Personal information

Verified email domains

Australia

Activities

Employment (1)

University of Thi-Qar: Thi-Qar, Nasiriyah, IQ

Lecturer/Teacher (Department of Computer Science, Education College)
Employment
Source: Self-asserted source
Mishall Al-Zubaidie

Works (34)

Blockchain and Cryptography Framework of E-Apps with Big Data

Journal of Education for Pure Science
2024 | Journal article
Contributors: Wid Alaa Jebbar; Rasha Hallem Razzaq; Duaa Hammoud Tahayur; Mishall Al-Zubaidie
Source: check_circle
Web of Science Researcher Profile Sync

Classification Manner Utilizing Electroencephalography Signals to Investigate Waveforms

Karbala International Journal of Modern Science
2024 | Journal article
Contributors: Wessam Al-Salman; Ali Basim Al-Khafaji; Mishall Al-Zubaidie
Source: check_circle
Web of Science Researcher Profile Sync

Enhancing Electronic Agriculture Data Security with a Blockchain-Based Search Method and E-Signatures

Mesopotamian Journal of CyberSecurity
2024 | Journal article
Contributors: Duaa Hammoud Tahayur; Mishall Al-Zubaidie
Source: check_circle
Web of Science Researcher Profile Sync

Integrating Trustworthy Mechanisms to Support Data and Information Security in Health Sensors

Procedia Computer Science
2024 | Journal article
Contributors: Al-Zubaidie, M.; Muhajjar, R.A.
Source: check_circle
Web of Science Researcher Profile Sync

Intermediary Decentralized Computing and Private Blockchain Mechanisms for Privacy Preservation in the Internet of Medical Things

Mesopotamian Journal of CyberSecurity
2024 | Journal article
Contributors: Rasha Halim Razzaq; Mishall Al-Zubaidie; Rajaa Ghali Atiyah
Source: check_circle
Web of Science Researcher Profile Sync

Maintaining Security of Patient Data by Employing Private Blockchain and Fog Computing Technologies based on Internet of Medical Things

Informatica
2024 | Journal article
Contributors: Mishall H Al-Zubaidie; Rasha Halim Razzaq
Source: check_circle
Web of Science Researcher Profile Sync

Transaction Security and Management of Blockchain-Based Smart Contracts in E-Banking-Employing Microsegmentation and Yellow Saddle Goatfish

Mesopotamian Journal of Cyber Security
2024 | Journal article
Contributors: Mishall Al-Zubaidie; Wid Jebbar
Source: check_circle
Web of Science Researcher Profile Sync

Computer Networking and Cloud-Based Learning/Teaching Environment Using Virtual Labs Tools: A Review and Future Aspirations

Mesopotamian Journal of Computer Science
2024-11-24 | Journal article
Contributors: Mishall Al-Zubaidie; Raad A. Muhajjar; Lauy Abdulwahid Shihabe
Source: check_circle
Crossref

Transaction-Based Blockchain Systems Security Improvement Employing Micro-Segmentation Controlled by Smart Contracts and Detection of Saddle Goatfish

SN Computer Science
2024-09-26 | Journal article
Contributors: Wid Alaa Jebbar; Mishall Al-Zubaidie
Source: check_circle
Crossref

Formulating an Advanced Security Protocol for Internet of Medical Things based on Blockchain and Fog Computing Technologies

Iraqi Journal For Computer Science and Mathematics
2024-08-31 | Journal article
Part of ISSN: 2788-7421
Part of ISSN: 2958-0544
Contributors: Rasha Hallem Razzaq
Source: Self-asserted source
Mishall Al-Zubaidie

Providing Security for Flash Loan System Using Cryptocurrency Wallets Supported by XSalsa20 in a Blockchain Environment

Applied Sciences
2024-07 | Journal article | Author
Contributors: Mishall Al-Zubaidie; Wid Alaa jebbar
Source: check_circle
Multidisciplinary Digital Publishing Institute
grade
Preferred source (of 2)‎

Calculation of Tidal Constituents Using a Numerical Model in the Shatt al-Arab River Estuary

Journal of Education for Pure Science
2023 | Journal article
Contributors: Adel Jassim Al- Fartusi
Source: check_circle
Web of Science Researcher Profile Sync

Designing A Blockchain Approach to Secure Firefighting Stations Based Internet of Things

Informatica
2023 | Journal article
Contributors: Samaher Ahmed Yousiff; Raad A Muhajjar; Mishall H Al-Zubaidie
Source: check_circle
Web of Science Researcher Profile Sync

