الاسم : زيد امين عبد الجبار

العنوان : استاذ مساعد

الكلية : التربية للعلوم الصرفة

القسم : الحاسبات

البريد الالكتروني : zaid.ameen@uobasrah.edu.iq

Zaid Ameen Abduljabbar

الاوراق البحثية

عنوان البحث النوع الناشر السنة عالمي مفرد ثومبسون رويتر
(كلارفيت)
سكوبس تحميل
Multi-chain blockchain based secure data-sharing framework for industrial IoTs smart devices in petroleum industry بحث مجلة Internet of Things- Elsevier 2023
Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT Systems بحث مجلة MDPI-Applied Sciences 2023
Transient Session Key Derivation Protocol for Key Escrow Prevention in Public Key Infrastructure بحث مؤتمر International Conference on Internet of Everything-Springer 2023
Provably secure and efficient audio compression based on compressive sensing بحث مجلة International Journal of Electrical and Computer Engineering (IJECE) 2023
Investigating the relationship between knowledge management practices and organizational learning practices in the universities’ environment بحث مجلة International Journal of Electrical and Computer Engineering (IJECE) 2023
Concurrent pipeline rendering scheme based on GPU multi-queue and partitioning images بحث مؤتمر Proceedings Volume 12634, International Conference on Optics and Machine Vision (ICOMV 2023) 2023
SECURE AND LOW-COMPLEXITY MEDICAL IMAGE EXCHANGE BASED ON COMPRESSIVE SENSING AND LSB AUDIO STEGANOGRAPHY بحث مجلة Informatica 2023
Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture بحث مجلة MDPI-Sustainability 2023
Knowledge Management and its Role in the Development of a Smart University in Iraq بحث مجلة TEM Journal 2023
Role Based Access Control Using Biometric the in Educational System بحث مجلة Journal of Basrah Researches (Sciences) 2023
Improving the Performance of Searchable Symmetric Encryption by Optimizing Locality بحث مجلة Journal of Basrah Researches (Sciences) 2023
Two-Factor Privacy Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks بحث مجلة IEEE Internet of Things Journal 2023
Efficient Extreme Gradient Boosting Based Algorithm for QoS Optimization in Inter-Radio Access Technology Handoffs بحث مؤتمر IEEE International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) 2022
Packet Replays Prevention Protocol for Secure B5G Networks فصل من كتاب Springer- Packet Replays Prevention Protocol for Secure B5G Networks 2022
A Blockchain-Based Architecture for Securing Industrial IoTs Data in Electric Smart Grid بحث مجلة Computers,Materials & Continua 2022
Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment فصل من كتاب Applied Cryptography in Computer and Communications Second EAI International Conference, AC3 2022, Springer 2022
Fully automated model on breast cancer classification using deep learning classifiers بحث مجلة Indonesian Journal of Electrical Engineering and Computer Science 2022
Audio steganography with enhanced LSB method for securing encrypted text with bit cycling بحث مجلة Institute of Advanced Engineering and Science (IAES) 2022
Identity authentication method, system and electronic device براءة اختراع Chinese intellectual property 2022 download
Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes بحث مجلة MDPI-Applied Sciences 2022 download
Dynamic Ephemeral and Session Key Generation Protocol for Next Generation Smart Grids بحث مؤتمر International Conference on Ad Hoc Networks International Conference on Testbeds and Research Infrastructures ADHOCNETS 2021 2022
MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones فصل من كتاب FABULOUS 2022: Future Access Enablers for Ubiquitous and Intelligent Infrastructures , Springer 2022
Biometric-Based Packet Validation Scheme for Body Area Network Smart Healthcare Devices بحث مؤتمر 2022 IEEE 21st Mediterranean Electrotechnical Conference (MELECON) 2022
Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things فصل من كتاب Springer-7th EAI International Conference on IoT as Service- IoTaaS 2022
Anonymous Key Agreement and Mutual Authentication Protocol for Smart Grids بحث مؤتمر ٍٍSpringer- EAI WiCON 2021 - 14th EAI International Wireless Internet Conference 2022
Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks بحث مجلة Journal of Sensor and Actuator Networks 2022
Verifiable Security and Privacy Provisioning Protocol for High Reliability in Smart Healthcare Communication Environment بحث مؤتمر 4th Global Power, Energy and Communication Conference (IEEE GPECOM2022), June 14-17, 2022, Cappadocia/Turkey 2022
Provably throttling SQLI using an enciphering query and secure matching بحث مجلة Elsevier 2022 download
A Lightweight Hybrid Scheme for Hiding Text Messages in Colour Images Using LSB, Lah Transform and Chaotic Techniques بحث مجلة MDPI-Journal of Sensor and Actuator Networks 2022
