Efficient encrypted image retrieval in IoT-cloud with multi-user authentication MA Al Sibahee, S Lu, ZA Abduljabbar, A Ibrahim, ZA Hussien, KAA Mutlaq, ... International Journal of Distributed Sensor Networks 14 (2), 1550147718761814, 2018 | 25 | 2018 |
Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment KAA Mutlaq, VO Nyangaresi, MA Omar, ZA Abduljabbar Applied Cryptography in Computer and Communications 448, 64-64, 2022 | 20 | 2022 |
Cloud authentication based on encryption of digital image using edge detection AA Yassin, AA Hussain, KAA Mutlaq 2015 The International Symposium on Artificial Intelligence and Signal …, 2015 | 15 | 2015 |
The Best Performance Evaluation of Encryption Algorithms to Reduce Power Consumption in WSN MA Al Sibahee, S Lu, ZA Hussien, MA Hussain, KAA Mutlaq, ... 2017 International Conference on Computing Intelligence and Information …, 2017 | 14 | 2017 |
Hiding encrypted text in image steganography HR Kareem, HH Madhi, KAA Mutlaq Periodicals of Engineering and Natural Sciences (PEN) 8 (2), 703-707, 2020 | 9 | 2020 |
Security issues in cloud computing KAA Mutlaq SRJIS 1 (3), 709-714, 2012 | 7 | 2012 |
Forward and Backward Key Secrecy Preservation Scheme for Medical Internet of Things VO Nyangaresi, ZA Abduljabbar, KAA Mutlaq, MA Hussain, ZA Hussien Human-Centric Smart Computing, 15-29, 2023 | 6 | 2023 |
Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes VO Nyangaresi, ZA Abduljabbar, KAA Mutlaq, J Ma, DG Honi, ... Applied Sciences 12 (24), 12688, 2022 | 6 | 2022 |
Towards Fast Edge Detection Approach for Industrial Products DG Honi, AH Ali, ZA Abduljabbar, J Ma, VO Nyangaresi, KAA Mutlaq, ... 2022 IEEE 21st International Conference on Ubiquitous Computing and …, 2022 | 5 | 2022 |
Addressing big data analytics for classification intrusion detection system KAA Mutlaq, HH Madhi, HR Kareem Periodicals of Engineering and Natural Sciences (PEN) 8 (2), 693-702, 2020 | 5 | 2020 |
A Symmetric Key and Elliptic Curve Cryptography-Based Protocol for Message Encryption in Unmanned Aerial Vehicles VO Nyangaresi, HM Jasim, KAA Mutlaq, ZA Abduljabbar, J Ma, ... Electronics 12 (17), 3688, 2023 | 4 | 2023 |
Low complexity smart grid security protocol based on elliptic curve cryptography, biometrics and hamming distance KAA Mutlaq, VO Nyangaresi, MA Omar, ZA Abduljabbar, IQ Abduljaleel, ... Plos one 19 (1), e0296781, 2024 | 1 | 2024 |
Modeling and Prediction LTE 4G NW according to Memory Algorithm of Long-Short Term KAA Mutlaq, HR Kareem, GY Abbass International Journal of Intelligent Systems and Applications in Engineering …, 2023 | 1 | 2023 |
Toward Awareness Locality Algorithms of Peer-to-Peer File Sharing Network KAA Mutlaq, ZA Abduljabbar, ZA Abduljabbar, E Liu, MA Al Sibahee Proceedings of the 2020 5th International Conference on Cloud Computing and …, 2020 | | 2020 |
تقديم نظام اخفاء نصوص في الصور الملونة يعتمد على تقنية هيل في تشفير النص واخفاءه في البت الاقل اهمية LSB في الصورة م.م. كيان عبدالعزيز مطلق مجلة ابحاث ميسان, 2018 | | 2018 |
AISP 2015 Authors Index AA Hussain, AA Yassin, M Abadi, S Abdali, M Abdollahifard, KAA Mutlaq, ... | | |