العنوان : استاذ مساعد
الكلية : التربية للعلوم الصرفة
القسم : الحاسبات
البريد الالكتروني : zaid.ameen@uobasrah.edu.iq
رابط Google Scholar: | https://scholar.google.com/citations?user=3tZ8HEkAAAAJ&hl=en |
---|---|
رابط Research Gate : | https://www.researchgate.net/scientific-contributions/2035441036_Zaid_Ameen_Abduljabbar |
رابط Web of Science : | https://publons.com/researcher/3077102/zaid-ameen-abduljabbar/ |
رابط Scopus : | https://www.scopus.com/authid/detail.uri?authorId=55968399000 |
رابط ORCID : | https://orcid.org/0000-0002-8239-1409 |
عنوان البحث | النوع | الناشر | السنة | عالمي | مفرد | ثومبسون رويتر (كلارفيت) |
سكوبس | تحميل |
---|---|---|---|---|---|---|---|---|
Smart city energy efficient data privacy preservation protocol based on biometrics and fuzzy commitment scheme | بحث مجلة | Nature- Scientific reports | 2024 | |||||
Multi-chain blockchain based secure data-sharing framework for industrial IoTs smart devices in petroleum industry | بحث مجلة | Internet of Things- Elsevier | 2023 | |||||
Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT Systems | بحث مجلة | MDPI-Applied Sciences | 2023 | |||||
Transient Session Key Derivation Protocol for Key Escrow Prevention in Public Key Infrastructure | بحث مؤتمر | International Conference on Internet of Everything-Springer | 2023 | |||||
Provably secure and efficient audio compression based on compressive sensing | بحث مجلة | International Journal of Electrical and Computer Engineering (IJECE) | 2023 | |||||
Investigating the relationship between knowledge management practices and organizational learning practices in the universities’ environment | بحث مجلة | International Journal of Electrical and Computer Engineering (IJECE) | 2023 | |||||
Concurrent pipeline rendering scheme based on GPU multi-queue and partitioning images | بحث مؤتمر | Proceedings Volume 12634, International Conference on Optics and Machine Vision (ICOMV 2023) | 2023 | |||||
SECURE AND LOW-COMPLEXITY MEDICAL IMAGE EXCHANGE BASED ON COMPRESSIVE SENSING AND LSB AUDIO STEGANOGRAPHY | بحث مجلة | Informatica | 2023 | |||||
Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture | بحث مجلة | MDPI-Sustainability | 2023 | |||||
Knowledge Management and its Role in the Development of a Smart University in Iraq | بحث مجلة | TEM Journal | 2023 | |||||
Role Based Access Control Using Biometric the in Educational System | بحث مجلة | Journal of Basrah Researches (Sciences) | 2023 | |||||
Improving the Performance of Searchable Symmetric Encryption by Optimizing Locality | بحث مجلة | Journal of Basrah Researches (Sciences) | 2023 | |||||
Two-Factor Privacy Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks | بحث مجلة | IEEE Internet of Things Journal | 2023 | |||||
Efficient Extreme Gradient Boosting Based Algorithm for QoS Optimization in Inter-Radio Access Technology Handoffs | بحث مؤتمر | IEEE International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) | 2022 | |||||
Packet Replays Prevention Protocol for Secure B5G Networks | فصل من كتاب | Springer- Packet Replays Prevention Protocol for Secure B5G Networks | 2022 | |||||
A Blockchain-Based Architecture for Securing Industrial IoTs Data in Electric Smart Grid | بحث مجلة | Computers,Materials & Continua | 2022 | |||||
Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment | فصل من كتاب | Applied Cryptography in Computer and Communications Second EAI International Conference, AC3 2022, Springer | 2022 | |||||
Fully automated model on breast cancer classification using deep learning classifiers | بحث مجلة | Indonesian Journal of Electrical Engineering and Computer Science | 2022 | |||||
Audio steganography with enhanced LSB method for securing encrypted text with bit cycling | بحث مجلة | Institute of Advanced Engineering and Science (IAES) | 2022 | |||||
Identity authentication method, system and electronic device | براءة اختراع | Chinese intellectual property | 2022 | |||||
Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes | بحث مجلة | MDPI-Applied Sciences | 2022 | |||||
