Vppcs: Vanet-based privacy-preserving communication scheme MA Al-Shareeda, M Anbar, S Manickam, AA Yassin IEEE Access 8, 150914-150928, 2020 | 101 | 2020 |
Efficient conditional anonymity with message integrity and authentication in a vehicular ad-hoc network MA Alazzawi, H Lu, AA Yassin, K Chen Ieee Access 7, 71424-71435, 2019 | 100 | 2019 |
Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing AA Yassin, H Jin, A Ibrahim, D Zou 2012 Second International Conference on Cloud and Green Computing, 282-289, 2012 | 58 | 2012 |
Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data A Ibrahim, H Jin, AA Yassin, D Zou 2012 IEEE Asia-Pacific Services Computing Conference, 263-270, 2012 | 54 | 2012 |
Cloud authentication based on anonymous one-time password AA Yassin, H Jin, A Ibrahim, W Qiang, D Zou Ubiquitous Information Technologies and Applications: CUTE 2012, 423-431, 2013 | 45 | 2013 |
Efficient password-based two factors authentication in cloud computing AA Yassin, H Jin, A Ibrahim, W Qiang, D Zou International Journal of Security and Its Applications 6 (2), 143-148, 2012 | 39 | 2012 |
A practical privacy-preserving password authentication scheme for cloud computing AA Yassin, H Jin, A Ibrahim, W Qiang, D Zou 2012 IEEE 26th International Parallel and Distributed Processing Symposium …, 2012 | 37 | 2012 |
Low-overhead remote user authentication protocol for IoT based on a fuzzy extractor and feature extraction BH Taher, S Jiang, AA Yassin, H Lu IEEE Access 7, 148950-148966, 2019 | 32 | 2019 |
A Secure and Lightweight ThreeFactor Remote User Authentication Protocol for Future IoT Applications BH Taher, H Liu, F Abedi, H Lu, AA Yassin, AJ Mohammed Journal of Sensors 2021 (1), 8871204, 2021 | 27 | 2021 |
An Efficient Mechanism to Prevent the Phishing Attacks. MH Alzuwaini, AA Yassin Iraqi Journal for Electrical & Electronic Engineering 17 (1), 2021 | 21 | 2021 |
Towards efficient yet privacy-preserving approximate search in cloud computing A Ibrahim, H Jin, AA Yassin, D Zou, P Xu The Computer Journal 57 (2), 241-254, 2014 | 19 | 2014 |
Secure and efficient e-health scheme based on the Internet of Things ZA Hussien, H Jin, ZA Abduljabbar, MA Hussain, AA Yassin, SH Abbdal, ... 2016 IEEE International Conference on Signal Processing, Communications and …, 2016 | 17 | 2016 |
Cloud authentication based on encryption of digital image using edge detection AA Yassin, AA Hussain, KAA Mutlaq 2015 The International Symposium on Artificial Intelligence and Signal …, 2015 | 17 | 2015 |
Using discrete wavelet transformation to enhance underwater image AA Yassin, RM Ghadban, SF Salah, HZ Neima International Journal of Computer Science Issues 10 (2), 220-228, 2013 | 16 | 2013 |
Approximate keyword-based search over encrypted cloud data A Ibrahim, H Jin, AA Yassin, D Zou 2012 IEEE Ninth International Conference on e-Business Engineering, 238-245, 2012 | 16 | 2012 |
Towards privacy preserving mining over distributed cloud databases A Ibrahim, H Jin, AA Yassin, D Zou 2012 Second International Conference on Cloud and Green Computing, 130-136, 2012 | 15 | 2012 |
Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext ZA Hussien, H Jin, ZA Abduljabbar, AA Yassin, MA Hussain, SH Abbdal, ... 2015 11th International Conference on Information Assurance and Security …, 2015 | 14 | 2015 |
Privacy-preserving multi-factor authentication and role-based access control scheme for the E-healthcare system M Fareed, AA Yassin Bulletin of Electrical Engineering and Informatics 11 (4), 2131-2141, 2022 | 13 | 2022 |
Secure Patient Authentication Scheme in the Healthcare System Using Symmetric Encryption. NM Hamed, AA Yassin Iraqi Journal for Electrical & Electronic Engineering 18 (1), 2022 | 13 | 2022 |
Efficient and flexible multi-factor authentication protocol based on fuzzy extractor of administrator’s fingerprint and smart mobile device AJ Mohammed, AA Yassin Cryptography 3 (3), 24, 2019 | 13 | 2019 |