العنوان : استاذ مساعد
الكلية : التربية للعلوم الصرفة
القسم : الحاسبات
البريد الالكتروني : mohammed.abdulridha@uobasrah.edu.iq
رابط Google Scholar: | https://scholar.google.com/citations?user=uSZOKy0AAAAJ&hl=ar |
---|---|
رابط Research Gate : | https://www.researchgate.net/profile/Mohammed_Abdulridha_Hussain |
رابط Web of Science : | https://publons.com/researcher/3155706/mohammed-hussain/ |
رابط Scopus : | https://www.scopus.com/authid/detail.uri?authorId=56589406800 |
رابط ORCID : | https://orcid.org/0000-0001-5846-6143 |
عنوان البحث | النوع | الناشر | السنة | عالمي | مفرد | ثومبسون رويتر (كلارفيت) |
سكوبس | تحميل |
---|---|---|---|---|---|---|---|---|
Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT Systems | بحث مجلة | Applied Sciences | 2023 | |||||
Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture | بحث مجلة | Sustainability | 2023 | |||||
Provably throttling SQLI using an enciphering query and secure matching | بحث مجلة | Egyptian Informatics Journal | 2022 | |||||
Forward and Backward Key Secrecy Preservation Scheme for Medical Internet of Things | بحث مؤتمر | Human-Centric Smart Computing, Smart Innovation, Systems and Technologies | 2022 | |||||
Defending a wireless LAN against ARP spoofing attacks using a Raspberry Pi | بحث مجلة | Journal of Basrah Researches (Sciences) | 2022 | |||||
Provably curb man-in-the-middle attack-based ARP spoofing in a local network | بحث مجلة | Bulletin of Electrical Engineering and Informatics | 2022 | |||||
Web application database protection from SQLIA using permutation encoding | بحث مؤتمر | 2021 The 4th International Conference on Information Science and Systems, Edinburgh, United Kingdom, ACM | 2021 | |||||
Securing audio transmission based on encoding and steganography | بحث مجلة | Indonesian Journal of Electrical Engineering and Computer Science, vol. 22, no. 3 | 2021 | |||||
Provably Secure Session Key Agreement Protocol for Unmanned Aerial Vehicles Packet Exchanges | بحث مؤتمر | International Conference on Electrical, Computer and Energy Technologies (ICECET) | 2021 | |||||
Promising bio-authentication scheme to protect documents for E2E S2S in IoT-cloud | بحث مؤتمر | 2020 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Macau, China, IEEE | 2020 | |||||
Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System | بحث مجلة | IEEE Access | 2020 | |||||
تَبنّي الإنترانيت في التعليم الالكتروني بديلا عن الانترنت لتحسين جودة الخدمة | بحث مؤتمر | جامعة البصرة | 2020 | |||||
Encoding Query Based Lightweight Algorithm for Preventing SQL Injection Attack | بحث مجلة | مجلة ابحاث البصرة- العلميات | 2020 | |||||
An Efficient and Secure Scheme for Dynamic Shared Data in Cloud | بحث مؤتمر | Proceedings of the 3rd International Conference on Computer Science and Application Engineering (CSAE 2019), Sanya, China | 2019 | |||||
EEIRI: Efficient Encrypted Image Retrieval in IoT-Cloud. | بحث مجلة | KSII Transactions on Internet & Information Systems | 2019 | |||||
Boost Secure Sockets Layer against Man-in-the-Middle Sniffing Attack via SCPK | بحث مؤتمر | International Conference on Advanced Science and Engineering 2018 (ICOASE2018), Kurdistan Region, Iraq, IEEE | 2018 | |||||
Efficient Encryption Image Retrieval in IOT-Cloud with Multi-User Authentication | بحث مجلة | International Journal of Distributed Sensor Network | 2018 | |||||
Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing | بحث مجلة | Security and Communication Networks, Hindawi | 2017 | |||||
The best performance evaluation of encryption algorithms to reduce power consumption in WSN | بحث مؤتمر | The 2017 International Conference on computing intelligence and information system, Nanjing, China, IEEE Press | 2017 | |||||
ARP Enhancement to Stateful Protocol by Registering ARP Request | بحث مؤتمر | the 2016 IEEE International Conference on Network and Information Systems for Computers, Wuhan, China, IEEE | 2016 | |||||
DNS Protection against Spoofing and Poisoning Attacks | بحث مؤتمر | The 3rd International Conference on Information Science and Control Engineering (ICISCE’16), Beijing, China, IEEE | 2016 | |||||
Ensuring Data Integrity Scheme Based on Digital Signature and Iris Features in Cloud | بحث مجلة | Indonesian Journal of Electrical Engineering and Computer Science | 2016 | |||||