Dynamic Ephemeral and Session Key Generation Protocol for Next Generation Smart Grids | بحث مؤتمر | International Conference on Ad Hoc Networks International Conference on Testbeds and Research Infrastructures ADHOCNETS 2021 | 2022 | |||||
MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones | فصل من كتاب | FABULOUS 2022: Future Access Enablers for Ubiquitous and Intelligent Infrastructures , Springer | 2022 | |||||
Biometric-Based Packet Validation Scheme for Body Area Network Smart Healthcare Devices | بحث مؤتمر | 2022 IEEE 21st Mediterranean Electrotechnical Conference (MELECON) | 2022 | |||||
Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things | فصل من كتاب | Springer-7th EAI International Conference on IoT as Service- IoTaaS | 2022 | |||||
Anonymous Key Agreement and Mutual Authentication Protocol for Smart Grids | بحث مؤتمر | ٍٍSpringer- EAI WiCON 2021 - 14th EAI International Wireless Internet Conference | 2022 | |||||
Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks | بحث مجلة | Journal of Sensor and Actuator Networks | 2022 | |||||
Verifiable Security and Privacy Provisioning Protocol for High Reliability in Smart Healthcare Communication Environment | بحث مؤتمر | 4th Global Power, Energy and Communication Conference (IEEE GPECOM2022), June 14-17, 2022, Cappadocia/Turkey | 2022 | |||||
Provably throttling SQLI using an enciphering query and secure matching | بحث مجلة | Elsevier | 2022 | |||||
A Lightweight Hybrid Scheme for Hiding Text Messages in Colour Images Using LSB, Lah Transform and Chaotic Techniques | بحث مجلة | MDPI-Journal of Sensor and Actuator Networks | 2022 | |||||
Low Bandwidth and Side-Channeling Resilient Algorithm for Pervasive Computing Systems | بحث مؤتمر | ٍSpringer -Proceedings of International Conference on Communication and Computational Technologies | 2022 | |||||
Optimized Hysteresis Region Authenticated Handover for 5G HetNets | فصل من كتاب | Artificial Intelligence and Sustainable Computing, Algorithms for Intelligent Systems, Springer | 2022 | |||||
Forward and Backward Key Secrecy Preservation Scheme for Medical Internet of Things | بحث مؤتمر | Human-Centric Smart Computing Proceedings of ICHCSC 2022-Springer | 2022 | |||||
Towards for Designing Educational System Using Role-Based Access Control | بحث مجلة | International Journal of Intelligent Engineering & Systems | 2022 | |||||
Authentication and Key Agreement Protocol for Secure Traffic Signaling in 5G Networks | بحث مؤتمر | IEEE | 2022 | |||||
Temporary Symmetric Key Based Message Verification Protocol for Smart Energy Networks | بحث مؤتمر | IEEE- 2022 7th IEEE International Energy Conference (ENERGYCON 2022) | 2022 | |||||
Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Mapping | بحث مجلة | IEEE | 2022 | |||||
Provably Secure Session Key Agreement Protocol for Unmanned Aerial Vehicles Packet Exchanges | بحث مؤتمر | IEEE | 2022 | |||||
Energy Efficient WSN Sink-Cloud Server Authentication Protocol | بحث مؤتمر | Conference: 2021 5th International Conference on Information Systems and Computer Networks (ISCON) | 2022 | |||||
Towards Iris-Based Authentication for Smart Devices in the Cloud | بحث مؤتمر | Springer | 2021 | |||||
Lightweight Privacy-Preserving Similar Documents Retrieval over Encrypted Data | بحث مؤتمر | IEEE | 2021 | |||||
Lightweight, Secure, Similar-Document Retrieval over Encrypted Data | بحث مجلة | MDPI-Applied Sciences | 2021 | |||||
Towards Security and Privacy Preservation in 5G Networks | بحث مؤتمر | IEEE | 2021 | |||||
Securing audio transmission based on encoding and steganography | بحث مجلة | Indonesian Journal of Electrical Engineering and Computer Science | 2021 | |||||
Secure Data of Industrial Internet of Things in a Cement Factory Based on a Blockchain Technology | بحث مجلة | MDPI-Applied Sciences | 2021 | |||||
Web application database protection from SQLIA using permutation encoding | بحث مجلة | ACM | 2021 | |||||
