العنوان : استاذ مساعد
الكلية : التربية للعلوم الصرفة
القسم : الحاسبات
البريد الالكتروني : mohammed.abdulridha@uobasrah.edu.iq
رابط Google Scholar: | https://scholar.google.com/citations?user=uSZOKy0AAAAJ&hl=ar |
---|---|
رابط Research Gate : | https://www.researchgate.net/profile/Mohammed_Abdulridha_Hussain |
رابط Web of Science : | https://publons.com/researcher/3155706/mohammed-hussain/ |
رابط Scopus : | https://www.scopus.com/authid/detail.uri?authorId=56589406800 |
رابط ORCID : | https://orcid.org/0000-0001-5846-6143 |
عنوان البحث | النوع | الناشر | السنة | عالمي | مفرد | ثومبسون رويتر (كلارفيت) |
سكوبس | تحميل |
---|---|---|---|---|---|---|---|---|
Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT Systems | بحث مجلة | Applied Sciences | 2023 | ![]() |
![]() |
![]() |
||
Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture | بحث مجلة | Sustainability | 2023 | ![]() |
![]() |
![]() |
||
Provably throttling SQLI using an enciphering query and secure matching | بحث مجلة | Egyptian Informatics Journal | 2022 | ![]() |
![]() |
![]() |
||
Forward and Backward Key Secrecy Preservation Scheme for Medical Internet of Things | بحث مؤتمر | Human-Centric Smart Computing, Smart Innovation, Systems and Technologies | 2022 | ![]() |
![]() |
|||
Defending a wireless LAN against ARP spoofing attacks using a Raspberry Pi | بحث مجلة | Journal of Basrah Researches (Sciences) | 2022 |
![]() |
||||
Provably curb man-in-the-middle attack-based ARP spoofing in a local network | بحث مجلة | Bulletin of Electrical Engineering and Informatics | 2022 | ![]() |
![]() |
|||
Web application database protection from SQLIA using permutation encoding | بحث مؤتمر | 2021 The 4th International Conference on Information Science and Systems, Edinburgh, United Kingdom, ACM | 2021 | ![]() |
![]() |
![]() |
||
Securing audio transmission based on encoding and steganography | بحث مجلة | Indonesian Journal of Electrical Engineering and Computer Science, vol. 22, no. 3 | 2021 | ![]() |
![]() |
![]() |
||
Provably Secure Session Key Agreement Protocol for Unmanned Aerial Vehicles Packet Exchanges | بحث مؤتمر | International Conference on Electrical, Computer and Energy Technologies (ICECET) | 2021 | ![]() |
![]() |
|||
Promising bio-authentication scheme to protect documents for E2E S2S in IoT-cloud | بحث مؤتمر | 2020 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Macau, China, IEEE | 2020 | ![]() |
![]() |
![]() |
||
Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System | بحث مجلة | IEEE Access | 2020 | ![]() |
![]() |
![]() |
![]() |
|
تَبنّي الإنترانيت في التعليم الالكتروني بديلا عن الانترنت لتحسين جودة الخدمة | بحث مؤتمر | جامعة البصرة | 2020 |
![]() |
||||
Encoding Query Based Lightweight Algorithm for Preventing SQL Injection Attack | بحث مجلة | مجلة ابحاث البصرة- العلميات | 2020 |
![]() |
||||
An Efficient and Secure Scheme for Dynamic Shared Data in Cloud | بحث مؤتمر | Proceedings of the 3rd International Conference on Computer Science and Application Engineering (CSAE 2019), Sanya, China | 2019 | ![]() |
![]() |
![]() |
||
EEIRI: Efficient Encrypted Image Retrieval in IoT-Cloud. | بحث مجلة | KSII Transactions on Internet & Information Systems | 2019 | ![]() |
![]() |
![]() |
![]() |
|
Boost Secure Sockets Layer against Man-in-the-Middle Sniffing Attack via SCPK | بحث مؤتمر | International Conference on Advanced Science and Engineering 2018 (ICOASE2018), Kurdistan Region, Iraq, IEEE | 2018 | ![]() |
![]() |
|||
Efficient Encryption Image Retrieval in IOT-Cloud with Multi-User Authentication | بحث مجلة | International Journal of Distributed Sensor Network | 2018 | ![]() |
![]() |
![]() |
||
Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing | بحث مجلة | Security and Communication Networks, Hindawi | 2017 | ![]() |
![]() |
![]() |
||
The best performance evaluation of encryption algorithms to reduce power consumption in WSN | بحث مؤتمر | The 2017 International Conference on computing intelligence and information system, Nanjing, China, IEEE Press | 2017 | ![]() |
![]() |
![]() |
||
ARP Enhancement to Stateful Protocol by Registering ARP Request | بحث مؤتمر | the 2016 IEEE International Conference on Network and Information Systems for Computers, Wuhan, China, IEEE | 2016 | ![]() |
![]() |
![]() |
||
DNS Protection against Spoofing and Poisoning Attacks | بحث مؤتمر | The 3rd International Conference on Information Science and Control Engineering (ICISCE’16), Beijing, China, IEEE | 2016 | ![]() |
![]() |
![]() |
||
Ensuring Data Integrity Scheme Based on Digital Signature and Iris Features in Cloud | بحث مجلة | Indonesian Journal of Electrical Engineering and Computer Science | 2016 | ![]() |
![]() |
![]() |
||
