Aes and ecc mixed for zigbee wireless sensor security S Al-alak, Z Ahmed, A Abdullah, S Subramiam International Journal of Electronics and Communication Engineering 5 (9 …, 2011 | 25 | 2011 |
Secret key generation in wireless sensor network using public key encryption MH Bashaa, SM Al-Alak, AK Idrees Proceedings of the international conference on information and communication …, 2019 | 15 | 2019 |
Improved image security in internet of thing (IoT) using multiple key AES KG Salim, SMK Al-alak, MJ Jawad Baghdad Science Journal 18 (2), 0417-0417, 2021 | 12 | 2021 |
Evaluation key generator of Multiple Asymmetric methods in Wireless Sensor Network (WSNs) AH Hamza, S Al-Alak Journal of Physics: Conference Series 1804 (1), 012096, 2021 | 9 | 2021 |
Improving blockchain consensus mechanism via network clusters AJ Al-Musharaf, SM Al-Alak, HM Al-Mashhadi 2021 1st Babylon International Conference on Information Technology and …, 2021 | 6 | 2021 |
Randomness improvement of AES using MKP S Al-Alak, Z Zukarnain, A Abdullah, S Subramiam Research Journal of Information Technology 5, 24-34, 2013 | 6 | 2013 |
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel MA Naser, SM Al-Alak, HA Mohammed, MJ Jawad Baghdad Science Journal, 2022 | 3 | 2022 |
Node Protection using Hiding Identity for IPv6 Based Network MH Ali, S Al-Alak 2022 Muthanna International Conference on Engineering Science and Technology …, 2022 | 2 | 2022 |
Symmetric security algorithms implementation in CBC mode MT Hadi, S Al-Alak Journal of University of Babylon for Pure and Applied Sciences, 126-144, 2021 | 2 | 2021 |
Sowing Seeds Protocol based Key Distribution for Wireless Sensor Network S Al-Alak International Journal of Applied Engineering Research 12 (24), 14882-14888, 2017 | 2 | 2017 |
Adapted LZW Protocol for ECG Data Compression SMK Al-alak, IH Alwan, AA Hussein Journal of University of Babylon, Pure and Applied Sciences 25 (5), 1618-1626, 2017 | 2 | 2017 |
Authentication Time of IEEE 802.15.4 with Multiple-key Protocol Using Distributed Message Authentication Code Algorithm AA Saif, Z Zuriati, A Azizol, S Subramiam Research Journal of Information Technology 4 (4), 140-154, 2012 | 2 | 2012 |
A Developed Compression Scheme to Optimize Data Transmission in Wireless Sensor Networks Z Mazin, S Al-Alak Iraqi Journal of Science, 1463-1476, 2023 | 1 | 2023 |
Using Unique Node ID TO Control IPv6 ID Spoofing MH Ali, S Al-Alak Journal of Physics: Conference Series 1999 (1), 012120, 2021 | 1 | 2021 |
Secret Keys Extraction Using Light Weight Schemes for Data Ciphering SN Hussein, SM Al-Alak Journal of Physics: Conference Series 1999 (1), 012114, 2021 | 1 | 2021 |
Adaptive Security Protocol for Wireless Body Area Network A Saif, A Mohammed, M Ahmed Journal of Kerbala University Scientific 14 (2), 153-162, 2016 | 1* | 2016 |
Design and Implementation of Multi-key Blowfish and CAST Algorithm: Comparative Study with CBC, CFB and CTR Modes BJM Jawad, S Al-alak Wasit Journal of Computer and Mathematics Science 2 (4), 87-98, 2023 | | 2023 |
DSK: The Proposed Method for Deriving Secret Keys for encrypting of the block in the networks BJM Jawad, S Al-Alak 2023 1st International Conference on Advanced Engineering and Technologies …, 2023 | | 2023 |
Blockchain Technology with High Performance via Parallel Processing RM Hameed, S Al-Alak International Conference on Intelligence Science, 281-295, 2023 | | 2023 |
Survey: Using Blockchain Technology in Smart Life Applications RM Hameed, S Al-Alak Journal of University of Babylon for pure and applied sciences 31 (2), 2023 | | 2023 |