| A flexible encryption technique for the internet of things environment S Medileh, A Laouid, R Euler, A Bounceur, M Hammoudeh, M AlShaikh, ... Ad Hoc Networks 106, 102240, 2020 | 72 | 2020 |
| Proof of chance: A lightweight consensus algorithm for the internet of things M Kara, A Laouid, M Hammoudeh, M AlShaikh, A Bounceur IEEE Transactions on Industrial Informatics 18 (11), 8336-8345, 2022 | 49 | 2022 |
| Edge-based lightweight selective encryption scheme for digital medical images OA Khashan, M AlShaikh Multimedia Tools and Applications 79 (35), 26369-26388, 2020 | 49 | 2020 |
| Robust watermarking scheme and tamper detection based on threshold versus intensity L Laouamer, M AlShaikh, L Nana, AC Pascu Journal of Innovation in Digital Ecosystems 2 (1-2), 1-12, 2015 | 44 | 2015 |
| A compute and wait in pow (cw-pow) consensus algorithm for preserving energy consumption M Kara, A Laouid, M AlShaikh, M Hammoudeh, A Bounceur, R Euler, ... Applied Sciences 11 (15), 6750, 2021 | 40 | 2021 |
| Secure key exchange against man-in-the-middle attack: Modified diffie-hellman protocol M Kara, A Laouid, M AlShaikh, A Bounceur, M Hammoudeh Jurnal Ilmiah Teknik Elektro Komputer dan Informatika 7 (3), 380-387, 2021 | 31 | 2021 |
| Efficient and robust encryption and watermarking technique based on a new chaotic map approach M AlShaikh, L Laouamer, L Nana, AC Pascu Multimedia Tools and Applications 76 (6), 8937-8950, 2017 | 30 | 2017 |
| Using supervised learning to detect command and control attacks in iot M AlShaikh, W Alsemaih, S Alamri, Q Ramadan International Journal of Cloud Applications and Computing (IJCAC) 14 (1), 1-19, 2024 | 24 | 2024 |
| Semi-decentralized model for drone collaboration on secure measurement of positions M Kara, A Laouid, A Bounceur, M Hammoudeh, M Alshaikh, R Kebache Proceedings of the 5th International Conference on Future Networks and …, 2021 | 24 | 2021 |
| A probabilistic public-key encryption with ensuring data integrity in cloud computing M Kara, K Karampidis, G Papadourakis, A Laouid, M AlShaikh 2023 International Conference on Control, Artificial Intelligence, Robotics …, 2023 | 23 | 2023 |
| Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using OTP With a Single Pre-Shared Key. M Kara, A Laouid, A Bounceur, M Hammoudeh, M AlShaikh Journal of Information Science & Engineering 39 (1), 2023 | 19 | 2023 |
| A novel delegated proof of work consensus protocol M Kara, A Laouid, A Bounceur, F Lalem, M AlShaikh, R Kebache, Z Sayah 2021 International Conference on Artificial Intelligence for Cyber Security …, 2021 | 19 | 2021 |
| Image encryption algorithm based on factorial decomposition M AlShaikh, M Alzaqebah, N Gmati, N Alrefai, MK Alsmadi, I Almarashdeh, ... Multimedia Tools and Applications 83 (40), 88447-88467, 2024 | 18 | 2024 |
| Asymmetric image encryption based on twin message fusion ME Kahla, M Beggas, A Laouid, M Kara, M AlShaikh 2021 International Conference on Artificial Intelligence for Cyber Security …, 2021 | 18 | 2021 |
| A novel CT scan images watermarking scheme in DWT transform coefficients M AlShaikh, L Laouamer, L Nana, A Pascu International Journal Of Computer Science And Network Security (IJCSNS) 16 …, 2016 | 18 | 2016 |
| An adaptive and efficient fully homomorphic encryption technique MA Yagoub, A Laouid, O Kazar, A Bounceur, R Euler, M AlShaikh Proceedings of the 2nd International Conference on Future Networks and …, 2018 | 16 | 2018 |
| Data Authenticity and Integrity in Wireless Sensor Networks Based on a Watermarking Approach. F Lalem, M Alshaikh, A Bounceur, R Euler, L Laouamer, L Nana, A Pascu FLAIRS, 282-287, 2016 | 15 | 2016 |
| Informed symmetric encryption algorithm for DICOM medical image based on N-grams L Laouamer, M Al Shaikh, LT Nana, AC Pascu 2013 Science and Information Conference, 353-357, 2013 | 15 | 2013 |
| Robust watermarking based on modified Pigeon algorithm in DCT domain M AlShaikh, M Alzaqebah, S Jawarneh Multimedia Tools and Applications 82 (2), 3033-3053, 2023 | 14 | 2023 |
| Robust and imperceptible medical image watermarking based on dijkstra algorithm M AlShaikh, L Laouamer, A Laouid, A Bounceur, M Hammoudeh Proceedings of the 3rd international conference on future networks and …, 2019 | 9 | 2019 |