[1] Abdullah Almuhaideb, Bala Srinivasan, Phu Dung Le, Alhabeeb, M.,
& Alfehaid, W. (2015). A Hybrid Mobile Authentication Model for Ubiquitous
Networking. at the The 14th IEEE International Conference on Trust, Security
and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki,
Finland. (Acceptance Rate: 28.4%)
[2] Abdullah Almuhaideb, Bala Srinivasan, Phu Dung Le, Campbell Wilson and
Vishv Malhotra “Analysis of Mobile Authentication Protocols by SVO
Logic”, in the 1st International Conference on Security of Internet of
Things (SecurIT’12), Kerala, India, 17-19 August, 2012, pp. 126-134.
[3] Abdullah Almuhaideb, Phu Dung Le, and Bala Srinivasan, "Two-Party Mobile
Authentication Protocols for Wireless Roaming Networks " in The 10th IEEE
International Symposium on Network Computing and Applications (IEEE
NCA’11), Cambridge, MA USA, 2011. (Acceptance Rate: 28%)
[4] Abdullah Almuhaideb, Phu Dung Le, and Bala Srinivasan, “Passport/Visa:
Authentication and Authorisation Tokens for Ubiquitous Wireless
Communications”, The 7th International ICST Conference on Mobile and
Ubiquitous Systems: Computing, Networking and Services (MobiQuitous’10), 6
- 9 December, 2010, Sydney, Australia. (Acceptance Rate: 22%)
[5] Talal Alharbi, Abdullah Almuhaideb and Phu Dung Le. “A Fast and Secure
Passport-Visa Authentication Scheme for Wireless Communications”, ICICS
2010: 12th International Conference on Information and Communications
Security, Springer LNCS, 15-17 December, 2010, Barcelona, Spain. (Acceptance
Rate: 23%)
[6] Abdullah Almuhaideb, Phu Dung Le, and Bala Srinivasan, “Passport/Visa:
Authentication for Ubiquitous Mobile Access”, The First Annual Conference
for Higher Degree by Research Students (ARCHER’10),18/10/2010, Monash
University, Australia. (Received Manjrasoft Best Poster Award)
[7] Abdullah Almuhaideb, Mohammed Alhabeeb, Phu Dung Le, and Bala Srinivasan,
“Toward a Ubiquitous Mobile Access Model: a roaming agreement-less
approach”, SNPD 2010: the 11th ACIS International Conference on Software
Engineering, Artificial Intelligence, Networking and Parallel/Distributed
Computing, IEEE, 9-11 June, 2010, London, United Kingdom.
[8] Mohammed Alhabeeb, Abdullah Almuhaideb, Phu Dung Le, B. Srinivasan, “A
New Security Approach For Critical Information Systems: Preventing Flooding
In The Non-authenticated Client Area with Using A New Suggested Local Network
Service Providers’ Service”, SNPD 2010: the 11th ACIS International
Conference on Software Engineering, Artificial Intelligence, Networking and
Parallel/Distributed Computing, IEEE, 9-11 June, 2010, London, United
Kingdom.
[9] Abdullah Almuhaideb, Mohammed Alhabeeb, Phu Dung Le, and Bala Srinivasan,
“Passport-Visa based Authentication Mechanism for Ubiquitous Mobile
Communication”, INC2010: the 6th International Conference on Networked
Computing, IEEE, May 11-13 2010, Gyeongju, Korea.
[10] Mohammed Alhabeeb, X. Wu , A.M. Almuhaideb, Phu Dung Le, B. Srinivasan,
“Holistic Approach for Critical System Security: Flooding Prevention”,
INC2010: the 6th International Conference on Networked Computing, IEEE, May
11-13 2010, Gyeongju, Korea.
[11] Mohammed Alhabeeb, Abdullah Almuhaideb, Phu Dung Le, Bala
Srinivasan,”A New Holistic Security Approach for Government Critical
Systems: Flooding Prevention”, First International Workshop on Wireless
and Network Security, Springer.
[12] Abdullah Almuhaideb, Mohammed Alhabeeb, Phu Dung Le and Bala
Srinivasan “Flexible Authentication Technique for Ubiquitous Wireless
Communication using Passport and Visa Tokens”, Journal of
Telecommunications, Volume 1, Issue 2, pp1-10, March 2010.
[13] Mohammed Alhabeeb, Abdullah Almuhaideb, and Phu Dung Le, “Holistic
Approach for Critical System Security: Flooding Prevention and Malicious
Packet Stopping”, Journal of Telecommunications, Volume 1, Issue 1,
pp14-24, February 2010.
[14] Abdullah Almuhaideb, Mohammed Alhabeeb, Phu Dung Le, and Bala
Srinivasan, “Beyond Fixed Key Size: Classifications toward a balance
between security and performance”, AINA 2010: the 24th IEEE International
Conference on Advanced Information Networking and Applications, April 20-23
2010, Perth, Australia, pp.1047-1053. (Acceptance Rate: 25%)
[15] Mohammed Alhabeeb, Abdullah Almuhaideb, Phu Dung Le, and Bala
Srinivasan, “Information Security Threats Classification Pyramid”, FINA
2010: the Sixth International Symposium on Frontiers of Information Systems
and Network Applications, April 20-23 2010, Perth, Australia, pp.208-213.
[16] Abdullah Almuhaideb, Phu Dung Le, and Bala Srinivasan, “Extended
Abstract: an Adaptable Multi-Level Security based on different Algorithms Key
Sizes for Mobile Devices”, SIC 2009: the 3rd Saudi International
Conference, June 5-6 2009, University of Surrey, Guildford, UK.
[17] Abdullah Almuhaideb, Kutila Gunasekera, Arkady Zaslavsky and Seng Loke,
"Comparative Efficiency and Implementation Issues of Itinerant Agent Language
on Different Agent Platforms ", AT2AI-6: From Agent Theory to Agent
Implementation Workshop in the scope of AAMAS 2008 ( The 7th International
Conference on Autonomous Agents and Multiagent Systems), May 12-16 2008,
Cascais, Portugal. (Acceptance Rate: 57%)