Zaid Ameen Abduljabbar

Selected publications

Title Year Journal Downloads
SEPIM: Secure and Efficient Private Image Matching 2016 Journal of Applied Sciences 1
Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing 2017 Security and Communication Networks 1
A Lightweight Scheme to Authenticate and Secure the Communication in Smart Grids 2018 MDPI, Applied Sciences 1 download 13
Toward for Strong Authentication Code In Cloud of Internet of Things Based on DWT And Steganography 2018 Journal Of Theoretical And Applied Information Technology 1
Efficient encrypted image retrieval in IoT-cloud with multi-user Authentication 2018 SAGE, International Journal of Distributed Sensor Networks 1
LEACH-T: LEACH Clustering Protocol Based on Three Layers 2017 IEEE , (International Conference on Network and Information Systems for Computers (ICNISC 2
Towards One-Time Biometric-message Authentication Code in Cloud Computing 2018 Journal of Engineering and Applied Sciences 1
Boost Secure Sockets Layer against Man-in-the-Middle Sniffing Attack via SCPK 2019 International Conference on Advanced Science and Engineering (ICOASE), IEEE 1 download 15
Simulation and Design of Fuzzy Temperature Control for Heating and Cooling Water System 2011 International Journal of Advancements in Computing Technology 1
Comparison between ant colony and genetic algorithm using Traveling Salesman Problem 2013 International Journal of Soft Computing, Medwell 1
FINGERPRINT IMAGE ENHANCEMENT BY DEVELOP MEHTRE TECHNIQUE 2012 Advanced Computing: An International Journal ( ACIJ ) 1
Efficient and Secure Mutual Authentication Scheme in Cloud Computing 2013 International Journal of Engineering and Advanced Technology (IJEAT) 1
Secure Image Retrieval over Untrusted Cloud Servers 2013 International Journal of Engineering and Advanced Technology (IJEAT) 1
A LOGARITHM ENCRYPTION (EA-LOG) OF SYMMETRIC CRYPTOGRAPHY 2013 International Journal of Advances in Engineering & Technology 1
An Efficient and Robust One-TimeMessage Authentication CodeScheme Using Feature Extraction of Iris in Cloud Computing 2014 Proceedings of 2014 International Conference on Cloud Computing and Internet of Things (CCTOT 2014) 2
A Secured Scheme for Geographical Distance Computation over Encrypted Cloud Data 2015 2015 4th International Conference on Computer Science and Network Technology 2
Scheme for Ensuring Data Security on Cloud Data Storage in a Semi-trusted Third Party Auditor 2015 2015 4th International Conference on Computer Science and Network Technology (ICCSNT 2015) 2
New Data Integrity Scheme Employing Wavelet-Based Digital Watermarking in Cloud Environment 2019 2015 4th International Conference on Computer Science and Network Technology (ICCSNT 2015) 2 download 14
Robust Scheme to Protect Authentication Code of Message/Image Documents in Cloud Computing 2016 International Conference on Computing, Networking and Communications (ICNC 2016), IEEE 2
Robust Image Document Authentication Code with Autonomous Biometric Key Generation, Selection, and Updating in Cloud Environment 2016 The 11th International Conference on Information Assurance and Security (IAS), IEEE 2 download 9
Public Auditing for Secure Data Storage in Cloud through a Third Party Auditor Using Modern Ciphertext 2015 The 11th International Conference on Information Assurance and Security (IAS), IEEE 2
MACLESS Steganography using Double-stegging with Handwritten Signature in Cloud Computing 2016 2nd International Conference on Communication Systems and Computing Application Science, IEEE 2
Data Integrity Proof and Secure Computation Based on Feature Extraction of Iris in Cloud Storage 2016 2nd International Conference on Communication Systems and Computing Application Science, IEEE 2
Public Auditing for Secure Shared Data Storage in Cloud with Multi-User Modification 2016 2nd International Conference on Communication Systems and Computing Application Science, IEEE 2
Preventing ARP Cache Poisoning Attack by Improving ARP to Stateful 2016 2nd International Conference on Computational Intelligence, Communication and Signal, IEEE 2
Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment 2016 The 2nd IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2016) 2
An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage 2016 IEEE International Conference on Intelligent Data and Security (IEEE IDS 2016) 2
ARP enhancement to stateful protocol by register ARP request 2016 The 2nd Annual International Conference on Network and Information Systems for Computers (ICNISC2016) 2
Towards Secure Private Image Matching 2016 The 11th IEEE International Conference on Green, Pervasive and Cloud Computing (GPC-2016) 2
General domain ontology in enterprises software development 2017 In: Proceedings of the ICT conference and exhibition on information and communication technology, Basrah 2
