title : Assistant Professor
College : Education for Pure Sciences
Department : Computer Science
Email : zaid.ameen@uobasrah.edu.iq
Title of Search | Type | Publisher | year | Global | Single | Thompson Reuters (Clarivate) th> | Scopes | Download |
---|---|---|---|---|---|---|---|---|
Smart city energy efficient data privacy preservation protocol based on biometrics and fuzzy commitment scheme | Journal | Nature- Scientific reports | 2024 | |||||
Multi-chain blockchain based secure data-sharing framework for industrial IoTs smart devices in petroleum industry | Journal | Internet of Things- Elsevier | 2023 | |||||
Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT Systems | Journal | MDPI-Applied Sciences | 2023 | |||||
Transient Session Key Derivation Protocol for Key Escrow Prevention in Public Key Infrastructure | Conference | International Conference on Internet of Everything-Springer | 2023 | |||||
Provably secure and efficient audio compression based on compressive sensing | Journal | International Journal of Electrical and Computer Engineering (IJECE) | 2023 | |||||
Investigating the relationship between knowledge management practices and organizational learning practices in the universities’ environment | Journal | International Journal of Electrical and Computer Engineering (IJECE) | 2023 | |||||
Concurrent pipeline rendering scheme based on GPU multi-queue and partitioning images | Conference | Proceedings Volume 12634, International Conference on Optics and Machine Vision (ICOMV 2023) | 2023 | |||||
SECURE AND LOW-COMPLEXITY MEDICAL IMAGE EXCHANGE BASED ON COMPRESSIVE SENSING AND LSB AUDIO STEGANOGRAPHY | Journal | Informatica | 2023 | |||||
Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture | Journal | MDPI-Sustainability | 2023 | |||||
Knowledge Management and its Role in the Development of a Smart University in Iraq | Journal | TEM Journal | 2023 | |||||
Role Based Access Control Using Biometric the in Educational System | Journal | Journal of Basrah Researches (Sciences) | 2023 | |||||
Improving the Performance of Searchable Symmetric Encryption by Optimizing Locality | Journal | Journal of Basrah Researches (Sciences) | 2023 | |||||
Two-Factor Privacy Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks | Journal | IEEE Internet of Things Journal | 2023 | |||||
Efficient Extreme Gradient Boosting Based Algorithm for QoS Optimization in Inter-Radio Access Technology Handoffs | Conference | IEEE International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) | 2022 | |||||
Packet Replays Prevention Protocol for Secure B5G Networks | Chapter | Springer- Packet Replays Prevention Protocol for Secure B5G Networks | 2022 | |||||
A Blockchain-Based Architecture for Securing Industrial IoTs Data in Electric Smart Grid | Journal | Computers,Materials & Continua | 2022 | |||||
Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment | Chapter | Applied Cryptography in Computer and Communications Second EAI International Conference, AC3 2022, Springer | 2022 | |||||
Fully automated model on breast cancer classification using deep learning classifiers | Journal | Indonesian Journal of Electrical Engineering and Computer Science | 2022 | |||||
Audio steganography with enhanced LSB method for securing encrypted text with bit cycling | Journal | Institute of Advanced Engineering and Science (IAES) | 2022 | |||||
Identity authentication method, system and electronic device | Patented | Chinese intellectual property | 2022 | |||||
Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes | Journal | MDPI-Applied Sciences | 2022 | |||||
Dynamic Ephemeral and Session Key Generation Protocol for Next Generation Smart Grids | Conference | International Conference on Ad Hoc Networks International Conference on Testbeds and Research Infrastructures ADHOCNETS 2021 | 2022 | |||||
MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones | Chapter | FABULOUS 2022: Future Access Enablers for Ubiquitous and Intelligent Infrastructures , Springer | 2022 | |||||
Biometric-Based Packet Validation Scheme for Body Area Network Smart Healthcare Devices | Conference | 2022 IEEE 21st Mediterranean Electrotechnical Conference (MELECON) | 2022 | |||||
Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things | Chapter | Springer-7th EAI International Conference on IoT as Service- IoTaaS | 2022 | |||||
Anonymous Key Agreement and Mutual Authentication Protocol for Smart Grids | Conference | ٍٍSpringer- EAI WiCON 2021 - 14th EAI International Wireless Internet Conference | 2022 | |||||
Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks | Journal | Journal of Sensor and Actuator Networks | 2022 | |||||
Verifiable Security and Privacy Provisioning Protocol for High Reliability in Smart Healthcare Communication Environment | Conference | 4th Global Power, Energy and Communication Conference (IEEE GPECOM2022), June 14-17, 2022, Cappadocia/Turkey | 2022 | |||||
Provably throttling SQLI using an enciphering query and secure matching | Journal | Elsevier | 2022 | |||||
A Lightweight Hybrid Scheme for Hiding Text Messages in Colour Images Using LSB, Lah Transform and Chaotic Techniques | Journal | MDPI-Journal of Sensor and Actuator Networks | 2022 | |||||