A Lightweight Messaging Method for End to End Smart Device Communication in the Internet of Things Cloud | براءة اختراع | China National Intellectural Property | 2021 | |||||
Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System | بحث مجلة | IEEE ACCESS | 2020 | |||||
Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud | بحث مؤتمر | .In: Proceedings of the 10th International Conference on Signal Processing, Communications and Computing (ICSPCC’20), IEEE | 2020 | |||||
Toward awareness locality algorithms of Peer-to-Peer file sharing network | بحث مؤتمر | ”, In: Proceedings of the ACM 5th International Conference on Cloud Computing and Internet of Things (CCIOT 2020) | 2020 | |||||
An Efficient and Secure Scheme for Dynamic Shared Data in Cloud | بحث مؤتمر | The 3rd International Conference on Computer Science and Application Engineering (CSAE’19), ACM | 2019 | |||||
Greedy Learning of Deep Boltzmann Machine (GDBM)’s Variance and Search Algorithm for Efficient Image Retrieval | بحث مجلة | IEEE Access | 2019 | |||||
Boost Secure Sockets Layer against Man-in-the-Middle Sniffing Attack via SCPK | بحث مجلة | International Conference on Advanced Science and Engineering (ICOASE), IEEE | 2019 | |||||
New Data Integrity Scheme Employing Wavelet-Based Digital Watermarking in Cloud Environment | بحث مؤتمر | 2015 4th International Conference on Computer Science and Network Technology (ICCSNT 2015) | 2019 | |||||
EEIRI: Efficient Encrypted Image Retrieval in IoT-Cloud | بحث مجلة | .KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, Vol 13, No. 11, 2019. . | 2019 | |||||
An effective image retrieval based on optimized genetic algorithm utilized a novel SVM‑based convolutional neural network classifier | بحث مجلة | Human-centric Computing and Information Sciences, Springer, vol. 9, no. 31 (2019) | 2019 | |||||
Towards One-Time Biometric-message Authentication Code in Cloud Computing | بحث مجلة | Journal of Engineering and Applied Sciences | 2018 | |||||
A Lightweight Scheme to Authenticate and Secure the Communication in Smart Grids | بحث مجلة | MDPI, Applied Sciences | 2018 | |||||
Toward for Strong Authentication Code In Cloud of Internet of Things Based on DWT And Steganography | بحث مجلة | Journal Of Theoretical And Applied Information Technology | 2018 | |||||
Efficient encrypted image retrieval in IoT-cloud with multi-user Authentication | بحث مجلة | SAGE, International Journal of Distributed Sensor Networks | 2018 | |||||
Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing | بحث مجلة | Security and Communication Networks | 2017 | |||||
LEACH-T: LEACH Clustering Protocol Based on Three Layers | بحث مؤتمر | IEEE , (International Conference on Network and Information Systems for Computers (ICNISC | 2017 | |||||
General domain ontology in enterprises software development | بحث مؤتمر | In: Proceedings of the ICT conference and exhibition on information and communication technology, Basrah | 2017 | |||||
Privacy-preserving Image Retrieval in IoT-Cloud | بحث مؤتمر | In: Proceedings of the 15th International Conference on Trust, Security and Privacy in Computing and Communications | 2017 | |||||
EEC–LEACH: Energy-Efficient Clustering Design for Reducing Power Consumption of LEACH Protocol | بحث مؤتمر | 6th International Conference on Communication,Electronics and Automation Engineering (ICCEAE 2017) | 2017 | |||||
SEPIM: Secure and Efficient Private Image Matching | بحث مجلة | Journal of Applied Sciences | 2016 | |||||
Robust Scheme to Protect Authentication Code of Message/Image Documents in Cloud Computing | بحث مؤتمر | International Conference on Computing, Networking and Communications (ICNC 2016), IEEE | 2016 | |||||
MACLESS Steganography using Double-stegging with Handwritten Signature in Cloud Computing | بحث مؤتمر | 2nd International Conference on Communication Systems and Computing Application Science, IEEE | 2016 | |||||
Data Integrity Proof and Secure Computation Based on Feature Extraction of Iris in Cloud Storage | بحث مؤتمر | 2nd International Conference on Communication Systems and Computing Application Science, IEEE | 2016 | |||||