DNS Protection Against Spoofing and Poisoning Attacks 2016 (In: Proceedings of the 3rd International Conference on Information Science and Control Engineering (ICISCE’16) 1
Secure and Efficient E-health Scheme Based on the Internet of Things 2016 In: Proceedings of the 6th International Conference on Signal Processing, Communications and Computing (ICSPCC’16) 2
Privacy-preserving Image Retrieval in IoT-Cloud 2017 In: Proceedings of the 15th International Conference on Trust, Security and Privacy in Computing and Communications 2
Secure Biometric Image Retrieval in IoT-Cloud 2016 (In: Proceedings of the 6th International Conference on Signal Processing, Communications and Computing (ICSPCC’16) 2
Ensuring Data Integrity Scheme Based on Digital Signature and Iris Features in Cloud 2016 Indonesian Journal of Electrical Engineering and Computer Science, Vol. 2, No. 2, May 2016 1
EEC–LEACH: Energy-Efficient Clustering Design for Reducing Power Consumption of LEACH Protocol 2017 6th International Conference on Communication,Electronics and Automation Engineering (ICCEAE 2017) 2
EEIRI: Efficient Encrypted Image Retrieval in IoT-Cloud 2019 .KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, Vol 13, No. 11, 2019. . 1 download 16
An effective image retrieval based on optimized genetic algorithm utilized a novel SVM‑based convolutional neural network classifier 2019 Human-centric Computing and Information Sciences, Springer, vol. 9, no. 31 (2019) 1 download 15
An Efficient and Secure Scheme for Dynamic Shared Data in Cloud 2019 The 3rd International Conference on Computer Science and Application Engineering (CSAE’19), ACM 2 download 2
Toward awareness locality algorithms of Peer-to-Peer file sharing network 2020 ”, In: Proceedings of the ACM 5th International Conference on Cloud Computing and Internet of Things (CCIOT 2020) 2
Greedy Learning of Deep Boltzmann Machine (GDBM)’s Variance and Search Algorithm for Efficient Image Retrieval 2019 IEEE Access 1 download 0
Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System 2020 IEEE ACCESS 1
Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud 2020 .In: Proceedings of the 10th International Conference on Signal Processing, Communications and Computing (ICSPCC’20), IEEE 2
A Lightweight Messaging Method for End to End Smart Device Communication in the Internet of Things Cloud 2021 China National Intellectural Property 6
Securing audio transmission based on encoding and steganography 2021 Indonesian Journal of Electrical Engineering and Computer Science 1 download 0
Secure Data of Industrial Internet of Things in a Cement Factory Based on a Blockchain Technology 2021 MDPI-Applied Sciences 1 download 0
Web application database protection from SQLIA using permutation encoding 2021 ACM 1
Towards Iris-Based Authentication for Smart Devices in the Cloud 2021 Springer 2
Lightweight Privacy-Preserving Similar Documents Retrieval over Encrypted Data 2021 IEEE 2 download 0
Lightweight, Secure, Similar-Document Retrieval over Encrypted Data 2021 MDPI-Applied Sciences 1
Towards Security and Privacy Preservation in 5G Networks 2021 IEEE 2
Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Mapping 2022 IEEE 1
Provably Secure Session Key Agreement Protocol for Unmanned Aerial Vehicles Packet Exchanges 2022 IEEE 2
Energy Efficient WSN Sink-Cloud Server Authentication Protocol 2022 Conference: 2021 5th International Conference on Information Systems and Computer Networks (ISCON) 2
Dynamic Ephemeral and Session Key Generation Protocol for Next Generation Smart Grids 2022 International Conference on Ad Hoc Networks International Conference on Testbeds and Research Infrastructures ADHOCNETS 2021 2
Anonymous Key Agreement and Mutual Authentication Protocol for Smart Grids 2022 ٍٍSpringer- EAI WiCON 2021 - 14th EAI International Wireless Internet Conference 2
Audio steganography with enhanced LSB method for securing encrypted text with bit cycling 2022 Institute of Advanced Engineering and Science (IAES) 1
Authentication and Key Agreement Protocol for Secure Traffic Signaling in 5G Networks 2022 IEEE 2
Efficient Extreme Gradient Boosting Based Algorithm for QoS Optimization in Inter-Radio Access Technology Handoffs 2022 IEEE International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) 2
Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things 2022 Springer-7th EAI International Conference on IoT as Service- IoTaaS 5
Verifiable Security and Privacy Provisioning Protocol for High Reliability in Smart Healthcare Communication Environment 2022 4th Global Power, Energy and Communication Conference (IEEE GPECOM2022), June 14-17, 2022, Cappadocia/Turkey 2 download 0
Temporary Symmetric Key Based Message Verification Protocol for Smart Energy Networks 2022 IEEE- 2022 7th IEEE International Energy Conference (ENERGYCON 2022) 2