Elliptic Curve Implementation and its Applications: A Review

Iraqi Journal of Intelligent Computing and Informatics (IJICI)
2023 | Journal article
Contributors: Mohamed Wameedh Abdulnabi
Source: check_circle
Web of Science Researcher Profile Sync

Applying Detection Leakage on Hybrid Cryptography to Secure Transaction Information in E-Commerce Apps

Future Internet
2023-08-01 | Journal article
Contributors: Mishall Al-Zubaidie; Ghanima Sabr Shyaa
Source: check_circle
Crossref
grade
Preferred source (of 3)‎

Utilizing Trusted Lightweight Ciphers to Support Electronic-Commerce Transaction Cryptography

Applied Sciences
2023-06-13 | Journal article
Contributors: Ghanima Sabr Shyaa; Mishall Al-Zubaidie
Source: check_circle
Crossref
grade
Preferred source (of 3)‎

A Perfect Security Key Management Method for Hierarchical Wireless Sensor Networks in Medical Environments

Electronics
2023-02-17 | Journal article
Contributors: Raad A. Muhajjar; Nahla A. Flayh; Mishall Al-Zubaidie
Source: check_circle
Crossref
grade
Preferred source (of 3)‎

Implication of Lightweight and Robust Hash Function to Support Key Exchange in Health Sensor Networks

Symmetry
2023-01-04 | Journal article
Contributors: Mishall Al-Zubaidie
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Incorporating security into electronic health records based healthcare systems with wireless sensor networks

University of Southern Queensland
2020 | Dissertation or Thesis
Contributors: Mishall Hammed Awaad Al-Zubaidie
Source: Self-asserted source
Mishall Al-Zubaidie
grade
Preferred source (of 2)‎

User Authentication Into Electronic Health Record Based on Reliable Lightweight Algorithms

2020-08-21 | Book chapter
Contributors: Mishall Al-Zubaidie; Zhongwei Zhang; Ji Zhang
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

REISCH: Incorporating Lightweight and Reliable Algorithms into Healthcare Applications of WSNs

Applied Sciences
2020-03-15 | Journal article
Contributors: Mishall Al-Zubaidie; Zhongwei Zhang; Ji Zhang
Source: check_circle
Crossref
grade
Preferred source (of 3)‎

Efficient and Secure ECDSA Algorithm and its Applications: A Survey

ArXiv
2019 | Journal article
Contributors: Al-Zubaidie, Mishall; Zhang, Zhongwei; Zhang, Ji
Source: check_circle
Web of Science Researcher Profile Sync

Efficient and Secure ECDSA Algorithm and its Applications: A Survey

International Journal of Communication Networks and Information Security
2019 | Journal article
Source: Self-asserted source
Mishall Al-Zubaidie

PAX: Using Pseudonymization and Anonymization to Protect Patients’ Identities and Data in the Healthcare System

International Journal of Environmental Research and Public Health
2019-04-27 | Journal article
Contributors: Mishall Al-Zubaidie; Zhongwei Zhang; Ji Zhang
Source: check_circle
Crossref
grade
Preferred source (of 3)‎

RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications

Security and Communication Networks
2019-03-17 | Journal article
Contributors: Mishall Al-Zubaidie; Zhongwei Zhang; Ji Zhang
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

An Enhanced Routing Algorithm in LEACH Protocol to Expand the Sensor Network Lifetime

CiiT International Journal of Wireless Communication
2015 | Journal article
Source: Self-asserted source
Mishall Al-Zubaidie

Extending the WSN lifetime by Dividing the Network Area into a Specific Zones

International Journal of Computer Network and Information Security
2015 | Journal article
Contributors: Awaad, M.H.; Jebbar, W.A.
Source: check_circle
Web of Science Researcher Profile Sync

The Use of Dynamic Sliding Window with IPSec

Journal of Education for Pure Science
2014 | Conference paper
Source: Self-asserted source
Mishall Al-Zubaidie

Prolong the Lifetime of WSN by Determining a Correlation Nodes in the Same Zone and Searching for the "Best" not the "Closest" C.H.

