A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm A Abusukhon, MN Anwar, Z Mohammad, B Alghannam Journal of Discrete Mathematical Sciences and Cryptography 22 (1), 65-81, 2019 | 45 | 2019 |
Session Key Agreement Protocol for Secure D2D Communication VO Nyangaresi, Z Mohammad The Fifth International Conference on Safety and Security with IoT: SaSeIoT …, 2022 | 43 | 2022 |
On the security of the standardized MQV protocol and its based Evolution Protocols Z Mohammad, V Nyangaresi, A Abusukhon 2021 International Conference on Information Technology (ICIT), 320-325, 2021 | 36 | 2021 |
Privacy preservation protocol for smart grid networks VO Nyangaresi, Z Mohammad 2021 International Telecommunications Conference (ITC-Egypt), 1-4, 2021 | 30 | 2021 |
Security weaknesses and attacks on the internet of things applications Z Mohammad, TA Qattam, K Saleh 2019 IEEE Jordan International Joint Conference on Electrical Engineering …, 2019 | 29 | 2019 |
Efficient and secure key exchange protocol based on elliptic curve and security models A Abusukhon, Z Mohammad, A Al-Thaher 2019 IEEE Jordan International Joint Conference on Electrical Engineering …, 2019 | 21 | 2019 |
A novel network security algorithm based on encrypting text into a white-page image ZM Ahmad Abusukhon, M Talib Proceedings of the World Congress on Engineering and Computer Science 1, 2016 | 16 | 2016 |
A survey of authenticated Key Agreement Protocols for securing IoT Z Mohammad, A Abusukhon, TA Qattam 2019 IEEE Jordan International Joint Conference on Electrical Engineering …, 2019 | 15 | 2019 |
A comparative performance analysis of route redistribution among three different routing protocols based on OPNET simulation Z Mohammad, A Abusukhon, MA Al-Maitah International Journal of Computer Networks and Communications 9 (2), 39-55, 2017 | 15 | 2017 |
Performance analysis of route redistribution among diverse dynamic routing protocols based on opnet simulation Z Mohammad, A Abusukhon, AA Hnaif, IS Al-Otoum International Journal of Advanced Computer Science and Applications 8 (3), 2017 | 15 | 2017 |
Cryptanalysis and enhancement of two-pass authenticated key agreement with key confirmation protocols Z Mohammad, YC Chen, CL Hsu, CC Lo IETE Technical Review 27 (3), 252-265, 2010 | 15 | 2010 |
Privacy preservation protocol for smart grid networks. In2021 International Telecommunications Conference (ITC-Egypt) 2021 Jul 13 (pp. 1-4) VO Nyangaresi, Z Mohammad IEEE, 0 | 15 | |
Cryptanalysis and improvement of the YAK protocol with formal security proof and security verification via Scyther Z Mohammad International Journal of Communication Systems 33 (9), e4386, 2020 | 13 | 2020 |
Cryptanalysis of a secure and efficient three-pass authenticated key agreement protocol based on elliptic curves Z Mohammad, CL Hsu, YC Chen, CC Lo 網際網路技術學刊 14 (2), 247-250, 2013 | 12 | 2013 |
An authenticated, secure, and mutable multiple‐session‐keys protocol based on elliptic curve cryptography and text‐to‐image encryption algorithm A Abusukhon, Z Mohammad, A Al‐Thaher Concurrency and Computation: Practice and Experience 34 (4), e6649, 2022 | 9 | 2022 |
An efficient and secure three-pass authenticated key agreement elliptic curve based protocol Z Mohammad, CL Hsu, YC Chen, CC Lo International Journal of Innovative Computing, Information and Control 7 (3 …, 2011 | 9 | 2011 |
Vulnerability of an improved elliptic curve Diffie-Hellman key agreement and its enhancement Z Mohammad, CC Lo 2009 International Conference on E-Business and Information System Security, 1-5, 2009 | 8 | 2009 |
Cryptanalysis of an efficient protocol for authenticated key agreement Z Mohammad ICIC Express Letters 13 (4), 293–301, 2019 | 7 | 2019 |
Cryptanalysis of a Tightly-Secure Authenticated Key Exchange without NAXOS Approach Based on Decision Linear Problem Z Mohammad, AAA Alkhatib, M Lafi, A Abusukhon, D Albashish, J Atwan 2021 International Conference on Information Technology (ICIT), 218-223, 2021 | 3 | 2021 |
ROAD TRAFFIC Management SOLUTIONS AAA Alkhatib, Z Mohammad, EA Maria 2021 International Conference on Information Technology (ICIT), 558-564, 2021 | 2 | 2021 |