Public Auditing for Secure Shared Data Storage in Cloud with Multi-User Modification | بحث مؤتمر | 2nd International Conference on Communication Systems and Computing Application Science, IEEE | 2016 | |||||
Preventing ARP Cache Poisoning Attack by Improving ARP to Stateful | بحث مؤتمر | 2nd International Conference on Computational Intelligence, Communication and Signal, IEEE | 2016 | |||||
Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment | بحث مؤتمر | The 2nd IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2016) | 2016 | |||||
An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage | بحث مؤتمر | IEEE International Conference on Intelligent Data and Security (IEEE IDS 2016) | 2016 | |||||
ARP enhancement to stateful protocol by register ARP request | بحث مؤتمر | The 2nd Annual International Conference on Network and Information Systems for Computers (ICNISC2016) | 2016 | |||||
Towards Secure Private Image Matching | بحث مؤتمر | The 11th IEEE International Conference on Green, Pervasive and Cloud Computing (GPC-2016) | 2016 | |||||
DNS Protection Against Spoofing and Poisoning Attacks | بحث مجلة | (In: Proceedings of the 3rd International Conference on Information Science and Control Engineering (ICISCE’16) | 2016 | |||||
Secure and Efficient E-health Scheme Based on the Internet of Things | بحث مؤتمر | In: Proceedings of the 6th International Conference on Signal Processing, Communications and Computing (ICSPCC’16) | 2016 | |||||
Secure Biometric Image Retrieval in IoT-Cloud | بحث مؤتمر | (In: Proceedings of the 6th International Conference on Signal Processing, Communications and Computing (ICSPCC’16) | 2016 | |||||
Ensuring Data Integrity Scheme Based on Digital Signature and Iris Features in Cloud | بحث مجلة | Indonesian Journal of Electrical Engineering and Computer Science, Vol. 2, No. 2, May 2016 | 2016 | |||||
A Secured Scheme for Geographical Distance Computation over Encrypted Cloud Data | بحث مؤتمر | 2015 4th International Conference on Computer Science and Network Technology | 2015 | |||||
Scheme for Ensuring Data Security on Cloud Data Storage in a Semi-trusted Third Party Auditor | بحث مؤتمر | 2015 4th International Conference on Computer Science and Network Technology (ICCSNT 2015) | 2015 | |||||
Robust Image Document Authentication Code with Autonomous Biometric Key Generation, Selection, and Updating in Cloud Environment | بحث مجلة | The 11th International Conference on Information Assurance and Security (IAS), IEEE | 2015 | |||||
Public Auditing for Secure Data Storage in Cloud through a Third Party Auditor Using Modern Ciphertext | بحث مؤتمر | The 11th International Conference on Information Assurance and Security (IAS), IEEE | 2015 | |||||
An Efficient and Robust One-TimeMessage Authentication CodeScheme Using Feature Extraction of Iris in Cloud Computing | بحث مؤتمر | Proceedings of 2014 International Conference on Cloud Computing and Internet of Things (CCTOT 2014) | 2014 | |||||
Comparison between ant colony and genetic algorithm using Traveling Salesman Problem | بحث مجلة | International Journal of Soft Computing, Medwell | 2013 | |||||
Efficient and Secure Mutual Authentication Scheme in Cloud Computing | بحث مجلة | International Journal of Engineering and Advanced Technology (IJEAT) | 2013 | |||||
Secure Image Retrieval over Untrusted Cloud Servers | بحث مجلة | International Journal of Engineering and Advanced Technology (IJEAT) | 2013 | |||||
A LOGARITHM ENCRYPTION (EA-LOG) OF SYMMETRIC CRYPTOGRAPHY | بحث مجلة | International Journal of Advances in Engineering & Technology | 2013 | |||||
FINGERPRINT IMAGE ENHANCEMENT BY DEVELOP MEHTRE TECHNIQUE | بحث مجلة | Advanced Computing: An International Journal ( ACIJ ) | 2012 | |||||
Simulation and Design of Fuzzy Temperature Control for Heating and Cooling Water System | بحث مجلة | International Journal of Advancements in Computing Technology | 2011 |