1

Prof. Heba Kamal Aslan

Professor

Faculty Building

UB1

Office Number

203

Biography

Prof. Heba Kamal Aslan is a Professor at Nile University and Electronics Research Institute, Cairo-Egypt. She received her B. Sc. degree, M. Sc. degree, and Ph. D. degree from Faculty of Engineering, Cairo University, Egypt in 1990, 1994 and 1998 respectively.

Her research interests include Key Distribution Protocols, Authentication Protocols, Logical Analysis of Protocols, Blockchain Applications, Quantum Cryptography, and Intrusion Detection Systems.

Achievements
  1. Organizing Committee member of: 11th International Conference on Model and Data Engineering (MEDI2022)
  2.  Co-Editor of the proceeding of: IFIP TC11 17th International Conference on Inforation Security (SEC2002)
  3. Member of: “Globally-Asynchronous Locally-Synchronus (GALS)- based Programmable Low-Power High-Performance Security Processor”, Project funded by NTRA, 2016.
  4. Principal Investigator of: “Hardware Simulation of Rijndael: the New Advanced Encryption Standard”, Internal Project (supported by Electronics Research Institute), 2002.
Recent Publications

Advanced Phishing Detection in Ethereum Blockchain Transactions Using Machine Learning Models

Deceptive phishing attacks greatly endanger blockchain security, tricking miners into adding harmful blocks to the chain. Current methods of detection and agreement protocols are frequently not enough, especially if authorized miners accidentally include these blocks. Despite the potential for improving detection capabilities, the adoption of zero-trust policies is still restricted. This paper

Artificial Intelligence

A (k,n)-Secret Image Sharing With Steganography Using Generalized Tent Map

Secret Image Sharing (SIS) transfers an image to mutually suspicious receivers as n meaningless shares, where k or more shares must be present to recover the secret. This paper proposes a (k, n)-SIS system for any image type using polynomial interpolation based on Lagrange polynomials, where the generated shares are of size 1/k of the secret image size. A full encryption system, consisting of

Artificial Intelligence
Circuit Theory and Applications
Agriculture and Crops

Smart Automotive Diagnostic and Performance Analysis Using Blockchain Technology

The automotive industry currently is seeking to increase remote connectivity to a vehicle, which creates a high demand to implement a secure way of connecting vehicles, as well as verifying and storing their data in a trusted way. Furthermore, much information must be leaked in order to correctly diagnose the vehicle and determine when or how to remotely update it. In this context, we propose a

Artificial Intelligence
Healthcare
Energy and Water
Circuit Theory and Applications
Software and Communications
Mechanical Design
Innovation, Entrepreneurship and Competitiveness

Networking and cryptography library with a non-repudiation flavor for blockchain

Blockchain is currently one of the most widely discussed inventions in the information and communication technology industry. It is a pillar of the fourth industrial revolution and it is a cryptographically demanding technology that is regarded as one of the most influential topics in academia. Many blockchain platforms currently utilize third-party cryptographic libraries that offer many

Artificial Intelligence
Circuit Theory and Applications
Software and Communications
Innovation, Entrepreneurship and Competitiveness

Design and Implementation of a Dockerized, Cross Platform, Multi-Purpose Cryptography as a Service Framework Featuring Scalability, Extendibility and Ease of Integration

Following cybersecurity st and ards nowadays is becoming one of the highest priorities to the digital specialists. Due to the global direction to apply digital transformation, data security is a concern. It becomes crucial to ensure data confidentiality, integrity, and availability whether while transmitting, at rest or even while processing it. The difficulty being faced by organizations, is the

Artificial Intelligence
Circuit Theory and Applications
Software and Communications
Mechanical Design

IoT Modes of Operations with Different Security Key Management Techniques: A Survey

The internet of things (IoT) has provided a promising opportunity to build powerful systems and applications. Security is the main concern in IoT applications due to the privacy of exchanged data using limited resources of IoT devices (sensors/actuators). In this paper, we present a classification of IoT modes of operation based on the distribution of IoT devices, connectivity to the internet, and

Artificial Intelligence
Circuit Theory and Applications
Research Tracks
  • Lightweight Cryptography
  • Post-Quantum Cryptography
  • Secure IoT Applications
  • Secure Applications using Blockchain.
  • Intrusion Detection Systems
  • Security of Multicast/Unicast Communication