Personal information

Activities

Works (26)

Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System

IEEE Access
2020 | Journal article
EID:

2-s2.0-85097367734

Part of ISSN: 21693536
Contributors: Al Sibahee, M.A.; Lu, S.; Abduljabbar, Z.A.; Liu, X.; Abdalla, H.B.; Hussain, M.A.; Hussien, Z.A.; Ghrabat, M.J.J.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud

ICSPCC 2020 - IEEE International Conference on Signal Processing, Communications and Computing, Proceedings
2020 | Conference paper
EID:

2-s2.0-85097727412

Contributors: Sibahee, M.A.A.; Lu, S.; Abduljabbar, Z.A.; Liu, E.X.; Ran, Y.; Al-Ashoor, A.A.J.; Hussain, M.A.; Hussien, Z.A.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

An efficient and secure scheme for dynamic shared data in cloud

ACM International Conference Proceeding Series
2019 | Conference paper
EID:

2-s2.0-85074820976

Contributors: Hussien, Z.A.; Al Sibahee, M.A.; Abduljabbar, Z.A.; Lu, S.; Hussain, M.A.; AL-Asadi, H.A.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

EEIRI: Efficient encrypted image retrieval in IoT-cloud

KSII Transactions on Internet and Information Systems
2019 | Journal article
EID:

2-s2.0-85076110407

Part of ISSN: 22881468 19767277
Contributors: Abduljabbar, Z.A.; Ibrahim, A.; Hussain, M.A.; Hussien, Z.A.; Al Sibahee, M.A.; Lu, S.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

Boost Secure Sockets Layer against Man-in-The-Middle Sniffing Attack via SCPK

ICOASE 2018 - International Conference on Advanced Science and Engineering
2018 | Conference paper
EID:

2-s2.0-85060008397

Contributors: Hussain, M.A.; Alaa Hussien, Z.; Abduljabbar, Z.A.; Abdulridha Hussain, S.; Al Sibahee, M.A.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

Efficient encrypted image retrieval in IoT-cloud with multi-user authentication

International Journal of Distributed Sensor Networks
2018 | Journal article
EID:

2-s2.0-85042751538

Part of ISSN: 15501477 15501329
Contributors: Al Sibahee, M.A.; Lu, S.; Abduljabbar, Z.A.; Ibrahim, A.; Hussien, Z.A.; Mutlaq, K.A.-A.; Hussain, M.A.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

The best performance evaluation of encryption algorithms to reduce power consumption in WSN

Proceedings - 2017 International Conference on Computing Intelligence and Information System, CIIS 2017
2018 | Conference paper
EID:

2-s2.0-85050645556

Contributors: Sibahee, M.A.A.; Lu, S.; Hussien, Z.A.; Hussain, M.A.; Mutlaq, K.A.-A.; Abduljabbar, Z.A.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

ARP enhancement to stateful protocol by registering ARP request

Proceedings - 2016 International Conference on Network and Information Systems for Computers, ICNISC 2016
2017 | Conference paper
EID:

2-s2.0-85023181311

Contributors: Hussain, M.A.; Jin, H.; Hussien, Z.A.; Abduljabbar, Z.A.; Abbdal, S.H.; Ibrahim, A.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

Enc-DNS-HTTP: Utilising DNS infrastructure to secure web browsing

Security and Communication Networks
2017 | Journal article
EID:

2-s2.0-85042770824

Part of ISSN: 19390122 19390114
Contributors: Hussain, M.A.; Jin, H.; Hussien, Z.A.; Abduljabbar, Z.A.; Abbdal, S.H.; Ibrahim, A.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

LEACH-T: LEACH clustering protocol based on three layers

Proceedings - 2016 International Conference on Network and Information Systems for Computers, ICNISC 2016
2017 | Conference paper
EID:

2-s2.0-85023193630

Contributors: Al Sibahee, M.A.; Lu, S.; Masoud, M.Z.; Hussien, Z.A.; Hussain, M.A.; Abduljabbar, Z.A.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

A secured scheme for geographical distance computation over encrypted cloud data

Proceedings of 2015 4th International Conference on Computer Science and Network Technology, ICCSNT 2015
2016 | Conference paper
EID:

2-s2.0-84979230990

Contributors: Abduljabbar, Z.A.; Jin, H.; Ibrahim, A.; Noori, A.; Hussain, M.A.; Hussien, Z.A.; Zou, D.; Abbdal, S.H.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage

Proceedings - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016
2016 | Conference paper
EID:

2-s2.0-84979787349

Contributors: Abbdal, S.H.; Jin, H.; Yassin, A.A.; Abduljabbar, Z.A.; Hussain, M.A.; Hussien, Z.A.; Zou, D.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

DNS Protection against Spoofing and Poisoning Attacks

Proceedings - 2016 3rd International Conference on Information Science and Control Engineering, ICISCE 2016
2016 | Conference paper
EID:

2-s2.0-85001033003

Contributors: Hussain, M.A.; Jin, H.; Hussien, Z.A.; Abduljabbar, Z.A.; Abbdal, S.H.; Ibrahim, A.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

