| Title |
Year |
Journal |
|
Downloads |
|
SEPIM: Secure and Efficient Private Image Matching
|
2016 |
Journal of Applied Sciences |
1 |
|
|
|
Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing
|
2017 |
Security and Communication Networks |
1 |
|
|
|
A Lightweight Scheme to Authenticate and Secure the Communication in Smart Grids
|
2018 |
MDPI, Applied Sciences |
1 |
|
13 |
|
Toward for Strong Authentication Code In Cloud of Internet of Things Based on DWT And Steganography
|
2018 |
Journal Of Theoretical And Applied Information Technology |
1 |
|
|
|
Efficient encrypted image retrieval in IoT-cloud with multi-user Authentication
|
2018 |
SAGE, International Journal of Distributed Sensor Networks |
1 |
|
|
|
LEACH-T: LEACH Clustering Protocol Based on Three Layers
|
2017 |
IEEE , (International Conference on Network and Information Systems for Computers (ICNISC |
2 |
|
|
|
Towards One-Time Biometric-message Authentication Code in Cloud Computing
|
2018 |
Journal of Engineering and Applied Sciences |
1 |
|
|
|
Boost Secure Sockets Layer against Man-in-the-Middle Sniffing Attack via SCPK
|
2019 |
International Conference on Advanced Science and Engineering (ICOASE), IEEE |
1 |
|
15 |
|
Simulation and Design of Fuzzy Temperature Control for Heating and Cooling Water System
|
2011 |
International Journal of Advancements in Computing Technology |
1 |
|
|
|
Comparison between ant colony and genetic algorithm using Traveling Salesman Problem
|
2013 |
International Journal of Soft Computing, Medwell |
1 |
|
|
|
FINGERPRINT IMAGE ENHANCEMENT BY DEVELOP MEHTRE TECHNIQUE
|
2012 |
Advanced Computing: An International Journal ( ACIJ ) |
1 |
|
|
|
Efficient and Secure Mutual Authentication Scheme in Cloud Computing
|
2013 |
International Journal of Engineering and Advanced Technology (IJEAT) |
1 |
|
|
|
Secure Image Retrieval over Untrusted Cloud Servers
|
2013 |
International Journal of Engineering and Advanced Technology (IJEAT) |
1 |
|
|
|
A LOGARITHM ENCRYPTION (EA-LOG) OF SYMMETRIC CRYPTOGRAPHY
|
2013 |
International Journal of Advances in Engineering & Technology |
1 |
|
|
|
An Efficient and Robust One-TimeMessage Authentication CodeScheme Using Feature Extraction of Iris in Cloud Computing
|
2014 |
Proceedings of 2014 International Conference on Cloud Computing and Internet of Things (CCTOT 2014) |
2 |
|
|
|
A Secured Scheme for Geographical Distance Computation over Encrypted Cloud Data
|
2015 |
2015 4th International Conference on Computer Science and Network Technology |
2 |
|
|
|
Scheme for Ensuring Data Security on Cloud Data Storage in a Semi-trusted Third Party Auditor
|
2015 |
2015 4th International Conference on Computer Science and Network Technology (ICCSNT 2015) |
2 |
|
|
|
New Data Integrity Scheme Employing Wavelet-Based Digital Watermarking in Cloud Environment
|
2019 |
2015 4th International Conference on Computer Science and Network Technology (ICCSNT 2015) |
2 |
|
14 |
|
Robust Scheme to Protect Authentication Code of Message/Image Documents in Cloud Computing
|
2016 |
International Conference on Computing, Networking and Communications (ICNC 2016), IEEE |
2 |
|
|
|
Robust Image Document Authentication Code with Autonomous Biometric Key Generation, Selection, and Updating in Cloud Environment
|
2016 |
The 11th International Conference on Information Assurance and Security (IAS), IEEE |
2 |
|
9 |
|
Public Auditing for Secure Data Storage in Cloud through a Third Party Auditor Using Modern Ciphertext
|
2015 |
The 11th International Conference on Information Assurance and Security (IAS), IEEE |
2 |
|
|
|
MACLESS Steganography using Double-stegging with Handwritten Signature in Cloud Computing
|
2016 |
2nd International Conference on Communication Systems and Computing Application Science, IEEE |
2 |
|
|
|
Data Integrity Proof and Secure Computation Based on Feature Extraction of Iris in Cloud Storage
|
2016 |
