Takip et
Prof. Dr. Ali A. Yassin
Prof. Dr. Ali A. Yassin
Professor of Computer Science, University of Basrah
uobasrah.edu.iq üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Efficient conditional anonymity with message integrity and authentication in a vehicular ad-hoc network
MA Alazzawi, H Lu, AA Yassin, K Chen
Ieee Access 7, 71424-71435, 2019
1092019
Vppcs: Vanet-based privacy-preserving communication scheme
MA Al-Shareeda, M Anbar, S Manickam, AA Yassin
IEEE Access 8, 150914-150928, 2020
1062020
Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing
AA Yassin, H Jin, A Ibrahim, D Zou
2012 Second International Conference on Cloud and Green Computing, 282-289, 2012
592012
Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data
A Ibrahim, H Jin, AA Yassin, D Zou
2012 IEEE Asia-Pacific Services Computing Conference, 263-270, 2012
532012
Cloud authentication based on anonymous one-time password
AA Yassin, H Jin, A Ibrahim, W Qiang, D Zou
Ubiquitous Information Technologies and Applications: CUTE 2012, 423-431, 2013
442013
Efficient password-based two factors authentication in cloud computing
AA Yassin, H Jin, A Ibrahim, W Qiang, D Zou
International Journal of Security and Its Applications 6 (2), 143-148, 2012
392012
A practical privacy-preserving password authentication scheme for cloud computing
AA Yassin, H Jin, A Ibrahim, W Qiang, D Zou
2012 IEEE 26th International Parallel and Distributed Processing Symposium …, 2012
362012
Low-overhead remote user authentication protocol for IoT based on a fuzzy extractor and feature extraction
BH Taher, S Jiang, AA Yassin, H Lu
IEEE Access 7, 148950-148966, 2019
332019
A Secure and Lightweight Three‐Factor Remote User Authentication Protocol for Future IoT Applications
BH Taher, H Liu, F Abedi, H Lu, AA Yassin, AJ Mohammed
Journal of Sensors 2021 (1), 8871204, 2021
312021
An Efficient Mechanism to Prevent the Phishing Attacks.
MH Alzuwaini, AA Yassin
Iraqi Journal for Electrical & Electronic Engineering 17 (1), 2021
212021
Cloud authentication based on encryption of digital image using edge detection
AA Yassin, AA Hussain, KAA Mutlaq
2015 The International Symposium on Artificial Intelligence and Signal …, 2015
192015
Privacy-preserving multi-factor authentication and role-based access control scheme for the E-healthcare system
M Fareed, AA Yassin
Bulletin of Electrical Engineering and Informatics 11 (4), 2131-2141, 2022
182022
Secure and efficient e-health scheme based on the Internet of Things
ZA Hussien, H Jin, ZA Abduljabbar, MA Hussain, AA Yassin, SH Abbdal, ...
2016 IEEE International Conference on Signal Processing, Communications and …, 2016
182016
Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext
ZA Hussien, H Jin, ZA Abduljabbar, AA Yassin, MA Hussain, SH Abbdal, ...
2015 11th International Conference on Information Assurance and Security …, 2015
172015
Towards efficient yet privacy-preserving approximate search in cloud computing
A Ibrahim, H Jin, AA Yassin, D Zou, P Xu
The Computer Journal 57 (2), 241-254, 2014
172014
Using discrete wavelet transformation to enhance underwater image
AA Yassin, RM Ghadban, SF Salah, HZ Neima
International Journal of Computer Science Issues 10 (2), 220-228, 2013
172013
Robust conditional privacy-preserving authentication based on pseudonym root with cuckoo filter in vehicular ad hoc networks
MA Alazzawi, H Lu, AA Yassin, K Chen
KSII Transactions on Internet and Information Systems (TIIS) 13 (12), 6121-6144, 2019
162019
Approximate keyword-based search over encrypted cloud data
A Ibrahim, H Jin, AA Yassin, D Zou
2012 IEEE Ninth International Conference on e-Business Engineering, 238-245, 2012
162012
Secure Patient Authentication Scheme in the Healthcare System Using Symmetric Encryption.
NM Hamed, AA Yassin
Iraqi Journal for Electrical & Electronic Engineering 18 (1), 2022
152022
Efficient and flexible multi-factor authentication protocol based on fuzzy extractor of administrator’s fingerprint and smart mobile device
AJ Mohammed, AA Yassin
Cryptography 3 (3), 24, 2019
152019
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20