Follow
Zeyad Mohammad
Title
Cited by
Cited by
Year
A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm
A Abusukhon, MN Anwar, Z Mohammad, B Alghannam
Journal of Discrete Mathematical Sciences and Cryptography 22 (1), 65-81, 2019
422019
Session Key Agreement Protocol for Secure D2D Communication
VO Nyangaresi, Z Mohammad
The Fifth International Conference on Safety and Security with IoT: SaSeIoT …, 2022
342022
On the security of the standardized MQV protocol and its based Evolution Protocols
Z Mohammad, V Nyangaresi, A Abusukhon
2021 International Conference on Information Technology (ICIT), 320-325, 2021
312021
Privacy preservation protocol for smart grid networks
VO Nyangaresi, Z Mohammad
2021 International Telecommunications Conference (ITC-Egypt), 1-4, 2021
292021
Security weaknesses and attacks on the internet of things applications
Z Mohammad, TA Qattam, K Saleh
2019 IEEE Jordan International Joint Conference on Electrical Engineering …, 2019
212019
Efficient and secure key exchange protocol based on elliptic curve and security models
A Abusukhon, Z Mohammad, A Al-Thaher
2019 IEEE Jordan International Joint Conference on Electrical Engineering …, 2019
182019
A comparative performance analysis of route redistribution among three different routing protocols based on OPNET simulation
Z Mohammad, A Abusukhon, MA Al-Maitah
International Journal of Computer Networks and Communications 9 (2), 39-55, 2017
162017
A novel network security algorithm based on encrypting text into a white-page image
ZM Ahmad Abusukhon, M Talib
Proceedings of the World Congress on Engineering and Computer Science 1, 2016
162016
A survey of authenticated Key Agreement Protocols for securing IoT
Z Mohammad, A Abusukhon, TA Qattam
2019 IEEE Jordan International Joint Conference on Electrical Engineering …, 2019
152019
Cryptanalysis and enhancement of two-pass authenticated key agreement with key confirmation protocols
Z Mohammad, YC Chen, CL Hsu, CC Lo
IETE Technical Review 27 (3), 252-265, 2010
152010
Privacy preservation protocol for smart grid networks. In2021 International Telecommunications Conference (ITC-Egypt) 2021 Jul 13 (pp. 1-4)
VO Nyangaresi, Z Mohammad
IEEE, 0
15
Performance analysis of route redistribution among diverse dynamic routing protocols based on opnet simulation
Z Mohammad, A Abusukhon, AA Hnaif, IS Al-Otoum
International Journal of Advanced Computer Science and Applications 8 (3), 2017
142017
Cryptanalysis of a secure and efficient three-pass authenticated key agreement protocol based on elliptic curves
Z Mohammad, CL Hsu, YC Chen, CC Lo
網際網路技術學刊 14 (2), 247-250, 2013
122013
Cryptanalysis and improvement of the YAK protocol with formal security proof and security verification via Scyther
Z Mohammad
International Journal of Communication Systems 33 (9), e4386, 2020
112020
An efficient and secure three-pass authenticated key agreement elliptic curve based protocol
Z Mohammad, CL Hsu, YC Chen, CC Lo
International Journal of Innovative Computing, Information and Control 7 (3 …, 2011
92011
An authenticated, secure, and mutable multiple‐session‐keys protocol based on elliptic curve cryptography and text‐to‐image encryption algorithm
A Abusukhon, Z Mohammad, A Al‐Thaher
Concurrency and Computation: Practice and Experience 34 (4), e6649, 2022
82022
Vulnerability of an improved elliptic curve Diffie-Hellman key agreement and its enhancement
Z Mohammad, CC Lo
2009 International Conference on E-Business and Information System Security, 1-5, 2009
82009
Cryptanalysis of an efficient protocol for authenticated key agreement
Z Mohammad
ICIC Express Letters 13 (4), 293–301, 2019
72019
Cryptanalysis of a Tightly-Secure Authenticated Key Exchange without NAXOS Approach Based on Decision Linear Problem
Z Mohammad, AAA Alkhatib, M Lafi, A Abusukhon, D Albashish, J Atwan
2021 International Conference on Information Technology (ICIT), 218-223, 2021
22021
ROAD TRAFFIC Management SOLUTIONS
AAA Alkhatib, Z Mohammad, EA Maria
2021 International Conference on Information Technology (ICIT), 558-564, 2021
12021
The system can't perform the operation now. Try again later.
Articles 1–20