Name : Mohammed Abdulridha Hussain

title : Assistant Professor

College : Education for Pure Sciences

Department : Computer Science

Email : mohammed.abdulridha@uobasrah.edu.iq

Mohammed Abdulridha Hussain

Publications

Title of Search Type Publisher year Global Single Thompson Reuters
(Clarivate)
Scopes Download
Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT Systems Journal Applied Sciences 2023 download
Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture Journal Sustainability 2023 download
Provably throttling SQLI using an enciphering query and secure matching Journal Egyptian Informatics Journal 2022 download
Forward and Backward Key Secrecy Preservation Scheme for Medical Internet of Things Conference Human-Centric Smart Computing, Smart Innovation, Systems and Technologies 2022 download
Defending a wireless LAN against ARP spoofing attacks using a Raspberry Pi Journal Journal of Basrah Researches (Sciences) 2022 download
Provably curb man-in-the-middle attack-based ARP spoofing in a local network Journal Bulletin of Electrical Engineering and Informatics 2022 download
Web application database protection from SQLIA using permutation encoding Conference 2021 The 4th International Conference on Information Science and Systems, Edinburgh, United Kingdom, ACM 2021 download
Securing audio transmission based on encoding and steganography Journal Indonesian Journal of Electrical Engineering and Computer Science, vol. 22, no. 3 2021 download
Provably Secure Session Key Agreement Protocol for Unmanned Aerial Vehicles Packet Exchanges Conference International Conference on Electrical, Computer and Energy Technologies (ICECET) 2021 download
Promising bio-authentication scheme to protect documents for E2E S2S in IoT-cloud Conference 2020 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Macau, China, IEEE 2020 download
Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System Journal IEEE Access 2020 download
تَبنّي الإنترانيت في التعليم الالكتروني بديلا عن الانترنت لتحسين جودة الخدمة Conference جامعة البصرة 2020 download
Encoding Query Based Lightweight Algorithm for Preventing SQL Injection Attack Journal مجلة ابحاث البصرة- العلميات 2020 download
An Efficient and Secure Scheme for Dynamic Shared Data in Cloud Conference Proceedings of the 3rd International Conference on Computer Science and Application Engineering (CSAE 2019), Sanya, China 2019 download
EEIRI: Efficient Encrypted Image Retrieval in IoT-Cloud. Journal KSII Transactions on Internet & Information Systems 2019 download
Boost Secure Sockets Layer against Man-in-the-Middle Sniffing Attack via SCPK Conference International Conference on Advanced Science and Engineering 2018 (ICOASE2018), Kurdistan Region, Iraq, IEEE 2018 download
Efficient Encryption Image Retrieval in IOT-Cloud with Multi-User Authentication Journal International Journal of Distributed Sensor Network 2018 download
Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing Journal Security and Communication Networks, Hindawi 2017 download
The best performance evaluation of encryption algorithms to reduce power consumption in WSN Conference The 2017 International Conference on computing intelligence and information system, Nanjing, China, IEEE Press 2017 download
ARP Enhancement to Stateful Protocol by Registering ARP Request Conference the 2016 IEEE International Conference on Network and Information Systems for Computers, Wuhan, China, IEEE 2016 download
DNS Protection against Spoofing and Poisoning Attacks Conference The 3rd International Conference on Information Science and Control Engineering (ICISCE’16), Beijing, China, IEEE 2016 download
Ensuring Data Integrity Scheme Based on Digital Signature and Iris Features in Cloud Journal Indonesian Journal of Electrical Engineering and Computer Science 2016 download
Robust Scheme to Protect Authentication Code of Message/Image Documents in Cloud Computing Conference The IEEE 2016 International Conference on Computing, Networking and Communications (ICNC’16), USA, IEEE. 2016 download
Preventing ARP Cache Poisoning Attack by Improving ARP to Stateful Conference The IEEE 2nd International Conference on Computational Intelligence, Communication and Signal Processing (CICSP’16), Jeju Island, South Korea, IEEE. 2016
MACLESS Steganography using Double-stegging with Handwritten Signature in Cloud Computing Conference The IEEE 2th International Conference on Communication Systems and Computing Application Science (2nd CSCAS 2016). Jeju Island, South Korea, IEEE. 2016
Data Integrity Proof and Secure Computation Based on Feature Extraction of Iris in Cloud Storage Conference The IEEE 2th International Conference on Communication Systems and Computing Application Science (2nd CSCAS 2016). Jeju Island, South Korea, IEEE 2016
Public Auditing for Secure Shared Data Storage in Cloud with Multi-User Modification Conference The IEEE 2th International Conference on Communication Systems and Computing Application Science (2nd CSCAS 2016). Jeju Island, South Korea, IEEE. 2016
Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment Conference The IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity’16), USA, IEEE 2016 download
An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage Conference The IEEE International Conference on (IDS’2016). New York, USA, IEEE 2016 download
LEACH-T: LEACH Clustering Protocol Based on Three Layers Conference the 2016 IEEE International Conference on Network and Information Systems for Computers, Wuhan, China, IEEE 2016 download
Towards Secure Private Image Matching Conference The 11th International Conference on Green, Pervasive, and Cloud Computing (GPC’16), Xi’an, China, Springer. 2016 download
SEPIM: Secure and Efficient Private Image Matching Journal Applied Sciences, mdpi. (SCI, ISI, IF: 1.726) 2016 download
Secure Biometric Image Retrieval in IoT-Cloud Conference The 6th International Conference on Signal Processing, Communications and Computing (ICSPCC’16), Hong Kong, IEEE Press 2016 download
Privacy-preserving Image Retrieval in IoT-Cloud Conference The 15th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’16), Tianjin, China, IEEE Press. (CCF). 2016 download
Secure and Efficient E-health Scheme Based on the Internet of Things Conference the 6th International Conference on Signal Processing, Communications and Computing (ICSPCC’16), Hong Kong, China, IEEE Press. 2016 download
A Secured Scheme for Geographical Distance Computation over Encrypted Cloud Data Conference the 4th International Conference on Computer Science and Network Technology (ICCSNT’15), Harbin, China, IEEE Press. 2015
Robust Image Document Authentication Code with Autonomous Biometric Key Generation, Selection, and Updating in Cloud Environment Conference The IEEE 11th International Conference on Information Assurance and Security (IAS’15), 2015. Morocco, IEEE. 2015
New Data Integrity Scheme Employing Wavelet-Based Digital Watermarking in Cloud Environment Conference The IEEE 4th International Conference on Computer Science and Network Technology (ICCSNT). Harbin, Chins, IEEE. 2015
Public Auditing for Secure Data Storage in Cloud through a Third Party Auditor Using Modern Ciphertext Conference The IEEE 11th International Conference on Information Assurance and Security (IAS’15 ), 2015. Morocco, IEEE 2015
Scheme for Ensuring Data Security on Cloud Data Storage in a Semi-trusted Third Party Auditor Conference The IEEE 4th International Conference on Computer Science and Network Technology (ICCSNT). Harbin, Chins, IEEE. 2015
A Logarithm Encryption (EA-LOG) of Symmetric Cryptography Journal International Journal of Advances in Engineering & Technology (IJAET) 2013
Text – to – Image Encrypted Transformation (TIET) Journal International Journal of Computer Science and Engineering (IJCSE) 2013 download
Comparative Study of Scheduling Algorithms in WIMAX Conference National conference on Recent Developments in Computing and Its Applications, NCRDCA ’09, Delhi, India. 2009