Low Bandwidth and Side-Channeling Resilient Algorithm for Pervasive Computing Systems بحث مؤتمر ٍSpringer -Proceedings of International Conference on Communication and Computational Technologies 2022
Optimized Hysteresis Region Authenticated Handover for 5G HetNets فصل من كتاب Artificial Intelligence and Sustainable Computing, Algorithms for Intelligent Systems, Springer 2022
Forward and Backward Key Secrecy Preservation Scheme for Medical Internet of Things بحث مؤتمر Human-Centric Smart Computing Proceedings of ICHCSC 2022-Springer 2022
Towards for Designing Educational System Using Role-Based Access Control بحث مجلة International Journal of Intelligent Engineering & Systems 2022
Authentication and Key Agreement Protocol for Secure Traffic Signaling in 5G Networks بحث مؤتمر IEEE 2022
Temporary Symmetric Key Based Message Verification Protocol for Smart Energy Networks بحث مؤتمر IEEE- 2022 7th IEEE International Energy Conference (ENERGYCON 2022) 2022
Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Mapping بحث مجلة IEEE 2022
Provably Secure Session Key Agreement Protocol for Unmanned Aerial Vehicles Packet Exchanges بحث مؤتمر IEEE 2022
Energy Efficient WSN Sink-Cloud Server Authentication Protocol بحث مؤتمر Conference: 2021 5th International Conference on Information Systems and Computer Networks (ISCON) 2022
Towards Iris-Based Authentication for Smart Devices in the Cloud بحث مؤتمر Springer 2021
Lightweight Privacy-Preserving Similar Documents Retrieval over Encrypted Data بحث مؤتمر IEEE 2021
Lightweight, Secure, Similar-Document Retrieval over Encrypted Data بحث مجلة MDPI-Applied Sciences 2021
Towards Security and Privacy Preservation in 5G Networks بحث مؤتمر IEEE 2021
Securing audio transmission based on encoding and steganography بحث مجلة Indonesian Journal of Electrical Engineering and Computer Science 2021 download
Secure Data of Industrial Internet of Things in a Cement Factory Based on a Blockchain Technology بحث مجلة MDPI-Applied Sciences 2021 download
Web application database protection from SQLIA using permutation encoding بحث مجلة ACM 2021
A Lightweight Messaging Method for End to End Smart Device Communication in the Internet of Things Cloud براءة اختراع China National Intellectural Property 2021
Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System بحث مجلة IEEE ACCESS 2020
Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud بحث مؤتمر .In: Proceedings of the 10th International Conference on Signal Processing, Communications and Computing (ICSPCC’20), IEEE 2020
Toward awareness locality algorithms of Peer-to-Peer file sharing network بحث مؤتمر ”, In: Proceedings of the ACM 5th International Conference on Cloud Computing and Internet of Things (CCIOT 2020) 2020
An Efficient and Secure Scheme for Dynamic Shared Data in Cloud بحث مؤتمر The 3rd International Conference on Computer Science and Application Engineering (CSAE’19), ACM 2019 download
Greedy Learning of Deep Boltzmann Machine (GDBM)’s Variance and Search Algorithm for Efficient Image Retrieval بحث مجلة IEEE Access 2019
Boost Secure Sockets Layer against Man-in-the-Middle Sniffing Attack via SCPK بحث مجلة International Conference on Advanced Science and Engineering (ICOASE), IEEE 2019 download
New Data Integrity Scheme Employing Wavelet-Based Digital Watermarking in Cloud Environment بحث مؤتمر 2015 4th International Conference on Computer Science and Network Technology (ICCSNT 2015) 2019 download
EEIRI: Efficient Encrypted Image Retrieval in IoT-Cloud بحث مجلة .KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, Vol 13, No. 11, 2019. . 2019 download
An effective image retrieval based on optimized genetic algorithm utilized a novel SVM‑based convolutional neural network classifier بحث مجلة Human-centric Computing and Information Sciences, Springer, vol. 9, no. 31 (2019) 2019 download
Towards One-Time Biometric-message Authentication Code in Cloud Computing بحث مجلة Journal of Engineering and Applied Sciences 2018
A Lightweight Scheme to Authenticate and Secure the Communication in Smart Grids بحث مجلة MDPI, Applied Sciences 2018 download
Toward for Strong Authentication Code In Cloud of Internet of Things Based on DWT And Steganography بحث مجلة Journal Of Theoretical And Applied Information Technology 2018
Efficient encrypted image retrieval in IoT-cloud with multi-user Authentication بحث مجلة SAGE, International Journal of Distributed Sensor Networks 2018
Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing بحث مجلة Security and Communication Networks 2017
LEACH-T: LEACH Clustering Protocol Based on Three Layers بحث مؤتمر IEEE , (International Conference on Network and Information Systems for Computers (ICNISC 2017
General domain ontology in enterprises software development بحث مؤتمر In: Proceedings of the ICT conference and exhibition on information and communication technology, Basrah 2017
