Secure hash algorithms and the corresponding FPGA optimization techniques ZA Al-Odat, M Ali, A Abbas, SU Khan ACM Computing Surveys (CSUR) 53 (5), 1-36, 2020 | 32 | 2020 |
Randomness analyses of the secure hash algorithms, SHA-1, SHA-2 and modified SHA Z Al-Odat, A Abbas, SU Khan 2019 International Conference on Frontiers of Information Technology (FIT …, 2019 | 26 | 2019 |
IoT-Based Secure Embedded Scheme for Insulin Pump Data Acquisition and Monitoring ZA Al-Odat CYBER 2018, The Third International Conference on Cyber-Technologies and …, 2018 | 18 | 2018 |
The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions Z Al-Odat, S Khan 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), 2019 | 17 | 2019 |
Mitigation and Improving SHA-1 Standard Using Collision Detection Approach Z Al-Odat, M Ali, SU Khan 2018 International Conference on Frontiers of Information Technology (FIT …, 2018 | 16 | 2018 |
A Reliable IoT-Based Embedded Health Care System for Diabetic Patients ZA Al-Odat, SK Srinivasan, EM Al-Qtiemat, S Shuja International Journal On Advances in Internet Technology 12 (1&2), 2019 | 15 | 2019 |
Constructions and attacks on hash functions Z Al-Odat, S Khan 2019 International Conference on Computational Science and Computational …, 2019 | 10 | 2019 |
A Big Data Storage Scheme Based on Distributed Storage Locations and Multiple Authorizations Z Al-Odat, E Al-Qtiemat, S Khan 2019 IEEE 5th International Conference on Big Data Security and Privacy …, 2019 | 9 | 2019 |
A modified secure hash design to circumvent collision and length extension attacks ZA Al-Odat, SU Khan, E Al-Qtiemat Journal of Information Security and Applications 71, 103376, 2022 | 8 | 2022 |
Anonymous privacy-preserving scheme for big data over the cloud ZA Al-Odat, SU Khan 2019 IEEE International Conference on Big Data (Big Data), 5711-5717, 2019 | 8 | 2019 |
An efficient lightweight cryptography hash function for big data and iot applications ZA Al-Odat, EM Al-Qtiemat, SU Khan 2020 IEEE Cloud Summit, 66-71, 2020 | 6 | 2020 |
EXAMINING CLOUD SECURITY: IDENTIFYING RISKS AND THE IMPLEMENTED MITIGATION STRATEGIES E AL-QTIEMAT, Z AL-ODAT Journal of Theoretical and Applied Information Technology 102 (7), 2024 | 4 | 2024 |
A new method to fit logistic functions with wind turbines power curves using manufacturer datasheets Q Aldaoudeyeh, Al-Motasem and Alzaareer, Khaled and Harasis, Salman and Al ... IET Renewable Power Generation, 2021 | 2* | 2021 |
Analyses, mitigation and applications of secure hash algorithms ZAH Al-Odat North Dakota State University, 2020 | 2 | 2020 |
Synthesis of Formal Specifications From Requirements for Refinement-based Real Time Object Code Verification E Al-Qtiemat, S Srinivasan, Z Al-Odat, M Asha Latha Dubasi, S Shuja International Journal On Advances in Security 12 (1&2), 95-107, 2019 | 2 | 2019 |
Refinement maps for insulin pump control software safety verification EM Al-qtiemat, SK Srinivasan, ZA Al-Odat, S Shuja The Eleventh International Conference on Advances in System Testing and …, 2019 | 1 | 2019 |
Refinement checker for embedded object code verification MAL Dubasi, SK Srinivasan, S Shuja, ZA Al-Odat Proceedings of the The Fourth International Conference on Cyber-Technologies …, 0 | 1 | |
A novel monotonic wind turbine power-speed characteristics model. AM Aldaoudeyeh, K Alzaareer, D Wu, M Obeidat, S Harasis, Z Al-Odat, ... AIMS Energy 11 (6), 2023 | | 2023 |
Synthesis of Refinement Maps for Real-Time Object Code Verification EM Al-qtiemat, SK Srinivasan, ZA Al-Odat, S Shuja International Journal on Advances in Life Sciences Volume 12, Number 1 & 2, 2020, 2020 | | 2020 |
Refinement Maps for Insulin Pump Control Software Safety Verification SS Eman Al-Qtiemat, Sudarshan Srinivasan, Zeyad Al-Odat VALID 2019, The Eleventh International Conference on Advances in System …, 2019 | | 2019 |