Mohammed Abu Taha
Palestine Polytechnic University
H-index: 10
Asia-Palestinian Territory
Top articles of Mohammed Abu Taha
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
REVIEW OF AES METHODS AND SUGGESTED ABSTRACT CIPHERING FOR SECURED IMAGE DATA COMMUNICATION IN IOT AND AI APPLICATIONS. | Journal of Information Systems Security | Haneen Dweik Mohammed Abutaha Adnane Cabani Karim Hammoudi | 2023/9/1 |
RAD: reinforcement authentication model based on DYMO protocol for MANET | International Journal of Internet Protocol Technology | Rushdi A Hamamreh Mohammed R Ayyad Mohammed Abutaha | 2023 |
Parallel and Practical Approach of Efficient Image Chaotic Encryption Based on Message Passing Interface (MPI) | Entropy | Mohammed Abutaha Islam Amar Salman AlQahtani | 2022/4/18 |
Secure lightweight cryptosystem for IoT and pervasive computing | Scientific Reports | Mohammed Abutaha Basil Atawneh Layla Hammouri Georges Kaddoum | 2022/11/16 |
LIGHTWEIGHT IOT IMAGE ENCRYPTION | Journal of Theoretical and Applied Information Technology | HANEEN DWEIK MOHAMMED ABUTAHA RACHID SAMMOUDA | 2022/11/15 |
A survey of lightweight image encryption for IoT | Haneen Dweik Mohammad Abutaha | 2022/8/2 | |
Enhancement of an Encryption System Performance using MPI | Islam Amar Mohammed Abutaha | 2020/6/18 | |
Power consumption of a chaos-based stream cipher algorithm | Basil Atawneh AL-Hammoury Layla Mohammed Abutaha | 2020/3/19 | |
EDIH: Enhancement Data Integrity using Hill Cipher Hash algorithm | Mohammed Abutaha Rushdi Hamamreh | 2020/12/9 | |
Workshop 1: Chaos-Information Hiding and Security | Mirko Koscina Daniel Caragata Nabil Abdoun Safwan El Assady Mohammed Abutaha | 2020/12/9 | |
PSEUDO RANDOM NUMBER GENERATOR BASED ON LOOK-UP TABLE AND CHAOTIC MAPS | Farajallah Mousa Mohammed Abutaha | 2020/10/31 | |
Privacy protection in real time HEVC standard using chaotic system | Cryptography | Mohammed Abu Taha Wassim Hamidouche Naty Sidaty Marko Viitanen Jarno Vanne | 2020/6/24 |