Low Bandwidth and Side-Channeling Resilient Algorithm for Pervasive Computing Systems | Conference | ٍSpringer -Proceedings of International Conference on Communication and Computational Technologies | 2022 | |||||
Optimized Hysteresis Region Authenticated Handover for 5G HetNets | Chapter | Artificial Intelligence and Sustainable Computing, Algorithms for Intelligent Systems, Springer | 2022 | |||||
Forward and Backward Key Secrecy Preservation Scheme for Medical Internet of Things | Conference | Human-Centric Smart Computing Proceedings of ICHCSC 2022-Springer | 2022 | |||||
Towards for Designing Educational System Using Role-Based Access Control | Journal | International Journal of Intelligent Engineering & Systems | 2022 | |||||
Authentication and Key Agreement Protocol for Secure Traffic Signaling in 5G Networks | Conference | IEEE | 2022 | |||||
Temporary Symmetric Key Based Message Verification Protocol for Smart Energy Networks | Conference | IEEE- 2022 7th IEEE International Energy Conference (ENERGYCON 2022) | 2022 | |||||
Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Mapping | Journal | IEEE | 2022 | |||||
Provably Secure Session Key Agreement Protocol for Unmanned Aerial Vehicles Packet Exchanges | Conference | IEEE | 2022 | |||||
Energy Efficient WSN Sink-Cloud Server Authentication Protocol | Conference | Conference: 2021 5th International Conference on Information Systems and Computer Networks (ISCON) | 2022 | |||||
Towards Iris-Based Authentication for Smart Devices in the Cloud | Conference | Springer | 2021 | |||||
Lightweight Privacy-Preserving Similar Documents Retrieval over Encrypted Data | Conference | IEEE | 2021 | |||||
Lightweight, Secure, Similar-Document Retrieval over Encrypted Data | Journal | MDPI-Applied Sciences | 2021 | |||||
Towards Security and Privacy Preservation in 5G Networks | Conference | IEEE | 2021 | |||||
Securing audio transmission based on encoding and steganography | Journal | Indonesian Journal of Electrical Engineering and Computer Science | 2021 | |||||
Secure Data of Industrial Internet of Things in a Cement Factory Based on a Blockchain Technology | Journal | MDPI-Applied Sciences | 2021 | |||||
Web application database protection from SQLIA using permutation encoding | Journal | ACM | 2021 | |||||
A Lightweight Messaging Method for End to End Smart Device Communication in the Internet of Things Cloud | Patented | China National Intellectural Property | 2021 | |||||
Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System | Journal | IEEE ACCESS | 2020 | |||||
Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud | Conference | .In: Proceedings of the 10th International Conference on Signal Processing, Communications and Computing (ICSPCC’20), IEEE | 2020 | |||||
Toward awareness locality algorithms of Peer-to-Peer file sharing network | Conference | ”, In: Proceedings of the ACM 5th International Conference on Cloud Computing and Internet of Things (CCIOT 2020) | 2020 | |||||
An Efficient and Secure Scheme for Dynamic Shared Data in Cloud | Conference | The 3rd International Conference on Computer Science and Application Engineering (CSAE’19), ACM | 2019 | |||||
Greedy Learning of Deep Boltzmann Machine (GDBM)’s Variance and Search Algorithm for Efficient Image Retrieval | Journal | IEEE Access | 2019 | |||||
Boost Secure Sockets Layer against Man-in-the-Middle Sniffing Attack via SCPK | Journal | International Conference on Advanced Science and Engineering (ICOASE), IEEE | 2019 | |||||
New Data Integrity Scheme Employing Wavelet-Based Digital Watermarking in Cloud Environment | Conference | 2015 4th International Conference on Computer Science and Network Technology (ICCSNT 2015) | 2019 | |||||
EEIRI: Efficient Encrypted Image Retrieval in IoT-Cloud | Journal | .KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, Vol 13, No. 11, 2019. . | 2019 | |||||
An effective image retrieval based on optimized genetic algorithm utilized a novel SVM‑based convolutional neural network classifier | Journal | Human-centric Computing and Information Sciences, Springer, vol. 9, no. 31 (2019) | 2019 | |||||
Towards One-Time Biometric-message Authentication Code in Cloud Computing | Journal | Journal of Engineering and Applied Sciences | 2018 | |||||
A Lightweight Scheme to Authenticate and Secure the Communication in Smart Grids | Journal | MDPI, Applied Sciences | 2018 | |||||
Toward for Strong Authentication Code In Cloud of Internet of Things Based on DWT And Steganography | Journal | Journal Of Theoretical And Applied Information Technology | 2018 | |||||
Efficient encrypted image retrieval in IoT-cloud with multi-user Authentication | Journal | SAGE, International Journal of Distributed Sensor Networks | 2018 | |||||
Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing | Journal | Security and Communication Networks | 2017 | |||||
LEACH-T: LEACH Clustering Protocol Based on Three Layers | Conference | IEEE , (International Conference on Network and Information Systems for Computers (ICNISC | 2017 | |||||