Robust Scheme to Protect Authentication Code of Message/Image Documents in Cloud Computing | بحث مؤتمر | The IEEE 2016 International Conference on Computing, Networking and Communications (ICNC’16), USA, IEEE. | 2016 | ![]() |
![]() |
![]() |
||
Preventing ARP Cache Poisoning Attack by Improving ARP to Stateful | بحث مؤتمر | The IEEE 2nd International Conference on Computational Intelligence, Communication and Signal Processing (CICSP’16), Jeju Island, South Korea, IEEE. | 2016 | ![]() |
![]() |
|||
MACLESS Steganography using Double-stegging with Handwritten Signature in Cloud Computing | بحث مؤتمر | The IEEE 2th International Conference on Communication Systems and Computing Application Science (2nd CSCAS 2016). Jeju Island, South Korea, IEEE. | 2016 | ![]() |
![]() |
|||
Data Integrity Proof and Secure Computation Based on Feature Extraction of Iris in Cloud Storage | بحث مؤتمر | The IEEE 2th International Conference on Communication Systems and Computing Application Science (2nd CSCAS 2016). Jeju Island, South Korea, IEEE | 2016 | ![]() |
![]() |
|||
Public Auditing for Secure Shared Data Storage in Cloud with Multi-User Modification | بحث مؤتمر | The IEEE 2th International Conference on Communication Systems and Computing Application Science (2nd CSCAS 2016). Jeju Island, South Korea, IEEE. | 2016 | ![]() |
![]() |
|||
Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment | بحث مؤتمر | The IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity’16), USA, IEEE | 2016 | ![]() |
![]() |
![]() |
||
An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage | بحث مؤتمر | The IEEE International Conference on (IDS’2016). New York, USA, IEEE | 2016 | ![]() |
![]() |
![]() |
||
LEACH-T: LEACH Clustering Protocol Based on Three Layers | بحث مؤتمر | the 2016 IEEE International Conference on Network and Information Systems for Computers, Wuhan, China, IEEE | 2016 | ![]() |
![]() |
![]() |
||
Towards Secure Private Image Matching | بحث مؤتمر | The 11th International Conference on Green, Pervasive, and Cloud Computing (GPC’16), Xi’an, China, Springer. | 2016 | ![]() |
![]() |
![]() |
||
SEPIM: Secure and Efficient Private Image Matching | بحث مجلة | Applied Sciences, mdpi. (SCI, ISI, IF: 1.726) | 2016 | ![]() |
![]() |
![]() |
||
Secure Biometric Image Retrieval in IoT-Cloud | بحث مؤتمر | The 6th International Conference on Signal Processing, Communications and Computing (ICSPCC’16), Hong Kong, IEEE Press | 2016 | ![]() |
![]() |
![]() |
||
Privacy-preserving Image Retrieval in IoT-Cloud | بحث مؤتمر | The 15th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’16), Tianjin, China, IEEE Press. (CCF). | 2016 | ![]() |
![]() |
![]() |
||
Secure and Efficient E-health Scheme Based on the Internet of Things | بحث مؤتمر | the 6th International Conference on Signal Processing, Communications and Computing (ICSPCC’16), Hong Kong, China, IEEE Press. | 2016 | ![]() |
![]() |
![]() |
||
A Secured Scheme for Geographical Distance Computation over Encrypted Cloud Data | بحث مؤتمر | the 4th International Conference on Computer Science and Network Technology (ICCSNT’15), Harbin, China, IEEE Press. | 2015 | ![]() |
![]() |
|||
Robust Image Document Authentication Code with Autonomous Biometric Key Generation, Selection, and Updating in Cloud Environment | بحث مؤتمر | The IEEE 11th International Conference on Information Assurance and Security (IAS’15), 2015. Morocco, IEEE. | 2015 | ![]() |
![]() |
|||
New Data Integrity Scheme Employing Wavelet-Based Digital Watermarking in Cloud Environment | بحث مؤتمر | The IEEE 4th International Conference on Computer Science and Network Technology (ICCSNT). Harbin, Chins, IEEE. | 2015 | ![]() |
![]() |
|||
Public Auditing for Secure Data Storage in Cloud through a Third Party Auditor Using Modern Ciphertext | بحث مؤتمر | The IEEE 11th International Conference on Information Assurance and Security (IAS’15 ), 2015. Morocco, IEEE | 2015 | ![]() |
![]() |
|||
Scheme for Ensuring Data Security on Cloud Data Storage in a Semi-trusted Third Party Auditor | بحث مؤتمر | The IEEE 4th International Conference on Computer Science and Network Technology (ICCSNT). Harbin, Chins, IEEE. | 2015 | ![]() |
![]() |
|||
A Logarithm Encryption (EA-LOG) of Symmetric Cryptography | بحث مجلة | International Journal of Advances in Engineering & Technology (IJAET) | 2013 | ![]() |
||||
Text – to – Image Encrypted Transformation (TIET) | بحث مجلة | International Journal of Computer Science and Engineering (IJCSE) | 2013 | ![]() |
![]() |
![]() |
||
Comparative Study of Scheduling Algorithms in WIMAX | بحث مؤتمر | National conference on Recent Developments in Computing and Its Applications, NCRDCA ’09, Delhi, India. | 2009 |