2nd International Conference on Communication Systems and Computing Application Science, IEEE |
2 |
|
|
|
Public Auditing for Secure Shared Data Storage in Cloud with Multi-User Modification
|
2016 |
2nd International Conference on Communication Systems and Computing Application Science, IEEE |
2 |
|
|
|
Preventing ARP Cache Poisoning Attack by Improving ARP to Stateful
|
2016 |
2nd International Conference on Computational Intelligence, Communication and Signal, IEEE |
2 |
|
|
|
Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment
|
2016 |
The 2nd IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2016) |
2 |
|
|
|
An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage
|
2016 |
IEEE International Conference on Intelligent Data and Security (IEEE IDS 2016) |
2 |
|
|
|
ARP enhancement to stateful protocol by register ARP request
|
2016 |
The 2nd Annual International Conference on Network and Information Systems for Computers (ICNISC2016) |
2 |
|
|
|
Towards Secure Private Image Matching
|
2016 |
The 11th IEEE International Conference on Green, Pervasive and Cloud Computing (GPC-2016) |
2 |
|
|
|
General domain ontology in enterprises software development
|
2017 |
In: Proceedings of the ICT conference and exhibition on information and communication technology, Basrah |
2 |
|
|
|
DNS Protection Against Spoofing and Poisoning Attacks
|
2016 |
(In: Proceedings of the 3rd International Conference on Information Science and Control Engineering (ICISCE’16) |
1 |
|
|
|
Secure and Efficient E-health Scheme Based on the Internet of Things
|
2016 |
In: Proceedings of the 6th International Conference on Signal Processing, Communications and Computing (ICSPCC’16) |
2 |
|
|
|
Privacy-preserving Image Retrieval in IoT-Cloud
|
2017 |
In: Proceedings of the 15th International Conference on Trust, Security and Privacy in Computing and Communications |
2 |
|
|
|
Secure Biometric Image Retrieval in IoT-Cloud
|
2016 |
(In: Proceedings of the 6th International Conference on Signal Processing, Communications and Computing (ICSPCC’16) |
2 |
|
|
|
Ensuring Data Integrity Scheme Based on Digital Signature and Iris Features in Cloud
|
2016 |
Indonesian Journal of Electrical Engineering and Computer Science, Vol. 2, No. 2, May 2016 |
1 |
|
|
|
EEC–LEACH: Energy-Efficient Clustering Design for Reducing Power Consumption of LEACH Protocol
|
2017 |
6th International Conference on Communication,Electronics and Automation Engineering (ICCEAE 2017) |
2 |
|
|
|
EEIRI: Efficient Encrypted Image Retrieval in IoT-Cloud
|
2019 |
.KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, Vol 13, No. 11, 2019. . |
1 |
|
16 |
|
An effective image retrieval based on optimized genetic algorithm utilized a novel SVM‑based convolutional neural network classifier
|
2019 |
Human-centric Computing and Information Sciences, Springer, vol. 9, no. 31 (2019) |
1 |
|
15 |
|
An Efficient and Secure Scheme for Dynamic Shared Data in Cloud
|
2019 |
The 3rd International Conference on Computer Science and Application Engineering (CSAE’19), ACM |
2 |
|
2 |
|
Toward awareness locality algorithms of Peer-to-Peer file sharing network
|
2020 |
”, In: Proceedings of the ACM 5th International Conference on Cloud Computing and Internet of Things (CCIOT 2020) |
2 |
|
|
|
Greedy Learning of Deep Boltzmann Machine (GDBM)’s Variance and Search Algorithm for Efficient Image Retrieval
|
2019 |
IEEE Access |
1 |
|
0 |
|
Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System
|
2020 |
IEEE ACCESS |
1 |
|
|
|
Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud
|
2020 |
.In: Proceedings of the 10th International Conference on Signal Processing, Communications and Computing (ICSPCC’20), IEEE |
2 |
|
|
|
A Lightweight Messaging Method for End to End Smart Device Communication in the Internet of Things Cloud
|
2021 |
China National Intellectural Property |
6 |
|
|
|
Securing audio transmission based on encoding and steganography
|
