Scientific Published Papers: Recent submissions

  • Al Nawaj'ha, Fawwaz Yousef; Abutaha, Mohammed (IEEE, 2013)
    This paper aimed to clarify the concept of the digital signature, and its usage in Web site security
  • Abutaha, Mohammed; Hamamreh, Rushdi
    Nowadays, Cryptography plays a major role in protecting technology applications information. Hash function is a well-defined procedure that converts a large data into a small one, The returned value from hash function is ...
  • Jallouli, Ons; Abutaha, Mohammed; El Assad, Safwan; Chetto, Maryline; Queudet, Audrey; Déforges, Olivier (IEEE, 2016)
    The extremely rapid development of the Internet of Things brings growing attention to the information security issue. Realization of cryptographically strong pseudo random number generators (PRNGs), is crucial in securing ...
  • Abutaha, Mohammed; Farajallah, Mousa; Tahboub, Radwan; Odeh, Mohammad (International Journal of Computer Science and Security (IJCSS), 2011)
    Cryptography in the past was used in keeping military information, diplomatic correspondence secure and in protecting the national security. However, the use was limited. Nowadays, the range of cryptography applications ...
  • Abutaha, Mohammed; Farajallah, Mousa; Tahboub, Radwan (International Journal of Computer Applications, 2011)
    It is well known that Hash algorithm works in one way, and it cannot be reversed. We can build a new algorithm by using Hill cipher technique .Since its invention in 1929, Hill cipher algorithm which is one of the most ...
  • Abutaha, Mohammed; Hamamreh, Rushdi (IEEE, 2013)
    Hash functions are widely used in encryption schemes and security layers of communication protocols for data integrity, digital signature and message authentication codes [18]. Hash function is a well-defined procedure ...
  • Abutaha, Mohammed; El Assad, Safwan; Jallouli, Ons; Queudet, Audrey; Deforges, Olivier (IEEE, 2016)
    Generating random numbers is essential in many cryptographic applications like key generation, protocols, nonce and also in Internet for choosing TCP sequence numbers for example. We need generators which are able to ...
  • Abutaha, Mohammed; Elassad, Safwan; Queduet, Audrey (Springer, 2018)
    We implemented in efficient manner (time computation, software security) a generator of discrete chaotic sequences (GDCS) by using multi-threaded approach. The chaotic generator is implemented in C language and parallelized ...
  • Abutaha, Mohammed; El Assad, Safwan; Farajallah, Mousa; Queudet, Audrey; Deforge, Olivier (IEEE, 2015)
    Based on some important properties of chaos, such as ergodicity, quasi-randomness, and high sensitivity to the secret key, chaos is a hot research field in secured communication, and recently a variety of chaos-based ...
  • Koscina, Mirko; Caragata, Daniel; Abdoun, Nabil; El Assady, Safwan; Abutaha, Mohammed; Assaf, Rima; Deforgesz, Olivier; Khalil, Mohamad
    Workshop 1: Chaos-Information Hiding and Security (C-IHS-2015) Benchmarking of Traditional Cryptographic Algorithms and Chaos-based Algorithms with DNA Operations (Authors: Mirko Koscina, Daniel Caragata) Hash Function ...
  • Abutaha, Mohammed (Nantes, 2017)
    La protection des images et vidéos est une problématique cruciale. Dans ce travail nous avons d’abord, conçu et réalisé d’une façon efficace et sécurisée un générateur de nombre pseudo-chaotique (PCNG) mis en œuvre en ...
  • Abdoun, Nabil; El Assad, Safwan; Abutaha, Mohammed; Assaf, Rima; Deforges, Olivier; Khalil, Mohamad (IEEE, 2016)
    Secure Hash Algorithm (SHA) is the most popular standard of Cryptographic Hash functions. Several security protocols use SHA to provide message integrity, authentication and digital signature. Nowadays, a new technology ...
  • Gautier, Guillaume; El Assad, Safwan; Abutaha, Mohammed; Déforges, Olivier; Facon, Adrien (2017)
    The protection of data transmitted between Internet of Things(IoT) devices which have very limited resources in terms of computing capabilities, memory capacities and energy becomes an important challenge. Designing ...
  • Alnawaj'ha, Fawwaz Yousef; Abutaha, Mohammed Saeed (IEEE, 2018)
    Responsive web design is an approach for browsing a particular web page perfectly on different devices without resizing, panning, and scrolling the page, it is emerged in 2013 with the use of smartphones in accessing the ...
  • El Assad, Safwan; Abutaha, Mohammed; Farajallah, Mousa; Déforges, Olivier (2017)
     What is chaos? - How to generate it?chaos? How to generate it? - Chaos & Cryptography - Why using chaos to secure information? - Chaos--based cryptography *Design and realization of an efficient chaos--based stream cipher ...
  • Abdoun, Nabil; El Assad, Safwan; Abutaha, Mohammed; Assaf, Rima; Deforges, Olivier; Khalil, Mohamad (IEEE, 2015)
    This paper presents an efficient algorithm for constructing a secure Hash function based on Chaotic Neural Network structure. The proposed Hash function includes two main operations: Generation of Neural Network parameters ...
  • Younis, Ghadi (2019-09)
    Abstract: The use of GNSS technologies for precise point positioning enabled the calculations for single-point observations or relative positioning of long baselines. The GNSS absolute and relative positioning ...
  • Al-Dweik, Ghassan J.; Bader, Worood W. (المؤتمر الدولي المحكم و المنشور: الاستراتيجيات والاتجاهات الحديثة في تنمية المدن وإعادة الأعمار ما بعد الحروب والنزاعات, 2019-09)
    تحضن مدينة الخليل بين ثتاياها ارثا معماريا حضاريا مميزا يتمثل في المركز التاريخي للمدينة "البلدة القديمة" ومساحتها 1.2 كم³، حيث تعتبر البلدة القديمة في مدينة الخليل من أقدم المدن في العالم كما تُعتبر ذات أهميّة دينيّة ...
  • Möller, Lucas; Thauer, Elisa; Ottmann, Alexander; Deeg, Lukas; Ghunaim, Rasha; Hampel, Silke; Klingeler, Ruediger (Journal of Alloys and Compounds, 2020-04-05)
    Nanosized particles of cobalt ferrite CoFe2O4 incorporated into multi-walled carbon nanotubes (CNT) have been studied as anode material for Li-ion batteries. In order to evaluate the benefits of CNT shells, the results are ...
  • Thauer, Elisa; Ottman, Alexander; Schneider, Philip; Lukas, Deeg; Möller, Lucas; Zeus, Rouven; Wilhelmi, Florian; Schlestein, Lucas; Neef, Christoph; Ghunaim, Rasha; Gellesch, Markus; Nowka, Christian; Scholz, Maik; Haft, Marcel; Wurmehl, Sabine; Wenelska, Karolina; Mijowska, Ewa; Kapoor, Aakanksha; Bajpai, Ashna; Hampel, Silke; Klingeler, Ruediger (MDPI- Molecules, 2020-02-27)
    Downsizing well-established materials to the nanoscale is a key route to novel functionalities, in particular if different functionalities are merged in hybrid nanomaterials. Hybrid carbon-based hierarchical nanostructures ...

Search DSpace


Browse

My Account