Ensuring data integrity scheme based on digital signature and iris features in cloud

Indonesian Journal of Electrical Engineering and Computer Science
2016 | Journal article
EID:

2-s2.0-85014388335

Part of ISSN: 25024760 25024752
Contributors: Refish, S.H.; Jabbar, Z.A.A.; Hussien, Z.A.; Kadhim, T.A.; Yassin, A.A.; Hussain, M.A.; Waley, S.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

New data integrity scheme employing wavelet-based digital watermarking in cloud environment

Proceedings of 2015 4th International Conference on Computer Science and Network Technology, ICCSNT 2015
2016 | Conference paper
EID:

2-s2.0-84979211119

Contributors: Abbdal, S.H.; Jin, H.; Yassin, A.A.; Abduljabbar, Z.A.; Hussain, M.A.; Hussien, Z.A.; Zou, D.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

Privacy-preserving image retrieval in IoT-cloud

Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016
2016 | Conference paper
EID:

2-s2.0-85015237791

Contributors: Abduljabbar, Z.A.; Jin, H.; Ibrahim, A.; Hussien, Z.A.; Hussain, M.A.; Abbdal, S.H.; Zou, D.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext

Proceedings of the 2015 11th International Conference on Information Assurance and Security, IAS 2015
2016 | Conference paper
EID:

2-s2.0-84979523695

Contributors: Hussien, Z.A.; Jin, H.; Abduljabbar, Z.A.; Yassin, A.A.; Hussain, M.A.; Abbdal, S.H.; Zou, D.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment

Proceedings of the 2015 11th International Conference on Information Assurance and Security, IAS 2015
2016 | Conference paper
EID:

2-s2.0-84979502831

Contributors: Abduljabbar, Z.A.; Jin, H.; Hussien, Z.A.; Yassin, A.A.; Hussain, M.A.; Abbdal, S.H.; Zou, D.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

Robust scheme to protect authentication code of message/image documents in cloud computing

2016 International Conference on Computing, Networking and Communications, ICNC 2016
2016 | Conference paper
EID:

2-s2.0-84966661814

Contributors: Abduljabbar, Z.A.; Jin, H.; Yassin, A.A.; Hussien, Z.A.; Hussain, M.A.; Abbdal, S.H.; Zou, D.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

Scheme for ensuring data security on cloud data storage in a semi-Trusted third party auditor

Proceedings of 2015 4th International Conference on Computer Science and Network Technology, ICCSNT 2015
2016 | Conference paper
EID:

2-s2.0-84979246859

Contributors: Hussien, Z.A.; Jin, H.; Abduljabbar, Z.A.; Hussain, M.A.; Abbdal, S.H.; Zou, D.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

Secure and efficient e-health scheme based on the Internet of Things

ICSPCC 2016 - IEEE International Conference on Signal Processing, Communications and Computing, Conference Proceedings
2016 | Conference paper
EID:

2-s2.0-85006855033

Contributors: Hussien, Z.A.; Jin, H.; Abduljabbar, Z.A.; Hussain, M.A.; Yassin, A.A.; Abbdal, S.H.; Al Sibahee, M.A.; Zou, D.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

Secure biometric image retrieval in IoT-cloud

ICSPCC 2016 - IEEE International Conference on Signal Processing, Communications and Computing, Conference Proceedings
2016 | Conference paper
EID:

2-s2.0-85006857239

Contributors: Abduljabbar, Z.A.; Jin, H.; Ibrahim, A.; Hussien, Z.A.; Hussain, M.A.; Abbdal, S.H.; Zou, D.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

SEPIM: Secure and efficient private image matching

Applied Sciences (Switzerland)
2016 | Journal article
EID:

2-s2.0-84984666851

Part of ISSN: 20763417
Contributors: Abduljabbar, Z.A.; Jin, H.; Ibrahim, A.; Hussien, Z.A.; Hussain, M.A.; Abbdal, S.H.; Zou, D.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment

Proceedings - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016
2016 | Conference paper
EID:

2-s2.0-84979740842

Contributors: Abduljabbar, Z.A.; Jin, H.; Hussien, Z.A.; Yassin, A.A.; Hussain, M.A.; Abbdal, S.H.; Zou, D.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

Towards secure private image matching

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016 | Book
EID:

2-s2.0-84969168146

Part of ISSN: 16113349 03029743
Contributors: Abduljabbar, Z.A.; Jin, H.; Ibrahim, A.; Hussien, Z.A.; Hussain, M.A.; Abbdal, S.H.; Zou, D.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier

An efficient and robust one-time message authentication code scheme using feature extraction of iris in cloud computing

Proceedings of 2014 International Conference on Cloud Computing and Internet of Things, CCIOT 2014
2014 | Conference paper
EID:

2-s2.0-84946688332

Contributors: Abduljabbar, Z.; Jin, H.; Zou, D.; Yassin, A.A.; Hussien, Z.; Hussain, M.A.
Source: Self-asserted source
Mohammed Hussain via Scopus - Elsevier