Mahmoud Nasreldin

Learn More
Broadband wireless access security becomes more complicated when wireless devices are added to the network. Threats are ranked according to the level of risk they present. Authentication in WiMax (IEEE 802.16) will be examined using different protocols. This paper reflects to most recent work of the IEEE and WiMax forums and it can be used to prioritize(More)
The new cloud computing concept delivers an adaptable service to many users. This is due to the fact that cloud computing offers an economic solution based on pay-per use idea. At the same time, digital forensics is a relatively new discipline born out due to the growing use of computing and digital solution. Digital forensics in cloud computing brings new(More)
  • 1