2021 |
Indonesian Journal of Electrical Engineering and Computer Science |
1 |
|
0 |
|
Secure Data of Industrial Internet of Things in a Cement Factory Based on a Blockchain Technology
|
2021 |
MDPI-Applied Sciences |
1 |
|
0 |
|
Web application database protection from SQLIA using permutation encoding
|
2021 |
ACM |
1 |
|
|
|
Towards Iris-Based Authentication for Smart Devices in the Cloud
|
2021 |
Springer |
2 |
|
|
|
Lightweight Privacy-Preserving Similar Documents Retrieval over Encrypted Data
|
2021 |
IEEE |
2 |
|
0 |
|
Lightweight, Secure, Similar-Document Retrieval over Encrypted Data
|
2021 |
MDPI-Applied Sciences |
1 |
|
|
|
Towards Security and Privacy Preservation in 5G Networks
|
2021 |
IEEE |
2 |
|
|
|
Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Mapping
|
2022 |
IEEE |
1 |
|
|
|
Provably Secure Session Key Agreement Protocol for Unmanned Aerial Vehicles Packet Exchanges
|
2022 |
IEEE |
2 |
|
|
|
Energy Efficient WSN Sink-Cloud Server Authentication Protocol
|
2022 |
Conference: 2021 5th International Conference on Information Systems and Computer Networks (ISCON) |
2 |
|
|
|
Dynamic Ephemeral and Session Key Generation Protocol for Next Generation Smart Grids
|
2022 |
International Conference on Ad Hoc Networks International Conference on Testbeds and Research Infrastructures ADHOCNETS 2021 |
2 |
|
|
|
Anonymous Key Agreement and Mutual Authentication Protocol for Smart Grids
|
2022 |
ٍٍSpringer- EAI WiCON 2021 - 14th EAI International Wireless Internet Conference |
2 |
|
|
|
Audio steganography with enhanced LSB method for securing encrypted text with bit cycling
|
2022 |
Institute of Advanced Engineering and Science (IAES) |
1 |
|
|
|
Authentication and Key Agreement Protocol for Secure Traffic Signaling in 5G Networks
|
2022 |
IEEE |
2 |
|
|
|
Efficient Extreme Gradient Boosting Based Algorithm for QoS Optimization in Inter-Radio Access Technology Handoffs
|
2022 |
IEEE International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) |
2 |
|
|
|
Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things
|
2022 |
Springer-7th EAI International Conference on IoT as Service- IoTaaS |
5 |
|
|
|
Verifiable Security and Privacy Provisioning Protocol for High Reliability in Smart Healthcare Communication Environment
|
2022 |
4th Global Power, Energy and Communication Conference (IEEE GPECOM2022), June 14-17, 2022, Cappadocia/Turkey |
2 |
|
0 |
|
Temporary Symmetric Key Based Message Verification Protocol for Smart Energy Networks
|
2022 |
IEEE- 2022 7th IEEE International Energy Conference (ENERGYCON 2022) |
2 |
|
|
|
Packet Replays Prevention Protocol for Secure B5G Networks
|
2022 |
Springer- Packet Replays Prevention Protocol for Secure B5G Networks |
5 |
|
|
|
Biometric-Based Packet Validation Scheme for Body Area Network Smart Healthcare Devices
|
2022 |
2022 IEEE 21st Mediterranean Electrotechnical Conference (MELECON) |
2 |
|
|
|
MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones
|
2022 |
FABULOUS 2022: Future Access Enablers for Ubiquitous and Intelligent Infrastructures , Springer |
2 |
|
0 |
|
Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks
|
2022 |
Journal of Sensor and Actuator Networks |
1 |
|
|
|
Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment
|
2022 |
Applied Cryptography in Computer and Communications Second EAI International Conference, AC3 2022, Springer |
5 |
|
|
|
Fully automated model on breast cancer classification using deep learning classifiers
|
2022 |
Indonesian Journal of Electrical Engineering and Computer Science |
1 |
|
|
|
A Lightweight Hybrid Scheme for Hiding Text Messages in Colour Images Using LSB, Lah Transform and Chaotic Techniques
|
2022 |
MDPI-Journal of Sensor and Actuator Networks |
1 |
|
|
|
Provably throttling SQLI using an enciphering query and secure matching
|
2022 |
Elsevier |
1 |
|
0 |
|
Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes
|
2022 |
