Layla A. A. El-Sayed

Learn More
With the increasing ubiquity of mobile devices with computational capabilities comparable to many personal computers, while at the same time, wireless connectivity is almost available everywhere, researchers started to explore how to make use of that huge amount of potential aggregated computing resources. However, mobile devices still suffer short battery(More)
Data Security is the most important issue nowadays. A lot of cryptosystems are introduced to provide security. Public key cryptosystems are the most common cryptosystems used for securing data communication. Modular multiplication is the basic operation of common public key cryptosystems such as RSA, Diffie-Hellman key agreement (DH), ElGamal and ECC. Much(More)
With the increasing ubiquity of mobile devices with computational capabilities comparable to many personal computers, they became the dominant personal computing devices nowadays. However, mobile devices still suffer short battery life and many of them are not capable of running rich-media, data-intensive and compute-intensive applications. Offloading to(More)
Research on Wireless Sensor Networks (WSNs) has recently received much attention as they offer an advantage of monitoring various kinds of environment by sensing physical phenomenon. Many WSN protocols and applications assume the knowledge of geographic location of nodes to report data that is geographically meaningful and services. Locations of nodes can(More)
Embedded systems such as mobile devices are currently ubiquitous. The performance potential of these devices is rapidly improving by incorporating multi-core and GPU technologies, and is rapidly catching up with the workstation platforms. Nevertheless, the heterogeneity of the underlying hardware as well as the low-power constraints severely limit(More)
Data Security is the most important issue nowadays. A lot of cryptosystems are introduced to provide security. Public key cryptosystems are the most common cryptosystems used for securing data communication. The common drawback of applying such cryptosystems is the heavy computations which degrade performance of a system. Modular multiplication is the basic(More)
  • 1