Follow
ahmad abusukhon
Title
Cited by
Cited by
Year
A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm
A Abusukhon, MN Anwar, Z Mohammad, B Alghannam
Journal of Discrete Mathematical Sciences and Cryptography 22 (1), 65-81, 2019
422019
A novel network security algorithm based on private key encryption
A Abusukhon, M Talib
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
402012
On the security of the standardized MQV protocol and its based Evolution Protocols
Z Mohammad, V Nyangaresi, A Abusukhon
2021 International Conference on Information Technology (ICIT), 320-325, 2021
312021
New direction of cryptography: A review on text-to-image encryption algorithms based on RGB color value
A Abusukhon, S AlZu’bi
2020 Seventh International Conference on Software Defined Systems (SDS), 235-239, 2020
302020
Secure network communication based on text-to-image encryption
A Abusukhon, M Talib, I Ottoum
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (4 …, 2012
282012
Block cipher encryption for text-to-image algorithm
AS Abusukhon
International Journal of Computer Engineering & Technology (IJCET) 4 (3), 50-59, 2013
232013
A secure network communication protocol based on text to barcode encryption algorithm
A Ahmad, B Hawashin
International Journal of Advanced Computer Science and Applications 6 (12 …, 2015
202015
Distributed text-to-image encryption algorithm
A Ahmad, T Mohammad, HM Almimi
International Journal of Computer Applications 106 (1), 2014
202014
An efficient user interest extractor for recommender systems
B Hawashin, A Abusukhon, A Mansour
Proceedings of the World Congress on Engineering and Computer Science 2, 2015
192015
An efficient cold start solution for recommender systems based on machine learning and user interests
B Hawashin, S Alzubi, A Mughaid, F Fotouhi, A Abusukhon
2020 seventh international conference on software defined systems (SDS), 220-225, 2020
182020
Efficient and secure key exchange protocol based on elliptic curve and security models
A Abusukhon, Z Mohammad, A Al-Thaher
2019 IEEE Jordan International Joint Conference on Electrical Engineering …, 2019
182019
Analyzing the efficiency of Text-to-Image encryption algorithm
A Abusukhon, M Talib, MA Nabulsi
International Journal of Advanced Computer Science and Applications 3 (11), 2012
182012
Toward achieving a balance between the user satisfaction and the power conservation in the internet of things
A Abusukhon
IEEE Internet of Things Journal 8 (14), 10998-11015, 2021
172021
A study of group B streptococcal colonization and infection in newborns in Pakistan
T Akhtar, S Zai, J Khatoon, A Zohra, M Taj Roghani, A Ahmad
Journal of tropical pediatrics 33 (6), 302-304, 1987
171987
A comparative performance analysis of route redistribution among three different routing protocols based on opnet simulation
Z Mohammad, A Abusukhon, MA Al-Maitah
International Journal of Computer Networks & Communications (IJCNC) 9 (2), 39-55, 2017
162017
A novel network security algorithm based on encrypting text into a white-page image
ZM Ahmad Abusukhon, M Talib
Proceedings of the World Congress on Engineering and Computer Science 1, 2016
162016
A survey of authenticated Key Agreement Protocols for securing IoT
Z Mohammad, A Abusukhon, TA Qattam
2019 IEEE Jordan International Joint Conference on Electrical Engineering …, 2019
152019
Geopolymer utilization in the pavement industry-An overview
NSA Yaro, M Napiah, MH Sutanto, A Usman, AH Jagaba, AU Mani, ...
IOP Conference Series: Earth and Environmental Science 1022 (1), 012025, 2022
142022
Performance analysis of route redistribution among diverse dynamic routing protocols based on opnet simulation
Z Mohammad, A Abusukhon, AA Hnaif, IS Al-Otoum
International Journal of Advanced Computer Science and Applications 8 (3), 2017
132017
Double-blind placebo-controlled study of oral cimetidine treatment for molluscum contagiosum
F Antony, S Cliff, A Ahmad, C Holden
BRITISH JOURNAL OF DERMATOLOGY-SUPPLEMENT- 145, 126-126, 2001
122001
The system can't perform the operation now. Try again later.
Articles 1–20