Privacy-preserving Image Retrieval in IoT-Cloud بحث مؤتمر In: Proceedings of the 15th International Conference on Trust, Security and Privacy in Computing and Communications 2017
EEC–LEACH: Energy-Efficient Clustering Design for Reducing Power Consumption of LEACH Protocol بحث مؤتمر 6th International Conference on Communication,Electronics and Automation Engineering (ICCEAE 2017) 2017
SEPIM: Secure and Efficient Private Image Matching بحث مجلة Journal of Applied Sciences 2016
Robust Scheme to Protect Authentication Code of Message/Image Documents in Cloud Computing بحث مؤتمر International Conference on Computing, Networking and Communications (ICNC 2016), IEEE 2016
MACLESS Steganography using Double-stegging with Handwritten Signature in Cloud Computing بحث مؤتمر 2nd International Conference on Communication Systems and Computing Application Science, IEEE 2016
Data Integrity Proof and Secure Computation Based on Feature Extraction of Iris in Cloud Storage بحث مؤتمر 2nd International Conference on Communication Systems and Computing Application Science, IEEE 2016
Public Auditing for Secure Shared Data Storage in Cloud with Multi-User Modification بحث مؤتمر 2nd International Conference on Communication Systems and Computing Application Science, IEEE 2016
Preventing ARP Cache Poisoning Attack by Improving ARP to Stateful بحث مؤتمر 2nd International Conference on Computational Intelligence, Communication and Signal, IEEE 2016
Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment بحث مؤتمر The 2nd IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2016) 2016
An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage بحث مؤتمر IEEE International Conference on Intelligent Data and Security (IEEE IDS 2016) 2016
ARP enhancement to stateful protocol by register ARP request بحث مؤتمر The 2nd Annual International Conference on Network and Information Systems for Computers (ICNISC2016) 2016
Towards Secure Private Image Matching بحث مؤتمر The 11th IEEE International Conference on Green, Pervasive and Cloud Computing (GPC-2016) 2016
DNS Protection Against Spoofing and Poisoning Attacks بحث مجلة (In: Proceedings of the 3rd International Conference on Information Science and Control Engineering (ICISCE’16) 2016
Secure and Efficient E-health Scheme Based on the Internet of Things بحث مؤتمر In: Proceedings of the 6th International Conference on Signal Processing, Communications and Computing (ICSPCC’16) 2016
Secure Biometric Image Retrieval in IoT-Cloud بحث مؤتمر (In: Proceedings of the 6th International Conference on Signal Processing, Communications and Computing (ICSPCC’16) 2016
Ensuring Data Integrity Scheme Based on Digital Signature and Iris Features in Cloud بحث مجلة Indonesian Journal of Electrical Engineering and Computer Science, Vol. 2, No. 2, May 2016 2016
A Secured Scheme for Geographical Distance Computation over Encrypted Cloud Data بحث مؤتمر 2015 4th International Conference on Computer Science and Network Technology 2015
Scheme for Ensuring Data Security on Cloud Data Storage in a Semi-trusted Third Party Auditor بحث مؤتمر 2015 4th International Conference on Computer Science and Network Technology (ICCSNT 2015) 2015
Robust Image Document Authentication Code with Autonomous Biometric Key Generation, Selection, and Updating in Cloud Environment بحث مجلة The 11th International Conference on Information Assurance and Security (IAS), IEEE 2015
Public Auditing for Secure Data Storage in Cloud through a Third Party Auditor Using Modern Ciphertext بحث مؤتمر The 11th International Conference on Information Assurance and Security (IAS), IEEE 2015
An Efficient and Robust One-TimeMessage Authentication CodeScheme Using Feature Extraction of Iris in Cloud Computing بحث مؤتمر Proceedings of 2014 International Conference on Cloud Computing and Internet of Things (CCTOT 2014) 2014
Comparison between ant colony and genetic algorithm using Traveling Salesman Problem بحث مجلة International Journal of Soft Computing, Medwell 2013
Efficient and Secure Mutual Authentication Scheme in Cloud Computing بحث مجلة International Journal of Engineering and Advanced Technology (IJEAT) 2013
Secure Image Retrieval over Untrusted Cloud Servers بحث مجلة International Journal of Engineering and Advanced Technology (IJEAT) 2013
A LOGARITHM ENCRYPTION (EA-LOG) OF SYMMETRIC CRYPTOGRAPHY بحث مجلة International Journal of Advances in Engineering & Technology 2013
FINGERPRINT IMAGE ENHANCEMENT BY DEVELOP MEHTRE TECHNIQUE بحث مجلة Advanced Computing: An International Journal ( ACIJ ) 2012
Simulation and Design of Fuzzy Temperature Control for Heating and Cooling Water System بحث مجلة International Journal of Advancements in Computing Technology 2011