A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs I Ali, M Gervais, E Ahene, F Li Journal of Systems Architecture 99, 101636, 2019 | 126 | 2019 |
A multi-objective optimization approach to workflow scheduling in clouds considering fault recovery H Xu, B Yang, W Qi, E Ahene KSII Transactions on Internet and Information Systems (TIIS) 10 (3), 976-995, 2016 | 51 | 2016 |
Efficient signcryption with proxy re-encryption and its application in smart grid E Ahene, Z Qin, AK Adusei, F Li IEEE Internet of Things Journal 6 (6), 9722-9737, 2019 | 37 | 2019 |
Rainfall prediction using machine learning algorithms for the various ecological zones of Ghana NKA Appiah-Badu, YM Missah, LK Amekudzi, N Ussiph, T Frimpong, ... IEEE Access 10, 5069-5082, 2021 | 30 | 2021 |
Certificateless deniably authenticated encryption and its application to e-voting system E Ahene, C Jin, F Li Telecommunication Systems 70 (3), 417-434, 2019 | 16 | 2019 |
Evaluation of conversational agents: understanding culture, context and environment in emotion detection MT Teye, YM Missah, E Ahene, T Frimpong IEEE Access 10, 24976-24984, 2022 | 14 | 2022 |
A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid E Ahene, J Dai, H Feng, F Li Telecommunication Systems 70, 491-510, 2019 | 13 | 2019 |
Secure energy encryption for wireless power transfer E Ahene, M Ofori-Oduro, B Agyemang 2017 IEEE 7th International Advance Computing Conference (IACC), 199-204, 2017 | 9 | 2017 |
A pairing-free key-insulated certificate-based signature scheme with provable security H Xiong, S Wu, J Geng, E Ahene, S Wu, Z Qin KSII Transactions on Internet and Information Systems (TIIS) 9 (3), 1246-1259, 2015 | 9 | 2015 |
Application of residue number system (RNS) to image processing using orthogonal transformation GK Armah, E Ahene 2015 IEEE International Conference on Communication Software and Networks …, 2015 | 8 | 2015 |
Heterogeneous signcryption with proxy re-encryption and its application in EHR systems E Ahene, J Walker, ROM Gyening, G Abdul-Salaam, JB Hayfron-Acquah Telecommunication Systems 80 (1), 59-75, 2022 | 5 | 2022 |
threat landscape across multiple cloud service providers using honeypots as an attack source SK Brew, E Ahene International Conference on Frontiers in Cyber Security, 163-179, 2022 | 2 | 2022 |
Dynamic Programming-based Adversarial Windows Payload Generator F Kingful, E Ahene, B Appiah, BK Frimpong, I Osei, ENA Hammond | 1 | 2023 |
Enhanced network load balancing technique for efficient performance in software defined network E Osei Kofi, E Ahene Plos one 18 (4), e0284176, 2023 | 1 | 2023 |
Implicit optimal variational collaborative filtering J Walker, F Zhou, EY Baagyere, E Ahene, F Zhang Complex & Intelligent Systems 8 (5), 4369-4384, 2022 | 1 | 2022 |
Efficient deniable authentication and its application in location-based services E Ahene, J Walker, I Ali, KO Peasah, M Asante Computers and Electrical Engineering 100, 107958, 2022 | 1 | 2022 |
Corrections to" Evaluation of Conversational Agents: Understanding Culture, Context and Environment in Emotion Detection". MT Teye, YM Missah, E Ahene, F Twum, A Boch IEEE Access 10, 35900, 2022 | 1 | 2022 |
Fault-tolerant resource provisioning with deadline-driven optimization in hybrid clouds E Ahene, KN Acheampong, H Xu International Journal of Advanced Computer Science and Applications 7 (12), 2016 | 1 | 2016 |
An Enhanced Subsampling Technique in Compressive Sensing using Linear Interpolation and Random Measurement Matrix F Osei-Wusu, E Ahene, SA Muntaka | | 2024 |
Guest editorial:: Special issue on frontiers in cyber security F Li, E Ahene, M Zhang, F Guo | | 2023 |