New direction of cryptography: A review on text-to-image encryption algorithms based on RGB color value

A Abusukhon, S AlZu'bi - 2020 Seventh International …, 2020 - ieeexplore.ieee.org
Data encryption techniques are important for answering the question: How secure is the
Internet for sending sensitive data. Keeping data secure while they are sent through the …

Security weaknesses and attacks on the internet of things applications

Z Mohammad, TA Qattam… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is a contemporary concept for connecting the existing things in our
environment with the Internet for a sake of making the objects information are accessible …

On the security of the standardized MQV protocol and its based Evolution Protocols

Z Mohammad, V Nyangaresi… - 2021 International …, 2021 - ieeexplore.ieee.org
The MQV is an authenticated key agreement protocol which does not use any one-way hash
functions in its block design, and it is standardized in (IEEE, ANSI, and ISO). However, its …

A fast text-to-image encryption-decryption algorithm for secure network communication

NS Noor, DA Hammood, A Al-Naji, J Chahl - Computers, 2022 - mdpi.com
Data security is the science of protecting data in information technology, including
authentication, data encryption, data decryption, data recovery, and user protection. To …

Toward achieving a balance between the user satisfaction and the power conservation in the Internet of Things

A Abusukhon - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
In the recent era of digital revolution, life has become simple and more comfortable than it
was before. Today, we are witnessing a revolution in the information technology domain …

An efficient cold start solution for recommender systems based on machine learning and user interests

B Hawashin, S Alzubi, A Mughaid… - … on software defined …, 2020 - ieeexplore.ieee.org
Recommender Systems are used to provide suggestions to users based on their interests.
One of the well-known problems in recommender systems is the cold start problem, which …

[PDF][PDF] An Efficient System for Reducing the Power Consumption in Offices Using the Internet of Things.

A Abusukhon, B Hawashin, M Lafi - … of Advances in Soft Computing & Its …, 2021 - i-csrs.org
Nowadays, Electricity energy is considered the lifeblood of many companies and industrial
institutions. Most of these companies and industrial institutions are suffering from the high …

Efficient and secure key exchange protocol based on elliptic curve and security models

A Abusukhon, Z Mohammad… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
nowadays, the success of many online applications relays on keeping the data sent through
the global network secure and far away from hackers. To carry out this task, the two …

Efficient texture classification using independent component analysis

B Hawashin, A Mansour, J Abukhait… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
Texture classification is the assignment of texture to one or more texture classes. It has been
largely used in various fields. This paper proposes a system for Texture Classification using …

Mimic encryption box for network multimedia data security

X Zhou, B Li, Y Qi, W Dong - Security and Communication …, 2020 - Wiley Online Library
With the rapid development of the Internet, the security of network multimedia data has
attracted increasingly more attention. The moving target defense (MTD) and cyber mimic …