El-Sayed M. El-Horbaty

Work place: Ain Shams University, Faculty of computer and information sciences, Cairo, +2, Egypt

E-mail: Shorbaty@cis.asu.edu.eg

Website:

Research Interests: Autonomic Computing, Distributed Computing, Parallel Computing, Image Processing, Data Structures and Algorithms, Combinatorial Optimization

Biography

Professor El-Sayed M. El-Horbaty: He received his Ph.D. (1985) in Computer science from London University, U.K., his M.Sc. (1978) and B.Sc. (1974) in Mathematics from Ain Shams University, Egypt. His work experience includes 25 years as an academic in Egypt (Ain Shams University), Qatar (Qatar University), and Emirates (Emirates University, Ajman University, and ADU University). He Worked as Deputy Dean of the faculty of IT, Ajman University (2002-2008). He is working as a Vice Dean of the faculty of Computer & Information Sciences, Ain Shams University (2010-2012), and he is working as a head of computer science dept. in the same college (2012-now). Prof. El-Horbaty is current areas of research are parallel algorithms, combinatorial optimization, image processing. His work appeared in journals such as Parallel Computing, International Journal of Computers and Applications (IJCA), Applied Mathematics and Computation, and International Review on Computers and Software. Also he has been involved in more than 26 conferences.

Author Articles
Innovative Method for Enhancing Key Generation and Management in the AES-Algorithm

By Omer K. Jasim Mohammad Safia Abbas El-Sayed M. El-Horbaty Abdel-Badeeh M.Salem

DOI: https://doi.org/10.5815/ijcnis.2015.04.02, Pub. Date: 8 Mar. 2015

With the extraordinary maturity of data exchange in network environments and increasing the attackers capabilities, information security has become the most important process for data storage and communication. In order to provide such information security the confidentiality, data integrity, and data origin authentication must be verified based on cryptographic encryption algorithms. This paper presents a development of the advanced encryption standard (AES) algorithm, which is considered as the most eminent symmetric encryption algorithm. The development focuses on the generation of the integration between the developed AES based S-Boxes, and the specific selected secret key generated from the quantum key distribution.

[...] Read more.
Other Articles