Prof. Dr. Ali A. Yassin
Prof. Dr. Ali A. Yassin
Professor of Computer Science, University of Basrah
Geverifieerd e-mailadres voor uobasrah.edu.iq - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing
AA Yassin, H Jin, A Ibrahim, D Zou
2012 Second International Conference on Cloud and Green Computing, 282-289, 2012
442012
Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data
A Ibrahim, H Jin, AA Yassin, D Zou
2012 IEEE Asia-Pacific Services Computing Conference, 263-270, 2012
422012
Efficient conditional anonymity with message integrity and authentication in a vehicular ad-hoc network
MA Alazzawi, H Lu, AA Yassin, K Chen
IEEE Access 7, 71424-71435, 2019
402019
Efficient password-based two factors authentication in cloud computing
AA Yassin, H Jin, A Ibrahim, W Qiang, D Zou
International Journal of Security and Its Applications 6 (2), 143-148, 2012
372012
Cloud authentication based on anonymous one-time password
AA Yassin, H Jin, A Ibrahim, W Qiang, D Zou
Ubiquitous Information Technologies and Applications, 423-431, 2013
342013
A practical privacy-preserving password authentication scheme for cloud computing
AA Yassin, H Jin, A Ibrahim, W Qiang, D Zou
2012 IEEE 26th International Parallel and Distributed Processing Symposium …, 2012
312012
Vppcs: Vanet-based privacy-preserving communication scheme
MA Al-Shareeda, M Anbar, S Manickam, AA Yassin
IEEE Access 8, 150914-150928, 2020
182020
Approximate keyword-based search over encrypted cloud data
A Ibrahim, H Jin, AA Yassin, D Zou
2012 IEEE Ninth International Conference on e-Business Engineering, 238-245, 2012
162012
Cloud authentication based on encryption of digital image using edge detection
AA Yassin, AA Hussain, KAA Mutlaq
2015 The International Symposium on Artificial Intelligence and Signal …, 2015
142015
Towards efficient yet privacy-preserving approximate search in cloud computing
A Ibrahim, H Jin, AA Yassin, D Zou, P Xu
The Computer Journal 57 (2), 241-254, 2014
132014
Towards privacy preserving mining over distributed cloud databases
A Ibrahim, H Jin, AA Yassin, D Zou
2012 Second International Conference on Cloud and Green Computing, 130-136, 2012
122012
Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext
ZA Hussien, H Jin, ZA Abduljabbar, AA Yassin, MA Hussain, SH Abbdal, ...
2015 11th International Conference on Information Assurance and Security …, 2015
112015
Using discrete wavelet transformation to enhance underwater image
AA Yassin, RM Ghadban, SF Saleh, HZ Neima
International Journal of Computer Science Issues (IJCSI) 10 (5), 220, 2013
112013
Robust conditional privacy-preserving authentication based on pseudonym root with cuckoo filter in vehicular ad hoc networks
MA Alazzawi, H Lu, AA Yassin, K Chen
KSII Trans. Internet Inf. Syst 13 (12), 6121-6144, 2019
82019
Low-overhead remote user authentication protocol for IoT based on a fuzzy extractor and feature extraction
BH Taher, S Jiang, AA Yassin, H Lu
IEEE Access 7, 148950-148966, 2019
72019
Secure and efficient e-health scheme based on the Internet of Things
ZA Hussien, H Jin, ZA Abduljabbar, MA Hussain, AA Yassin, SH Abbdal, ...
2016 IEEE International Conference on Signal Processing, Communications and …, 2016
72016
Security and integrity of data in cloud computing based on feature extraction of handwriting signature
AA Yassin, HZ Neima, HS Hashim
International Journal of Cyber-Security and Digital Forensics 3 (2), 93-106, 2014
52014
Encrypted remote user authentication scheme by using smart card
AA Yassin, H Jin, A Ibrahim, D Zou
International Conference on Web Information Systems and Mining, 314-323, 2012
52012
An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage
SH Abbdal, H Jin, AA Yassin, ZA Abduljabbar, MA Hussain, ZA Hussien, ...
2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016
42016
Secure and Efficient Data Integrity Based on Iris Features in Cloud Computing
SH Abbdal, H Jin, D Zou, AA Yassin
2014 7th International Conference on Security Technology, 3-6, 2014
42014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20