International Journal of Modern Education and Computer Science
2014-11-08 | Journal article
Part of ISSN: 2075-0161
Part of ISSN: 2075-017X
Source: Self-asserted source
Mishall Al-Zubaidie

A New Algorithm to Improve LEACH Protocol through Best Choice for Cluster-Head

International Journal of Advances in Engineering Sciences
2014-10 | Journal article
Source: Self-asserted source
Mishall Al-Zubaidie

Study to Analyze and Compare the LEACH Protocol with Three Methods to Improve it and Determine the Best Choice

Journal of Computer Science & Control Systems
2014-10 | Journal article
Source: Self-asserted source
Mishall Al-Zubaidie

Improve the Effectiveness of Sensor Networks and Extend the Network Lifetime Using 2BSs and Determination of Area of CHs Choice

Journal of Computer Science and Control Systems
2014-05 | Journal article
Source: Self-asserted source
Mishall Al-Zubaidie

Reduce Energy Consumption by Improving the LEACH Protocol

International Journal of Computer Science and Mobile Computing
2014-01 | Journal article
Source: Self-asserted source
Mishall Al-Zubaidie

Design and Implementation of WLAN Security for Client-Server Applications

University of Basrah
2010-07-01 | Dissertation or Thesis
Contributors: Mishall Al-Zubaidie
Source: Self-asserted source
Mishall Al-Zubaidie

Peer review (1437 reviews for 77 publications/grants)

Review activity for American journal of health promotion : (7)
Review activity for Applied network science. (3)
Review activity for Applied sciences. (8)
Review activity for Applied system innovation. (14)
Review activity for ARIS2. (1)
Review activity for Asian journal of education and social studies. (1)
Review activity for Asian Journal of Research in Computer Science. (5)
Review activity for Axioms. (1)
Review activity for British journal of gastroenterology. (1)
Review activity for Cluster computing. (8)
Review activity for Current journal of applied science and technology. (1)
Review activity for Current oncology. (1)
Review activity for Diagnostics. (2)
Review activity for Discover computing. (1)
Review activity for Earth science informatics. (1)
Review activity for Electronics. (91)
Review activity for Entropy : (1)
Review activity for European journal of respiratory medicine. (1)
Review activity for FinTech. (2)
Review activity for Future internet. (2)
Review activity for Health education and public health. (3)
Review activity for Healthcare. (27)
Review activity for IEEE access : (148)
Review activity for IEEE network. (2)
Review activity for IEEE transactions on big data. (1)
Review activity for Information sciences. (4)
Review activity for Information. (4)
Review activity for International journal of computer applications technology. (1)
Review activity for International journal of environmental research and public health (6)
Review activity for International journal on semantic web and information systems. (3)
Review activity for Iot. (6)
Review activity for Journal of advances in shell programming. (2)
Review activity for Journal of artificial intelligence research and advances. (1)
Review activity for Journal of big data. (39)
Review activity for Journal of clinical medicine. (2)
Review activity for Journal of cloud computing. (1)
Review activity for Journal of College of Education. (1)
Review activity for Journal of education for pure science. (1)
Review activity for Journal of Engineering Research and Reports. (1)
Review activity for Journal of imaging. (1)
Review activity for Journal of infrastructure, policy and development. (1)
Review activity for Journal of institution of engineers (India) series B. (162)
Review activity for Journal of intelligent & fuzzy systems. (15)
Review activity for Journal of multimedia technology & recent advancements. (1)
Review activity for Journal of operating systems developement & trends. (1)
Review activity for Journal of web engineering & technology. (2)
Review activity for Knowledge and information systems. (2)
Review activity for Mathematics. (4)
Review activity for Mesopotamian journal of cyber security. (8)
Review activity for Multimedia tools and applications. (119)
Review activity for Multimedia tools and applications. (188)
Review activity for Network modeling analysis in health informatics and bioinformatics. (13)
Review activity for Network modeling analysis in health informatics and bioinformatics. (29)
Review activity for Network. (4)
Review activity for Neuroscience. (2)
Review activity for Peer-to-peer networking and applications. (7)
Review activity for PeerJ. (5)
Review activity for Photonics. (2)
Review activity for Scientific programming. (1)
Review activity for Scientific reports. (3)
Review activity for Sensors. (18)
Review activity for SN Applied Sciences (27)
Review activity for SN computer science. (90)
Review activity for Sustainability. (5)
Review activity for Sustainable computing. (3)
Review activity for Sustainable computing. (3)
Review activity for Symmetry. (22)
Review activity for Telecommunication systems. (108)
Review activity for Telecommunications systems. (41)
Review activity for The journal of supercomputing. (3)
Review activity for Transactions on emerging telecommunications technologies. (4)
Review activity for Wasit journal for pure sciences. (1)
Review activity for Wireless networks. (32)
Review activity for Wireless networks. (56)
Review activity for Wireless personal communications. (19)
Review activity for Wireless personal communications. (29)
Review activity for World wide web. (1)