Personal information

Cryptography, Security digital images
Algeria, Japan, China

Activities

Education and qualifications (3)

University of batna 2: Fesdis, Batna, DZ

2014-11-14 to 2017-12-21 | PhD (Computer science)
Education
Source: Self-asserted source
Rafik Hamza

Université Hadj Lakhdar Batna: Batna, Batna, DZ

2014-06-16 | Master in cryptography and security (Computer science)
Education
Source: Self-asserted source
Rafik Hamza

Université Hadj Lakhdar Batna: Batna, Batna, DZ

2011-11 | Licence in Applied Mathematics (Mathematics)
Education
Source: Self-asserted source
Rafik Hamza

Works (16)

Greedy Firefly Algorithm for Optimizing Job Scheduling in IoT Grid Computing

Sensors
2022-01 | Journal article | Author
Contributors: Adil Yousif; Samar M. Alqhtani; Mohammed Bakri Bashir; Awad Ali; Rafik Hamza; Alzubair Hassan; Tawfeeg Mohmmed Tawfeeg
Source: check_circle
Multidisciplinary Digital Publishing Institute

Investigation on Privacy-Preserving Techniques for Personal Data

ICDAR 2021 - Proceedings of the 2021 Workshop on Intelligent Cross-Data Analysis and Retrieval
2021 | Conference paper
EID:

2-s2.0-85114212527

Contributors: Hamza, R.; Zettsu, K.
Source: Self-asserted source
Rafik Hamza via Scopus - Elsevier

Blockchain-PUF-Based Secure Authentication Protocol for Internet of Things

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2020 | Book
EID:

2-s2.0-85082135611

Part of ISSN: 16113349 03029743
Contributors: Patil, A.S.; Hamza, R.; Yan, H.; Hassan, A.; Li, J.
Source: Self-asserted source
Rafik Hamza via Scopus - Elsevier

Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts

Computers and Security
2020 | Journal article
EID:

2-s2.0-85088920596

Part of ISSN: 01674048
Contributors: Patil, A.S.; Hamza, R.; Hassan, A.; Jiang, N.; Yan, H.; Li, J.
Source: Self-asserted source
Rafik Hamza via Scopus - Elsevier

Weighted-capsule routing via a fuzzy gaussian model

Pattern Recognition Letters
2020 | Journal article
EID:

2-s2.0-85089683963

Part of ISSN: 01678655
Contributors: Amira, O.; Xu, S.; Du, F.; Zhang, J.; Zhang, C.; Hamza, R.
Source: Self-asserted source
Rafik Hamza via Scopus - Elsevier

A Lightweight Certificateless User Authentication Scheme for Mobile Environment

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2019 | Book
EID:

2-s2.0-85072866262

Contributors: Hassan, A.; Hamza, R.; Mawutor, V.G.; Patil, A.S.; Li, F.
Source: Self-asserted source
Rafik Hamza via Scopus - Elsevier

A Lightweight Secure IoT Surveillance Framework Based on DCT-DFRT Algorithms

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2019 | Book
EID:

2-s2.0-85072872468

Contributors: Hamza, R.; Hassan, A.; Patil, A.S.
Source: Self-asserted source
Rafik Hamza via Scopus - Elsevier

An Efficient Outsourced Privacy Preserving Machine Learning Scheme with Public Verifiability

IEEE Access
2019 | Journal article
EID:

2-s2.0-85078880598

Part of ISSN: 21693536
Contributors: Hassan, A.; Hamza, R.; Yan, H.; Li, P.
Source: Self-asserted source
Rafik Hamza via Scopus - Elsevier

Sensitive and Energetic IoT Access Control for Managing Cloud Electronic Health Records

IEEE Access
2019 | Journal article
Part of ISSN: 2169-3536
Source: Self-asserted source
Rafik Hamza

An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment

Complexity
2019-12-09 | Journal article
Part of ISSN: 1076-2787
Part of ISSN: 1099-0526
Source: Self-asserted source
Rafik Hamza

A privacy-preserving cryptosystem for IoT E-healthcare

Information Sciences
2019-01 | Journal article
Part of ISSN: 0020-0255
Source: Self-asserted source
Rafik Hamza

Secure Surveillance Framework for IoT systems using Probabilistic Image Encryption

IEEE Transactions on Industrial Informatics
2018 | Journal article
Source: Self-asserted source
Rafik Hamza

A novel pseudo random sequence generator for image-cryptographic applications

Journal of Information Security and Applications
2017 | Journal article
Source: Self-asserted source
Rafik Hamza

Hash based Encryption for Keyframes of Diagnostic Hysteroscopy

IEEE Access
2017 | Journal article
Part of ISSN: 2169-3536
Contributors: Rafik Hamza; Khan Muhammad; Arunkumar Nachiappan; Gustavo Ramirez Gonzalez
Source: Self-asserted source
Rafik Hamza via Crossref Metadata Search

Secure video summarization framework for personalized wireless capsule endoscopy

Pervasive and Mobile Computing
2017 | Journal article
EID:

2-s2.0-85017419779

Contributors: Hamza, R.; Muhammad, K.; Lv, Z.; Titouna, F.
Source: Self-asserted source
Rafik Hamza via Scopus - Elsevier

A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map

Information Security Journal
2016 | Journal article
EID:

2-s2.0-84981513394

Contributors: Hamza, R.; Titouna, F.
Source: Self-asserted source
Rafik Hamza via Scopus - Elsevier