متابعة
Keyan Alsibahi
Keyan Alsibahi
IT & Communication Center, University of Basrah
بريد إلكتروني تم التحقق منه على uobasrah.edu.iq - الصفحة الرئيسية
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Efficient encrypted image retrieval in IoT-cloud with multi-user authentication
MA Al Sibahee, S Lu, ZA Abduljabbar, A Ibrahim, ZA Hussien, KAA Mutlaq, ...
International Journal of Distributed Sensor Networks 14 (2), 1550147718761814, 2018
252018
Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment
KAA Mutlaq, VO Nyangaresi, MA Omar, ZA Abduljabbar
Applied Cryptography in Computer and Communications 448, 64-64, 2022
202022
Cloud authentication based on encryption of digital image using edge detection
AA Yassin, AA Hussain, KAA Mutlaq
2015 The International Symposium on Artificial Intelligence and Signal …, 2015
152015
The Best Performance Evaluation of Encryption Algorithms to Reduce Power Consumption in WSN
MA Al Sibahee, S Lu, ZA Hussien, MA Hussain, KAA Mutlaq, ...
2017 International Conference on Computing Intelligence and Information …, 2017
142017
Hiding encrypted text in image steganography
HR Kareem, HH Madhi, KAA Mutlaq
Periodicals of Engineering and Natural Sciences (PEN) 8 (2), 703-707, 2020
92020
Security issues in cloud computing
KAA Mutlaq
SRJIS 1 (3), 709-714, 2012
72012
Forward and Backward Key Secrecy Preservation Scheme for Medical Internet of Things
VO Nyangaresi, ZA Abduljabbar, KAA Mutlaq, MA Hussain, ZA Hussien
Human-Centric Smart Computing, 15-29, 2023
62023
Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes
VO Nyangaresi, ZA Abduljabbar, KAA Mutlaq, J Ma, DG Honi, ...
Applied Sciences 12 (24), 12688, 2022
62022
Towards Fast Edge Detection Approach for Industrial Products
DG Honi, AH Ali, ZA Abduljabbar, J Ma, VO Nyangaresi, KAA Mutlaq, ...
2022 IEEE 21st International Conference on Ubiquitous Computing and …, 2022
52022
Addressing big data analytics for classification intrusion detection system
KAA Mutlaq, HH Madhi, HR Kareem
Periodicals of Engineering and Natural Sciences (PEN) 8 (2), 693-702, 2020
52020
A Symmetric Key and Elliptic Curve Cryptography-Based Protocol for Message Encryption in Unmanned Aerial Vehicles
VO Nyangaresi, HM Jasim, KAA Mutlaq, ZA Abduljabbar, J Ma, ...
Electronics 12 (17), 3688, 2023
42023
Low complexity smart grid security protocol based on elliptic curve cryptography, biometrics and hamming distance
KAA Mutlaq, VO Nyangaresi, MA Omar, ZA Abduljabbar, IQ Abduljaleel, ...
Plos one 19 (1), e0296781, 2024
12024
Modeling and Prediction LTE 4G NW according to Memory Algorithm of Long-Short Term
KAA Mutlaq, HR Kareem, GY Abbass
International Journal of Intelligent Systems and Applications in Engineering …, 2023
12023
Toward Awareness Locality Algorithms of Peer-to-Peer File Sharing Network
KAA Mutlaq, ZA Abduljabbar, ZA Abduljabbar, E Liu, MA Al Sibahee
Proceedings of the 2020 5th International Conference on Cloud Computing and …, 2020
2020
تقديم نظام اخفاء نصوص في الصور الملونة يعتمد على تقنية هيل في تشفير النص واخفاءه في البت الاقل اهمية LSB في الصورة
م.م. كيان عبدالعزيز مطلق
مجلة ابحاث ميسان, 2018
2018
AISP 2015 Authors Index
AA Hussain, AA Yassin, M Abadi, S Abdali, M Abdollahifard, KAA Mutlaq, ...
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–16