Robust Scheme to Protect Authentication Code of Message/Image Documents in Cloud Computing | بحث مؤتمر | The IEEE 2016 International Conference on Computing, Networking and Communications (ICNC’16), USA, IEEE. | 2016 | |||||
Preventing ARP Cache Poisoning Attack by Improving ARP to Stateful | بحث مؤتمر | The IEEE 2nd International Conference on Computational Intelligence, Communication and Signal Processing (CICSP’16), Jeju Island, South Korea, IEEE. | 2016 | |||||
MACLESS Steganography using Double-stegging with Handwritten Signature in Cloud Computing | بحث مؤتمر | The IEEE 2th International Conference on Communication Systems and Computing Application Science (2nd CSCAS 2016). Jeju Island, South Korea, IEEE. | 2016 | |||||
Data Integrity Proof and Secure Computation Based on Feature Extraction of Iris in Cloud Storage | بحث مؤتمر | The IEEE 2th International Conference on Communication Systems and Computing Application Science (2nd CSCAS 2016). Jeju Island, South Korea, IEEE | 2016 | |||||
Public Auditing for Secure Shared Data Storage in Cloud with Multi-User Modification | بحث مؤتمر | The IEEE 2th International Conference on Communication Systems and Computing Application Science (2nd CSCAS 2016). Jeju Island, South Korea, IEEE. | 2016 | |||||
Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment | بحث مؤتمر | The IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity’16), USA, IEEE | 2016 | |||||
An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage | بحث مؤتمر | The IEEE International Conference on (IDS’2016). New York, USA, IEEE | 2016 | |||||
LEACH-T: LEACH Clustering Protocol Based on Three Layers | بحث مؤتمر | the 2016 IEEE International Conference on Network and Information Systems for Computers, Wuhan, China, IEEE | 2016 | |||||
Towards Secure Private Image Matching | بحث مؤتمر | The 11th International Conference on Green, Pervasive, and Cloud Computing (GPC’16), Xi’an, China, Springer. | 2016 | |||||
SEPIM: Secure and Efficient Private Image Matching | بحث مجلة | Applied Sciences, mdpi. (SCI, ISI, IF: 1.726) | 2016 | |||||
Secure Biometric Image Retrieval in IoT-Cloud | بحث مؤتمر | The 6th International Conference on Signal Processing, Communications and Computing (ICSPCC’16), Hong Kong, IEEE Press | 2016 | |||||
Privacy-preserving Image Retrieval in IoT-Cloud | بحث مؤتمر | The 15th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’16), Tianjin, China, IEEE Press. (CCF). | 2016 | |||||
Secure and Efficient E-health Scheme Based on the Internet of Things | بحث مؤتمر | the 6th International Conference on Signal Processing, Communications and Computing (ICSPCC’16), Hong Kong, China, IEEE Press. | 2016 | |||||
A Secured Scheme for Geographical Distance Computation over Encrypted Cloud Data | بحث مؤتمر | the 4th International Conference on Computer Science and Network Technology (ICCSNT’15), Harbin, China, IEEE Press. | 2015 | |||||
Robust Image Document Authentication Code with Autonomous Biometric Key Generation, Selection, and Updating in Cloud Environment | بحث مؤتمر | The IEEE 11th International Conference on Information Assurance and Security (IAS’15), 2015. Morocco, IEEE. | 2015 | |||||
New Data Integrity Scheme Employing Wavelet-Based Digital Watermarking in Cloud Environment | بحث مؤتمر | The IEEE 4th International Conference on Computer Science and Network Technology (ICCSNT). Harbin, Chins, IEEE. | 2015 | |||||
Public Auditing for Secure Data Storage in Cloud through a Third Party Auditor Using Modern Ciphertext | بحث مؤتمر | The IEEE 11th International Conference on Information Assurance and Security (IAS’15 ), 2015. Morocco, IEEE | 2015 | |||||
Scheme for Ensuring Data Security on Cloud Data Storage in a Semi-trusted Third Party Auditor | بحث مؤتمر | The IEEE 4th International Conference on Computer Science and Network Technology (ICCSNT). Harbin, Chins, IEEE. | 2015 | |||||
A Logarithm Encryption (EA-LOG) of Symmetric Cryptography | بحث مجلة | International Journal of Advances in Engineering & Technology (IJAET) | 2013 | |||||
Text – to – Image Encrypted Transformation (TIET) | بحث مجلة | International Journal of Computer Science and Engineering (IJCSE) | 2013 | |||||
Comparative Study of Scheduling Algorithms in WIMAX | بحث مؤتمر | National conference on Recent Developments in Computing and Its Applications, NCRDCA ’09, Delhi, India. | 2009 |