[go: up one dir, main page]

Follow
Muath AlShaikh
Muath AlShaikh
Associate Professor, Cyber Security Department, College of Engineering, Al Ain University
Verified email at aau.ac.ae
Title
Cited by
Cited by
Year
A flexible encryption technique for the internet of things environment
S Medileh, A Laouid, R Euler, A Bounceur, M Hammoudeh, M AlShaikh, ...
Ad Hoc Networks 106, 102240, 2020
722020
Proof of chance: A lightweight consensus algorithm for the internet of things
M Kara, A Laouid, M Hammoudeh, M AlShaikh, A Bounceur
IEEE Transactions on Industrial Informatics 18 (11), 8336-8345, 2022
492022
Edge-based lightweight selective encryption scheme for digital medical images
OA Khashan, M AlShaikh
Multimedia Tools and Applications 79 (35), 26369-26388, 2020
492020
Robust watermarking scheme and tamper detection based on threshold versus intensity
L Laouamer, M AlShaikh, L Nana, AC Pascu
Journal of Innovation in Digital Ecosystems 2 (1-2), 1-12, 2015
442015
A compute and wait in pow (cw-pow) consensus algorithm for preserving energy consumption
M Kara, A Laouid, M AlShaikh, M Hammoudeh, A Bounceur, R Euler, ...
Applied Sciences 11 (15), 6750, 2021
402021
Secure key exchange against man-in-the-middle attack: Modified diffie-hellman protocol
M Kara, A Laouid, M AlShaikh, A Bounceur, M Hammoudeh
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika 7 (3), 380-387, 2021
312021
Efficient and robust encryption and watermarking technique based on a new chaotic map approach
M AlShaikh, L Laouamer, L Nana, AC Pascu
Multimedia Tools and Applications 76 (6), 8937-8950, 2017
302017
Using supervised learning to detect command and control attacks in iot
M AlShaikh, W Alsemaih, S Alamri, Q Ramadan
International Journal of Cloud Applications and Computing (IJCAC) 14 (1), 1-19, 2024
242024
Semi-decentralized model for drone collaboration on secure measurement of positions
M Kara, A Laouid, A Bounceur, M Hammoudeh, M Alshaikh, R Kebache
Proceedings of the 5th International Conference on Future Networks and …, 2021
242021
A probabilistic public-key encryption with ensuring data integrity in cloud computing
M Kara, K Karampidis, G Papadourakis, A Laouid, M AlShaikh
2023 International Conference on Control, Artificial Intelligence, Robotics …, 2023
232023
Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using OTP With a Single Pre-Shared Key.
M Kara, A Laouid, A Bounceur, M Hammoudeh, M AlShaikh
Journal of Information Science & Engineering 39 (1), 2023
192023
A novel delegated proof of work consensus protocol
M Kara, A Laouid, A Bounceur, F Lalem, M AlShaikh, R Kebache, Z Sayah
2021 International Conference on Artificial Intelligence for Cyber Security …, 2021
192021
Image encryption algorithm based on factorial decomposition
M AlShaikh, M Alzaqebah, N Gmati, N Alrefai, MK Alsmadi, I Almarashdeh, ...
Multimedia Tools and Applications 83 (40), 88447-88467, 2024
182024
Asymmetric image encryption based on twin message fusion
ME Kahla, M Beggas, A Laouid, M Kara, M AlShaikh
2021 International Conference on Artificial Intelligence for Cyber Security …, 2021
182021
A novel CT scan images watermarking scheme in DWT transform coefficients
M AlShaikh, L Laouamer, L Nana, A Pascu
International Journal Of Computer Science And Network Security (IJCSNS) 16 …, 2016
182016
An adaptive and efficient fully homomorphic encryption technique
MA Yagoub, A Laouid, O Kazar, A Bounceur, R Euler, M AlShaikh
Proceedings of the 2nd International Conference on Future Networks and …, 2018
162018
Data Authenticity and Integrity in Wireless Sensor Networks Based on a Watermarking Approach.
F Lalem, M Alshaikh, A Bounceur, R Euler, L Laouamer, L Nana, A Pascu
FLAIRS, 282-287, 2016
152016
Informed symmetric encryption algorithm for DICOM medical image based on N-grams
L Laouamer, M Al Shaikh, LT Nana, AC Pascu
2013 Science and Information Conference, 353-357, 2013
152013
Robust watermarking based on modified Pigeon algorithm in DCT domain
M AlShaikh, M Alzaqebah, S Jawarneh
Multimedia Tools and Applications 82 (2), 3033-3053, 2023
142023
Robust and imperceptible medical image watermarking based on dijkstra algorithm
M AlShaikh, L Laouamer, A Laouid, A Bounceur, M Hammoudeh
Proceedings of the 3rd international conference on future networks and …, 2019
92019
The system can't perform the operation now. Try again later.
Articles 1–20