General domain ontology in enterprises software development | Conference | In: Proceedings of the ICT conference and exhibition on information and communication technology, Basrah | 2017 | |||||
Privacy-preserving Image Retrieval in IoT-Cloud | Conference | In: Proceedings of the 15th International Conference on Trust, Security and Privacy in Computing and Communications | 2017 | |||||
EEC–LEACH: Energy-Efficient Clustering Design for Reducing Power Consumption of LEACH Protocol | Conference | 6th International Conference on Communication,Electronics and Automation Engineering (ICCEAE 2017) | 2017 | |||||
SEPIM: Secure and Efficient Private Image Matching | Journal | Journal of Applied Sciences | 2016 | |||||
Robust Scheme to Protect Authentication Code of Message/Image Documents in Cloud Computing | Conference | International Conference on Computing, Networking and Communications (ICNC 2016), IEEE | 2016 | |||||
MACLESS Steganography using Double-stegging with Handwritten Signature in Cloud Computing | Conference | 2nd International Conference on Communication Systems and Computing Application Science, IEEE | 2016 | |||||
Data Integrity Proof and Secure Computation Based on Feature Extraction of Iris in Cloud Storage | Conference | 2nd International Conference on Communication Systems and Computing Application Science, IEEE | 2016 | |||||
Public Auditing for Secure Shared Data Storage in Cloud with Multi-User Modification | Conference | 2nd International Conference on Communication Systems and Computing Application Science, IEEE | 2016 | |||||
Preventing ARP Cache Poisoning Attack by Improving ARP to Stateful | Conference | 2nd International Conference on Computational Intelligence, Communication and Signal, IEEE | 2016 | |||||
Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment | Conference | The 2nd IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2016) | 2016 | |||||
An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage | Conference | IEEE International Conference on Intelligent Data and Security (IEEE IDS 2016) | 2016 | |||||
ARP enhancement to stateful protocol by register ARP request | Conference | The 2nd Annual International Conference on Network and Information Systems for Computers (ICNISC2016) | 2016 | |||||
Towards Secure Private Image Matching | Conference | The 11th IEEE International Conference on Green, Pervasive and Cloud Computing (GPC-2016) | 2016 | |||||
DNS Protection Against Spoofing and Poisoning Attacks | Journal | (In: Proceedings of the 3rd International Conference on Information Science and Control Engineering (ICISCE’16) | 2016 | |||||
Secure and Efficient E-health Scheme Based on the Internet of Things | Conference | In: Proceedings of the 6th International Conference on Signal Processing, Communications and Computing (ICSPCC’16) | 2016 | |||||
Secure Biometric Image Retrieval in IoT-Cloud | Conference | (In: Proceedings of the 6th International Conference on Signal Processing, Communications and Computing (ICSPCC’16) | 2016 | |||||
Ensuring Data Integrity Scheme Based on Digital Signature and Iris Features in Cloud | Journal | Indonesian Journal of Electrical Engineering and Computer Science, Vol. 2, No. 2, May 2016 | 2016 | |||||
A Secured Scheme for Geographical Distance Computation over Encrypted Cloud Data | Conference | 2015 4th International Conference on Computer Science and Network Technology | 2015 | |||||
Scheme for Ensuring Data Security on Cloud Data Storage in a Semi-trusted Third Party Auditor | Conference | 2015 4th International Conference on Computer Science and Network Technology (ICCSNT 2015) | 2015 | |||||
Robust Image Document Authentication Code with Autonomous Biometric Key Generation, Selection, and Updating in Cloud Environment | Journal | The 11th International Conference on Information Assurance and Security (IAS), IEEE | 2015 | |||||
Public Auditing for Secure Data Storage in Cloud through a Third Party Auditor Using Modern Ciphertext | Conference | The 11th International Conference on Information Assurance and Security (IAS), IEEE | 2015 | |||||
An Efficient and Robust One-TimeMessage Authentication CodeScheme Using Feature Extraction of Iris in Cloud Computing | Conference | Proceedings of 2014 International Conference on Cloud Computing and Internet of Things (CCTOT 2014) | 2014 | |||||
Comparison between ant colony and genetic algorithm using Traveling Salesman Problem | Journal | International Journal of Soft Computing, Medwell | 2013 | |||||
Efficient and Secure Mutual Authentication Scheme in Cloud Computing | Journal | International Journal of Engineering and Advanced Technology (IJEAT) | 2013 | |||||
Secure Image Retrieval over Untrusted Cloud Servers | Journal | International Journal of Engineering and Advanced Technology (IJEAT) | 2013 | |||||
A LOGARITHM ENCRYPTION (EA-LOG) OF SYMMETRIC CRYPTOGRAPHY | Journal | International Journal of Advances in Engineering & Technology | 2013 | |||||
FINGERPRINT IMAGE ENHANCEMENT BY DEVELOP MEHTRE TECHNIQUE | Journal | Advanced Computing: An International Journal ( ACIJ ) | 2012 | |||||
Simulation and Design of Fuzzy Temperature Control for Heating and Cooling Water System | Journal | International Journal of Advancements in Computing Technology | 2011 |