Mohamed Hamdy Eldefrawy

821 total citations
20 papers, 530 citations indexed

About

Mohamed Hamdy Eldefrawy is a scholar working on Computer Networks and Communications, Information Systems and Signal Processing. According to data from OpenAlex, Mohamed Hamdy Eldefrawy has authored 20 papers receiving a total of 530 indexed citations (citations by other indexed papers that have themselves been cited), including 16 papers in Computer Networks and Communications, 13 papers in Information Systems and 4 papers in Signal Processing. Recurrent topics in Mohamed Hamdy Eldefrawy's work include Advanced Authentication Protocols Security (11 papers), User Authentication and Security Systems (10 papers) and IoT and Edge/Fog Computing (3 papers). Mohamed Hamdy Eldefrawy is often cited by papers focused on Advanced Authentication Protocols Security (11 papers), User Authentication and Security Systems (10 papers) and IoT and Edge/Fog Computing (3 papers). Mohamed Hamdy Eldefrawy collaborates with scholars based in Sweden, Saudi Arabia and Egypt. Mohamed Hamdy Eldefrawy's co-authors include Mikael Gidlund, Muhammad Khurram Khan, Nuno Pereira, Khaled Alghathbar, Yasser Gadallah, Karim G. Seddik, İsmail Bütün, Johan Åkerberg, Gerhard P. Hancke and Stefan Forsström and has published in prestigious journals such as IEEE Access, Sensors and IEEE Internet of Things Journal.

In The Last Decade

Mohamed Hamdy Eldefrawy

19 papers receiving 500 citations

Peers

Mohamed Hamdy Eldefrawy
Cong Pu United States
Inshil Doh South Korea
Cihan Tunc United States
Hongjun Choi South Korea
Pratik Satam United States
Cong Pu United States
Mohamed Hamdy Eldefrawy
Citations per year, relative to Mohamed Hamdy Eldefrawy Mohamed Hamdy Eldefrawy (= 1×) peers Cong Pu

Countries citing papers authored by Mohamed Hamdy Eldefrawy

Since Specialization
Citations

This map shows the geographic impact of Mohamed Hamdy Eldefrawy's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Mohamed Hamdy Eldefrawy with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Mohamed Hamdy Eldefrawy more than expected).

Fields of papers citing papers by Mohamed Hamdy Eldefrawy

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Mohamed Hamdy Eldefrawy. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Mohamed Hamdy Eldefrawy. The network helps show where Mohamed Hamdy Eldefrawy may publish in the future.

Co-authorship network of co-authors of Mohamed Hamdy Eldefrawy

This figure shows the co-authorship network connecting the top 25 collaborators of Mohamed Hamdy Eldefrawy. A scholar is included among the top collaborators of Mohamed Hamdy Eldefrawy based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Mohamed Hamdy Eldefrawy. Mohamed Hamdy Eldefrawy is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Kurunathan, Harrison, et al.. (2025). Navigating the Challenges and Opportunities of Securing Internet of Autonomous Vehicles With Lightweight Authentication. IEEE Access. 13. 24207–24222. 6 indexed citations
3.
Eldefrawy, Mohamed Hamdy, et al.. (2023). Enhancing the Security of ISO/IEC 14443-3 and 4 RFID Authentication Protocols through Formal Analysis. 7. 1–6. 2 indexed citations
4.
Seddik, Karim G., et al.. (2020). A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT. IEEE Internet of Things Journal. 7(9). 8462–8471. 138 indexed citations
5.
Axelsson, Stefan, et al.. (2020). Deep learning-based Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices. 1666. 150–156. 1 indexed citations
6.
Eldefrawy, Mohamed Hamdy, et al.. (2020). Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges. IEEE Access. 8. 152351–152366. 97 indexed citations
7.
Eldefrawy, Mohamed Hamdy, et al.. (2019). Dynamic User Authentication Protocol for Industrial IoT without Timestamping. 1–7. 6 indexed citations
8.
Eldefrawy, Mohamed Hamdy, Nuno Pereira, & Mikael Gidlund. (2018). Key Distribution Protocol for Industrial Internet of Things Without Implicit Certificates. IEEE Internet of Things Journal. 6(1). 906–917. 27 indexed citations
9.
Forsström, Stefan, İsmail Bütün, Mohamed Hamdy Eldefrawy, Ulf Jennehag, & Mikael Gidlund. (2018). Challenges of Securing the Industrial Internet of Things Value Chain. Publications (Mid Sweden University). 218–223. 26 indexed citations
10.
Eldefrawy, Mohamed Hamdy, İsmail Bütün, Nuno Pereira, & Mikael Gidlund. (2018). Formal security analysis of LoRaWAN. Computer Networks. 148. 328–339. 83 indexed citations
11.
Eldefrawy, Mohamed Hamdy & Jalal Al‐Muhtadi. (2015). Cryptanalysis and Enhancement of a Password-Based Authentication Scheme. 548–551. 3 indexed citations
12.
Eldefrawy, Mohamed Hamdy & Muhammad Khurram Khan. (2015). Banknote Validation through an Embedded RFID Chip and an NFC-Enabled Smartphone. Mathematical Problems in Engineering. 2015. 1–8. 6 indexed citations
13.
Eldefrawy, Mohamed Hamdy, Muhammad Khurram Khan, & Hassan M. Elkamchouchi. (2014). The Use of Two Authentication Factors to Enhance the Security of Mass Storage Devices. 5. 196–200. 3 indexed citations
14.
Eldefrawy, Mohamed Hamdy & Muhammad Khurram Khan. (2012). Detecting counterfeit-money using RFID-enabled mobile devices. International Conference for Internet Technology and Secured Transactions. 74–79. 2 indexed citations
15.
Eldefrawy, Mohamed Hamdy, Khaled Alghathbar, & Muhammad Khurram Khan. (2012). Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes. 77–81. 15 indexed citations
16.
Eldefrawy, Mohamed Hamdy, Khaled Alghathbar, Muhammad Khurram Khan, & Hassan M. Elkamchouchi. (2011). Secure Instant Messaging Protocol for Centralized Communication Group. 1–4. 3 indexed citations
17.
Eldefrawy, Mohamed Hamdy, Khaled Alghathbar, & Muhammad Khurram Khan. (2011). OTP-Based Two-Factor Authentication Using Mobile Phones. 327–331. 48 indexed citations
18.
Eldefrawy, Mohamed Hamdy, Muhammad Khurram Khan, Khaled Alghathbar, Tai-hoon Kim, & Hassan M. Elkamchouchi. (2011). Mobile one‐time passwords: two‐factor authentication using mobile phones. Security and Communication Networks. 5(5). 508–516. 17 indexed citations
19.
Eldefrawy, Mohamed Hamdy, Muhammad Khurram Khan, Khaled Alghathbar, & Eun‐Suk Cho. (2010). Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem. Sensors. 10(9). 8683–8695. 16 indexed citations
20.
Eldefrawy, Mohamed Hamdy, Muhammad Khurram Khan, & Khaled Alghathbar. (2010). A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography. 1–6. 31 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026