DSpace Repository

Browsing by Author "Abutaha, Mohammed"

Browsing by Author "Abutaha, Mohammed"

Sort by: Order: Results:

  • Abutaha, Mohammed; Farajallah, Mousa; Tahboub, Radwan (International Journal of Computer Applications, 2011)
    It is well known that Hash algorithm works in one way, and it cannot be reversed. We can build a new algorithm by using Hill cipher technique .Since its invention in 1929, Hill cipher algorithm which is one of the most ...
  • Jallouli, Ons; El Assad, Safwan; Abutaha, Mohammed; Chetto, Maryline; Lozi, René; Caragata, Daniel (2016)
    ryptosystems require a very good and secure source of randomness for their security. Such a source is extremely difficult to obtain in practice. Hence, developing a secure pseudo-random number generator reveals necessary. ...
  • El Assad, Safwan; Abutaha, Mohammed; Farajallah, Mousa; Déforges, Olivier (2017)
     What is chaos? - How to generate it?chaos? How to generate it? - Chaos & Cryptography - Why using chaos to secure information? - Chaos--based cryptography *Design and realization of an efficient chaos--based stream cipher ...
  • Abutaha, Mohammed; El Assad, Safwan; Farajallah, Mousa; Queudet, Audrey; Deforge, Olivier (2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), 2015-12-14)
    Based on some important properties of chaos, such as ergodicity, quasi-randomness, and high sensitivity to the secret key, chaos is a hot research field in secured communication, and recently a variety of chaos-based ...
  • Abutaha, Mohammed; El Assad, Safwan; Farajallah, Mousa; Queudet, Audrey; Deforge, Olivier (IEEE, 2015)
    Based on some important properties of chaos, such as ergodicity, quasi-randomness, and high sensitivity to the secret key, chaos is a hot research field in secured communication, and recently a variety of chaos-based ...
  • Jallouli, Ons; Abutaha, Mohammed; El Assad, Safwan; Chetto, Maryline; Queudet, Audrey; Déforges, Olivier (IEEE, 2016)
    The extremely rapid development of the Internet of Things brings growing attention to the information security issue. Realization of cryptographically strong pseudo random number generators (PRNGs), is crucial in securing ...
  • Abutaha, Mohammed; El Assad, Safwan; Queudet, Audrey; Deforges, Olivier (inderscience, 2017-02-08)
    We designed and implemented a stream cipher cryptosystem based on an efficient chaotic generator of finite computing precision (N = 32). The proposed structure of the chaotic generator is formed by a Key-setup, an IVsetup, ...
  • Abutaha, Mohammed; Assad, Safwan El; Queudet, Audrey; Deforges, Olivier (Inderscience Publishers (IEL), 2017)
    We designed and implemented a stream cipher cryptosystem based on an efficient chaotic generator of finite computing precision (N = 32). The proposed structure of the chaotic generator is formed by a Key-setup, an IVsetup, ...
  • Gautier, Guillaume; El Assad, Safwan; Abutaha, Mohammed; Déforges, Olivier; Facon, Adrien (2017)
    The protection of data transmitted between Internet of Things(IoT) devices which have very limited resources in terms of computing capabilities, memory capacities and energy becomes an important challenge. Designing ...
  • Abutaha, Mohammed; El Assad, Safwan; Jallouli, Ons; Queudet, Audrey; Deforges, Olivier (IEEE, 2016)
    Generating random numbers is essential in many cryptographic applications like key generation, protocols, nonce and also in Internet for choosing TCP sequence numbers for example. We need generators which are able to ...
  • Abutaha, Mohammed; Hamamreh, Rushdi
    Nowadays, Cryptography plays a major role in protecting technology applications information. Hash function is a well-defined procedure that converts a large data into a small one, The returned value from hash function is ...
  • Abutaha, Mohammed; Sidaty, Naty; Hamidouche, Wassim; Dforges, O; Vanne, Jarno; Viitanen, Marko (IEEE, 2018)
    In this paper, we present an end-to-end real-time encryption of Region of Interest (ROI) in HEVC videos. The proposed ROI encryption makes use of the independent tile concept of HEVC that splits the video frame into separable ...
  • Amar, Islam; Abutaha, Mohammed (IEEE, 2020)
    Nowadays with a tremendous speed and continuous development, the world’s connection to the Internet has increased to a point that it has become part of their unsteady lives. Thus as technology evolves, encryption has become ...
  • Abdoun, Nabil; El Assad, Safwan; Abutaha, Mohammed; Assaf, Rima; Deforges, Olivier; Khalil, Mohamad (IEEE, 2015)
    This paper presents an efficient algorithm for constructing a secure Hash function based on Chaotic Neural Network structure. The proposed Hash function includes two main operations: Generation of Neural Network parameters ...
  • Al Nawaj'ha, Fawwaz Yousef; Abutaha, Mohammed (IEEE, 2013)
    This paper aimed to clarify the concept of the digital signature, and its usage in Web site security
  • Hammoudi, Karim; Abutaha, Mohammed; Benhabiles, Halim; Melkemi, Mahmoud; Windal, Feryal; El Assad, Safwan; Queudet, Audrey (Springer, Singapore, 2020)
    Nowadays, urban and vehicular surveillance systems are collecting large amounts of image data for feeding recognition systems, for example, toward proposing localization or navigation services. In many cases, these image data ...
  • Abutaha, Mohammed; Hamamreh, Rushdi (IEEE, 2013)
    Hash functions are widely used in encryption schemes and security layers of communication protocols for data integrity, digital signature and message authentication codes [18]. Hash function is a well-defined procedure ...
  • Abutaha, Mohammed; Elassad, Safwan; Queduet, Audrey (Springer, 2018)
    We implemented in efficient manner (time computation, software security) a generator of discrete chaotic sequences (GDCS) by using multi-threaded approach. The chaotic generator is implemented in C language and parallelized ...
  • Atawneh, Basil; Layla, AL-Hammoury; Abutaha, Mohammed (IEEE, 2020)
    With the huge usage of the Internet of Things (IoT), lots of sensitive data are being transferred between devices. This raises the need for security so that unauthorized parties can't access the data. IoT devices are known ...
  • Abutaha, Mohammed (جامعة بوليتكنك فلسطين - informatics, 7/1/2011)
    Nowadays, Cryptography plays a major role in protecting information. Hash function is a welldefined procedure that digests a large data chunks into a small one. The returned value from hash function is called hash code. ...

Search DSpace

Browse

My Account