MDPI-Applied Sciences |
1 |
|
0 |
|
A Blockchain-Based Architecture for Securing Industrial IoTs Data in Electric Smart Grid
|
2022 |
Computers,Materials & Continua |
1 |
|
|
|
Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT Systems
|
2023 |
MDPI-Applied Sciences |
1 |
|
|
|
Identity authentication method, system and electronic device
|
2022 |
Chinese intellectual property |
6 |
|
0 |
|
Low Bandwidth and Side-Channeling Resilient Algorithm for Pervasive Computing Systems
|
2022 |
ٍSpringer -Proceedings of International Conference on Communication and Computational Technologies |
2 |
|
|
|
Optimized Hysteresis Region Authenticated Handover for 5G HetNets
|
2022 |
Artificial Intelligence and Sustainable Computing, Algorithms for Intelligent Systems, Springer |
5 |
|
|
|
Forward and Backward Key Secrecy Preservation Scheme for Medical Internet of Things
|
2022 |
Human-Centric Smart Computing Proceedings of ICHCSC 2022-Springer |
2 |
|
|
|
Transient Session Key Derivation Protocol for Key Escrow Prevention in Public Key Infrastructure
|
2023 |
International Conference on Internet of Everything-Springer |
2 |
|
|
|
Provably secure and efficient audio compression based on compressive sensing
|
2023 |
International Journal of Electrical and Computer Engineering (IJECE) |
1 |
|
|
|
Towards for Designing Educational System Using Role-Based Access Control
|
2022 |
International Journal of Intelligent Engineering & Systems |
1 |
|
|
|
Investigating the relationship between knowledge management practices and organizational learning practices in the universities’ environment
|
2023 |
International Journal of Electrical and Computer Engineering (IJECE) |
1 |
|
|
|
Concurrent pipeline rendering scheme based on GPU multi-queue and partitioning images
|
2023 |
Proceedings Volume 12634, International Conference on Optics and Machine Vision (ICOMV 2023) |
2 |
|
|
|
SECURE AND LOW-COMPLEXITY MEDICAL IMAGE EXCHANGE BASED ON COMPRESSIVE SENSING AND LSB AUDIO STEGANOGRAPHY
|
2023 |
Informatica |
1 |
|
|
|
Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture
|
2023 |
MDPI-Sustainability |
1 |
|
|
|
Knowledge Management and its Role in the Development of a Smart University in Iraq
|
2023 |
TEM Journal |
1 |
|
|
|
Role Based Access Control Using Biometric the in Educational System
|
2023 |
Journal of Basrah Researches (Sciences) |
1 |
|
|
|
Improving the Performance of Searchable Symmetric Encryption by Optimizing Locality
|
2023 |
Journal of Basrah Researches (Sciences) |
1 |
|
|
|
Multi-chain blockchain based secure data-sharing framework for industrial IoTs smart devices in petroleum industry
|
2023 |
Internet of Things- Elsevier |
1 |
|
|
|
Two-Factor Privacy Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks
|
2024 |
IEEE Internet of Things Journal |
1 |
|
0 |
|
Smart city energy efficient data privacy preservation protocol based on biometrics and fuzzy commitment scheme
|
2024 |
Nature- Scientific reports |
1 |
|
|
|
Hiding scrambled text messages in speech signals using a lightweight hyperchaotic map and conditional LSB mechanism
|
2024 |
Public Library of Science-PLoS ONE |
1 |
|
0 |
|
Vehicular ad hoc networks verification scheme based on bilinear pairings and networks reverse fuzzy extraction
|
2025 |
Scientific Reports |
1 |
|
0 |
|
Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control
|
2024 |
MDPI-Journal of Sensor and Actuator Networks |
1 |
|
0 |
|
Low-Complexity and Secure Clustering-Based Similarity Detection for Private Files
|
2024 |
TEM Journal |
1 |
|
0 |
|
A provably lightweight and secure DSSE scheme, with a constant storage cost for a smart device client
|
2024 |
PLOS ONE |
1 |
|
|
|
Blockchain-Based Authentication Schemes in Smart Environments: A Systematic Literature Review
|
2024 |
IEEE |
1 |
|
0 |
|
Two-Factor Privacy-Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks
|
2024 |
IEEE INTERNET OF THINGS JOURNAL |
1 |
|
0 |