Packet Replays Prevention Protocol for Secure B5G Networks 2022 Springer- Packet Replays Prevention Protocol for Secure B5G Networks 5
Biometric-Based Packet Validation Scheme for Body Area Network Smart Healthcare Devices 2022 2022 IEEE 21st Mediterranean Electrotechnical Conference (MELECON) 2
MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones 2022 FABULOUS 2022: Future Access Enablers for Ubiquitous and Intelligent Infrastructures , Springer 2 download 0
Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks 2022 Journal of Sensor and Actuator Networks 1
Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment 2022 Applied Cryptography in Computer and Communications Second EAI International Conference, AC3 2022, Springer 5
Fully automated model on breast cancer classification using deep learning classifiers 2022 Indonesian Journal of Electrical Engineering and Computer Science 1
A Lightweight Hybrid Scheme for Hiding Text Messages in Colour Images Using LSB, Lah Transform and Chaotic Techniques 2022 MDPI-Journal of Sensor and Actuator Networks 1
Provably throttling SQLI using an enciphering query and secure matching 2022 Elsevier 1 download 0
Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes 2022 MDPI-Applied Sciences 1 download 0
A Blockchain-Based Architecture for Securing Industrial IoTs Data in Electric Smart Grid 2022 Computers,Materials & Continua 1
Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT Systems 2023 MDPI-Applied Sciences 1
Identity authentication method, system and electronic device 2022 Chinese intellectual property 6 download 0
Low Bandwidth and Side-Channeling Resilient Algorithm for Pervasive Computing Systems 2022 ٍSpringer -Proceedings of International Conference on Communication and Computational Technologies 2
Optimized Hysteresis Region Authenticated Handover for 5G HetNets 2022 Artificial Intelligence and Sustainable Computing, Algorithms for Intelligent Systems, Springer 5
Forward and Backward Key Secrecy Preservation Scheme for Medical Internet of Things 2022 Human-Centric Smart Computing Proceedings of ICHCSC 2022-Springer 2
Transient Session Key Derivation Protocol for Key Escrow Prevention in Public Key Infrastructure 2023 International Conference on Internet of Everything-Springer 2
Provably secure and efficient audio compression based on compressive sensing 2023 International Journal of Electrical and Computer Engineering (IJECE) 1
Towards for Designing Educational System Using Role-Based Access Control 2022 International Journal of Intelligent Engineering & Systems 1
Investigating the relationship between knowledge management practices and organizational learning practices in the universities’ environment 2023 International Journal of Electrical and Computer Engineering (IJECE) 1
Concurrent pipeline rendering scheme based on GPU multi-queue and partitioning images 2023 Proceedings Volume 12634, International Conference on Optics and Machine Vision (ICOMV 2023) 2
SECURE AND LOW-COMPLEXITY MEDICAL IMAGE EXCHANGE BASED ON COMPRESSIVE SENSING AND LSB AUDIO STEGANOGRAPHY 2023 Informatica 1
Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture 2023 MDPI-Sustainability 1
Knowledge Management and its Role in the Development of a Smart University in Iraq 2023 TEM Journal 1
Role Based Access Control Using Biometric the in Educational System 2023 Journal of Basrah Researches (Sciences) 1
Improving the Performance of Searchable Symmetric Encryption by Optimizing Locality 2023 Journal of Basrah Researches (Sciences) 1
Multi-chain blockchain based secure data-sharing framework for industrial IoTs smart devices in petroleum industry 2023 Internet of Things- Elsevier 1
Two-Factor Privacy Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks 2024 IEEE Internet of Things Journal 1 download 0
Smart city energy efficient data privacy preservation protocol based on biometrics and fuzzy commitment scheme 2024 Nature- Scientific reports 1
Hiding scrambled text messages in speech signals using a lightweight hyperchaotic map and conditional LSB mechanism 2024 Public Library of Science-PLoS ONE 1 download 0
Vehicular ad hoc networks verification scheme based on bilinear pairings and networks reverse fuzzy extraction 2025 Scientific Reports 1 download 0
Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control 2024 MDPI-Journal of Sensor and Actuator Networks 1 download 0
Low-Complexity and Secure Clustering-Based Similarity Detection for Private Files 2024 TEM Journal 1 download 0
A provably lightweight and secure DSSE scheme, with a constant storage cost for a smart device client 2024 PLOS ONE 1
Blockchain-Based Authentication Schemes in Smart Environments: A Systematic Literature Review 2024 IEEE 1 download 0
Two-Factor Privacy-Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks 2024 IEEE INTERNET OF THINGS JOURNAL 1 download 0