Provably secure and fast color image encryption algorithm based on s-boxes and hyperchaotic map ZA Abduljabbar, IQ Abduljaleel, J Ma, MA Al Sibahee, VO Nyangaresi, ... IEEE Access 10, 26257-26270, 2022 | 71 | 2022 |
Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing AA Yassin, H Jin, A Ibrahim, D Zou 2012 Second International Conference on Cloud and Green Computing, 282-289, 2012 | 57 | 2012 |
Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data A Ibrahim, H Jin, AA Yassin, D Zou 2012 IEEE Asia-Pacific Services Computing Conference, 263-270, 2012 | 54 | 2012 |
Cloud authentication based on anonymous one-time password AA Yassin, H Jin, A Ibrahim, W Qiang, D Zou Ubiquitous Information Technologies and Applications: CUTE 2012, 423-431, 2013 | 44 | 2013 |
Efficient password-based two factors authentication in cloud computing AA Yassin, H Jin, A Ibrahim, W Qiang, D Zou International Journal of Security and Its Applications 6 (2), 143-148, 2012 | 39 | 2012 |
A practical privacy-preserving password authentication scheme for cloud computing AA Yassin, H Jin, A Ibrahim, W Qiang, D Zou 2012 IEEE 26th International Parallel and Distributed Processing Symposium …, 2012 | 37 | 2012 |
DNS protection against spoofing and poisoning attacks MA Hussain, H Jin, ZA Hussien, ZA Abduljabbar, SH Abbdal, A Ibrahim 2016 3rd International Conference on Information Science and Control …, 2016 | 31 | 2016 |
Lightweight, Secure, Similar-Document Retrieval over Encrypted Data MA Al Sibahee, AI Abdulsada, ZA Abduljabbar, J Ma, VO Nyangaresi, ... Applied Sciences 11 (24), 12040, 2021 | 29 | 2021 |
Efficient encrypted image retrieval in IoT-cloud with multi-user authentication MA Al Sibahee, S Lu, ZA Abduljabbar, A Ibrahim, ZA Hussien, KAA Mutlaq, ... International Journal of Distributed Sensor Networks 14 (2), 1550147718761814, 2018 | 28 | 2018 |
Employee attrition prediction using deep neural networks S Al-Darraji, DG Honi, F Fallucchi, AI Abdulsada, R Giuliano, ... Computers 10 (11), 141, 2021 | 26 | 2021 |
Privacy-preserving image retrieval in IoT-cloud ZA Abduljabbar, H Jin, A Ibrahim, ZA Hussien, MA Hussain, SH Abbdal, ... 2016 IEEE Trustcom/BigDataSE/ISPA, 799-806, 2016 | 24 | 2016 |
Provably secure session key agreement protocol for unmanned aerial vehicles packet exchanges VO Nyangaresi, A Ibrahim, ZA Abduljabbar, MA Hussain, MA Al Sibahee, ... 2021 International Conference on Electrical, Computer and Energy …, 2021 | 23 | 2021 |
SEPIM: Secure and efficient private image matching ZA Abduljabbar, H Jin, A Ibrahim, ZA Hussien, MA Hussain, SH Abbdal, ... Applied Sciences 6 (8), 213, 2016 | 21 | 2016 |
Towards efficient yet privacy-preserving approximate search in cloud computing A Ibrahim, H Jin, AA Yassin, D Zou, P Xu The Computer Journal 57 (2), 241-254, 2014 | 18 | 2014 |
EEIRI: efficient encrypted image retrieval in IoT-cloud ZA Abduljabbar, A Ibrahim, MA Hussain, ZA Hussien, MA Al Sibahee, ... KSII Transactions on Internet and Information Systems (TIIS) 13 (11), 5692-5716, 2019 | 17 | 2019 |
Secure biometric image retrieval in IoT-cloud ZA Abduljabbar, H Jin, A Ibrahim, ZA Hussien, MA Hussain, SH Abbdal, ... 2016 IEEE International Conference on Signal Processing, Communications and …, 2016 | 16 | 2016 |
Approximate keyword-based search over encrypted cloud data A Ibrahim, H Jin, AA Yassin, D Zou 2012 IEEE Ninth International Conference on e-Business Engineering, 238-245, 2012 | 16 | 2012 |
Towards privacy preserving mining over distributed cloud databases A Ibrahim, H Jin, AA Yassin, D Zou 2012 Second International Conference on Cloud and Green Computing, 130-136, 2012 | 15 | 2012 |
Hiding data using LSB-3 AI Abdul-Sada J. Basrah Researches (Sciences) 33 (4), 81-88, 2007 | 14 | 2007 |
Secure image retrieval over untrusted cloud servers AI Abdulsada, ANM Ali, ZA Abduljabbar, HS Hashim International Journal of Engineering and Advanced Technology 3 (1), 140-147, 2013 | 13 | 2013 |