing Scheme for Vehicular Ad Hoc Networks (VANETs) on Highways. TrustCom 2012: 1578-1585
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 20:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint