Name : Zaid Ameen Abduljabbar

title : Assistant Professor

College : Education for Pure Sciences

Department : Computer Science

Email : zaid.ameen@uobasrah.edu.iq

Zaid Ameen Abduljabbar

Publications

Title of Search Type Publisher year Global Single Thompson Reuters
(Clarivate)
Scopes Download
Hiding scrambled text messages in speech signals using a lightweight hyperchaotic map and conditional LSB mechanism Journal Public Library of Science-PLoS ONE 2024 download
Smart city energy efficient data privacy preservation protocol based on biometrics and fuzzy commitment scheme Journal Nature- Scientific reports 2024
Multi-chain blockchain based secure data-sharing framework for industrial IoTs smart devices in petroleum industry Journal Internet of Things- Elsevier 2023
Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT Systems Journal MDPI-Applied Sciences 2023
Transient Session Key Derivation Protocol for Key Escrow Prevention in Public Key Infrastructure Conference International Conference on Internet of Everything-Springer 2023
Provably secure and efficient audio compression based on compressive sensing Journal International Journal of Electrical and Computer Engineering (IJECE) 2023
Investigating the relationship between knowledge management practices and organizational learning practices in the universities’ environment Journal International Journal of Electrical and Computer Engineering (IJECE) 2023
Concurrent pipeline rendering scheme based on GPU multi-queue and partitioning images Conference Proceedings Volume 12634, International Conference on Optics and Machine Vision (ICOMV 2023) 2023
SECURE AND LOW-COMPLEXITY MEDICAL IMAGE EXCHANGE BASED ON COMPRESSIVE SENSING AND LSB AUDIO STEGANOGRAPHY Journal Informatica 2023
Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture Journal MDPI-Sustainability 2023
Knowledge Management and its Role in the Development of a Smart University in Iraq Journal TEM Journal 2023
Role Based Access Control Using Biometric the in Educational System Journal Journal of Basrah Researches (Sciences) 2023
Improving the Performance of Searchable Symmetric Encryption by Optimizing Locality Journal Journal of Basrah Researches (Sciences) 2023
Two-Factor Privacy Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks Journal IEEE Internet of Things Journal 2023
Efficient Extreme Gradient Boosting Based Algorithm for QoS Optimization in Inter-Radio Access Technology Handoffs Conference IEEE International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) 2022
Packet Replays Prevention Protocol for Secure B5G Networks Chapter Springer- Packet Replays Prevention Protocol for Secure B5G Networks 2022
A Blockchain-Based Architecture for Securing Industrial IoTs Data in Electric Smart Grid Journal Computers,Materials & Continua 2022
Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment Chapter Applied Cryptography in Computer and Communications Second EAI International Conference, AC3 2022, Springer 2022
Fully automated model on breast cancer classification using deep learning classifiers Journal Indonesian Journal of Electrical Engineering and Computer Science 2022
Audio steganography with enhanced LSB method for securing encrypted text with bit cycling Journal Institute of Advanced Engineering and Science (IAES) 2022
Identity authentication method, system and electronic device Patented Chinese intellectual property 2022 download
Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes Journal MDPI-Applied Sciences 2022 download
Dynamic Ephemeral and Session Key Generation Protocol for Next Generation Smart Grids Conference International Conference on Ad Hoc Networks International Conference on Testbeds and Research Infrastructures ADHOCNETS 2021 2022
MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones Chapter FABULOUS 2022: Future Access Enablers for Ubiquitous and Intelligent Infrastructures , Springer 2022
Biometric-Based Packet Validation Scheme for Body Area Network Smart Healthcare Devices Conference 2022 IEEE 21st Mediterranean Electrotechnical Conference (MELECON) 2022
Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things Chapter Springer-7th EAI International Conference on IoT as Service- IoTaaS 2022
Anonymous Key Agreement and Mutual Authentication Protocol for Smart Grids Conference ٍٍSpringer- EAI WiCON 2021 - 14th EAI International Wireless Internet Conference 2022
Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks Journal Journal of Sensor and Actuator Networks 2022
Verifiable Security and Privacy Provisioning Protocol for High Reliability in Smart Healthcare Communication Environment Conference 4th Global Power, Energy and Communication Conference (IEEE GPECOM2022), June 14-17, 2022, Cappadocia/Turkey 2022
Provably throttling SQLI using an enciphering query and secure matching Journal Elsevier 2022 download
A Lightweight Hybrid Scheme for Hiding Text Messages in Colour Images Using LSB, Lah Transform and Chaotic Techniques Journal MDPI-Journal of Sensor and Actuator Networks 2022
Low Bandwidth and Side-Channeling Resilient Algorithm for Pervasive Computing Systems Conference ٍSpringer -Proceedings of International Conference on Communication and Computational Technologies 2022
Optimized Hysteresis Region Authenticated Handover for 5G HetNets Chapter Artificial Intelligence and Sustainable Computing, Algorithms for Intelligent Systems, Springer 2022
Forward and Backward Key Secrecy Preservation Scheme for Medical Internet of Things Conference Human-Centric Smart Computing Proceedings of ICHCSC 2022-Springer 2022
Towards for Designing Educational System Using Role-Based Access Control Journal International Journal of Intelligent Engineering & Systems 2022
Authentication and Key Agreement Protocol for Secure Traffic Signaling in 5G Networks Conference IEEE 2022
Temporary Symmetric Key Based Message Verification Protocol for Smart Energy Networks Conference IEEE- 2022 7th IEEE International Energy Conference (ENERGYCON 2022) 2022
Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Mapping Journal IEEE 2022
Provably Secure Session Key Agreement Protocol for Unmanned Aerial Vehicles Packet Exchanges Conference IEEE 2022
Energy Efficient WSN Sink-Cloud Server Authentication Protocol Conference Conference: 2021 5th International Conference on Information Systems and Computer Networks (ISCON) 2022
Towards Iris-Based Authentication for Smart Devices in the Cloud Conference Springer 2021
Lightweight Privacy-Preserving Similar Documents Retrieval over Encrypted Data Conference IEEE 2021
Lightweight, Secure, Similar-Document Retrieval over Encrypted Data Journal MDPI-Applied Sciences 2021
Towards Security and Privacy Preservation in 5G Networks Conference IEEE 2021
Securing audio transmission based on encoding and steganography Journal Indonesian Journal of Electrical Engineering and Computer Science 2021 download
Secure Data of Industrial Internet of Things in a Cement Factory Based on a Blockchain Technology Journal MDPI-Applied Sciences 2021 download
Web application database protection from SQLIA using permutation encoding Journal ACM 2021
A Lightweight Messaging Method for End to End Smart Device Communication in the Internet of Things Cloud Patented China National Intellectural Property 2021
Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System Journal IEEE ACCESS 2020
Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud Conference .In: Proceedings of the 10th International Conference on Signal Processing, Communications and Computing (ICSPCC’20), IEEE 2020
Toward awareness locality algorithms of Peer-to-Peer file sharing network Conference ”, In: Proceedings of the ACM 5th International Conference on Cloud Computing and Internet of Things (CCIOT 2020) 2020
An Efficient and Secure Scheme for Dynamic Shared Data in Cloud Conference The 3rd International Conference on Computer Science and Application Engineering (CSAE’19), ACM 2019 download
Greedy Learning of Deep Boltzmann Machine (GDBM)’s Variance and Search Algorithm for Efficient Image Retrieval Journal IEEE Access 2019
Boost Secure Sockets Layer against Man-in-the-Middle Sniffing Attack via SCPK Journal International Conference on Advanced Science and Engineering (ICOASE), IEEE 2019 download
New Data Integrity Scheme Employing Wavelet-Based Digital Watermarking in Cloud Environment Conference 2015 4th International Conference on Computer Science and Network Technology (ICCSNT 2015) 2019 download
EEIRI: Efficient Encrypted Image Retrieval in IoT-Cloud Journal .KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, Vol 13, No. 11, 2019. . 2019 download
An effective image retrieval based on optimized genetic algorithm utilized a novel SVM‑based convolutional neural network classifier Journal Human-centric Computing and Information Sciences, Springer, vol. 9, no. 31 (2019) 2019 download
Towards One-Time Biometric-message Authentication Code in Cloud Computing Journal Journal of Engineering and Applied Sciences 2018
A Lightweight Scheme to Authenticate and Secure the Communication in Smart Grids Journal MDPI, Applied Sciences 2018 download
Toward for Strong Authentication Code In Cloud of Internet of Things Based on DWT And Steganography Journal Journal Of Theoretical And Applied Information Technology 2018
Efficient encrypted image retrieval in IoT-cloud with multi-user Authentication Journal SAGE, International Journal of Distributed Sensor Networks 2018
Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing Journal Security and Communication Networks 2017
LEACH-T: LEACH Clustering Protocol Based on Three Layers Conference IEEE , (International Conference on Network and Information Systems for Computers (ICNISC 2017
General domain ontology in enterprises software development Conference In: Proceedings of the ICT conference and exhibition on information and communication technology, Basrah 2017
Privacy-preserving Image Retrieval in IoT-Cloud Conference In: Proceedings of the 15th International Conference on Trust, Security and Privacy in Computing and Communications 2017
EEC–LEACH: Energy-Efficient Clustering Design for Reducing Power Consumption of LEACH Protocol Conference 6th International Conference on Communication,Electronics and Automation Engineering (ICCEAE 2017) 2017
SEPIM: Secure and Efficient Private Image Matching Journal Journal of Applied Sciences 2016
Robust Scheme to Protect Authentication Code of Message/Image Documents in Cloud Computing Conference International Conference on Computing, Networking and Communications (ICNC 2016), IEEE 2016
MACLESS Steganography using Double-stegging with Handwritten Signature in Cloud Computing Conference 2nd International Conference on Communication Systems and Computing Application Science, IEEE 2016
Data Integrity Proof and Secure Computation Based on Feature Extraction of Iris in Cloud Storage Conference 2nd International Conference on Communication Systems and Computing Application Science, IEEE 2016
Public Auditing for Secure Shared Data Storage in Cloud with Multi-User Modification Conference 2nd International Conference on Communication Systems and Computing Application Science, IEEE 2016
Preventing ARP Cache Poisoning Attack by Improving ARP to Stateful Conference 2nd International Conference on Computational Intelligence, Communication and Signal, IEEE 2016
Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment Conference The 2nd IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2016) 2016
An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage Conference IEEE International Conference on Intelligent Data and Security (IEEE IDS 2016) 2016
ARP enhancement to stateful protocol by register ARP request Conference The 2nd Annual International Conference on Network and Information Systems for Computers (ICNISC2016) 2016
Towards Secure Private Image Matching Conference The 11th IEEE International Conference on Green, Pervasive and Cloud Computing (GPC-2016) 2016
DNS Protection Against Spoofing and Poisoning Attacks Journal (In: Proceedings of the 3rd International Conference on Information Science and Control Engineering (ICISCE’16) 2016
Secure and Efficient E-health Scheme Based on the Internet of Things Conference In: Proceedings of the 6th International Conference on Signal Processing, Communications and Computing (ICSPCC’16) 2016
Secure Biometric Image Retrieval in IoT-Cloud Conference (In: Proceedings of the 6th International Conference on Signal Processing, Communications and Computing (ICSPCC’16) 2016
Ensuring Data Integrity Scheme Based on Digital Signature and Iris Features in Cloud Journal Indonesian Journal of Electrical Engineering and Computer Science, Vol. 2, No. 2, May 2016 2016
A Secured Scheme for Geographical Distance Computation over Encrypted Cloud Data Conference 2015 4th International Conference on Computer Science and Network Technology 2015
Scheme for Ensuring Data Security on Cloud Data Storage in a Semi-trusted Third Party Auditor Conference 2015 4th International Conference on Computer Science and Network Technology (ICCSNT 2015) 2015
Robust Image Document Authentication Code with Autonomous Biometric Key Generation, Selection, and Updating in Cloud Environment Journal The 11th International Conference on Information Assurance and Security (IAS), IEEE 2015
Public Auditing for Secure Data Storage in Cloud through a Third Party Auditor Using Modern Ciphertext Conference The 11th International Conference on Information Assurance and Security (IAS), IEEE 2015
An Efficient and Robust One-TimeMessage Authentication CodeScheme Using Feature Extraction of Iris in Cloud Computing Conference Proceedings of 2014 International Conference on Cloud Computing and Internet of Things (CCTOT 2014) 2014
Comparison between ant colony and genetic algorithm using Traveling Salesman Problem Journal International Journal of Soft Computing, Medwell 2013
Efficient and Secure Mutual Authentication Scheme in Cloud Computing Journal International Journal of Engineering and Advanced Technology (IJEAT) 2013
Secure Image Retrieval over Untrusted Cloud Servers Journal International Journal of Engineering and Advanced Technology (IJEAT) 2013
A LOGARITHM ENCRYPTION (EA-LOG) OF SYMMETRIC CRYPTOGRAPHY Journal International Journal of Advances in Engineering & Technology 2013
FINGERPRINT IMAGE ENHANCEMENT BY DEVELOP MEHTRE TECHNIQUE Journal Advanced Computing: An International Journal ( ACIJ ) 2012
Simulation and Design of Fuzzy Temperature Control for Heating and Cooling Water System Journal International Journal of Advancements in Computing Technology 2011