Survey of web application vulnerability attacks OB Al-Khurafi, MA Al-Ahmad 2015 4th International Conference on Advanced Computer Science Applications …, 2015 | 67* | 2015 |
Cryptographic hash function: A high level view AA Alkandari, IF Al-Shaikhli, MA Alahmad 2013 international conference on informatics and creative multimedia, 128-134, 2013 | 36 | 2013 |
Broad view of cryptographic hash functions MA AlAhmad, IF Alshaikhli International Journal of Computer Science Issues (IJCSI) 10 (4), 239, 2013 | 28 | 2013 |
A new fragile digital watermarking technique for a PDF digital Holy Quran MA AlAhmad, I Alshaikhli, AE Alduwaikh 2013 International Conference on Advanced Computer Science Applications and …, 2013 | 25 | 2013 |
Hisec: A new lightweight block cipher algorithm SSM AlDabbagh, IFT Al Shaikhli, MA Alahmad Proceedings of the 7th International Conference on Security of Information …, 2014 | 23 | 2014 |
Comparison and analysis study of SHA-3 finalists IF Alshaikhli, MA Alahmad, K Munthir 2012 International Conference on Advanced Computer Science Applications and …, 2012 | 22 | 2012 |
Achieving Security for Images by LSB and MD5 MA Ahmad, DI Alshaikhli, SO Alhussainan J Adv Comput Sci Technol Res, 127-39, 2012 | 17 | 2012 |
Hash function of finalist SHA-3: Analysis study I Al Shaikhli, M Alahmad, K Munthir International Journal of Advanced Computer Science and Information …, 2014 | 15 | 2014 |
Protection of the Digital Holy Quran hash digest by using cryptography algorithms MA AlAhmad, I Alshaikhli, B Jumaah 2013 International Conference on Advanced Computer Science Applications and …, 2013 | 14 | 2013 |
Protection of the texts using Base64 and MD5 MA Ahmad, IF Al Journal of Advanced Computer Science and Technology Research 2 (1), 22, 2012 | 14 | 2012 |
Comparison between pow and pos systems of cryptocurrency MA Al Ahmad, A Al-Saleh, FA Al Masoud Indonesian Journal of Electrical Engineering and Computer Science 10 (3 …, 2018 | 13 | 2018 |
Identifying significant elements of the digital transformation of organizations in Kuwait A Alshehab, T Alfozan, HF Gaderrab, MA Alahmad, A Alkandari Indonesian Journal of Electrical Engineering and Computer Science 26 (1 …, 2022 | 8 | 2022 |
Design of a new cryptographic hash function–titanium MA AlAhmad Indonesian Journal of Electrical Engineering and Computer Science 10 (2 …, 2018 | 8 | 2018 |
Joux multicollisions attack in sponge construction MA AlAhmad, IF Alshaikhli, M Nandi Proceedings of the 6th International Conference on Security of Information …, 2013 | 8 | 2013 |
Method for generating a secure cryptographic hash function MA Alahmad, IF Alshaikhli US Patent App. 14/167,902, 2015 | 7 | 2015 |
Interference management in femtocells A Alkandari, MA Ahmad Journal of Advanced Computer Science and Technology Research 2 (1), 10-21, 2012 | 7 | 2012 |
Security threats of finger print biometric in network system environment IF Alshaikhli, MA Ahmad Journal of Advanced Computer Science and Technology Research 1, 36-51, 2011 | 6 | 2011 |
Double-A--A Salsa20 Like: The Design A Issa, MA Al-Ahmad, A Al-Saleh 2015 4th International Conference on Advanced Computer Science Applications …, 2015 | 5 | 2015 |
International Journal of Computer Engineering & Technology (ijcet) DK Mahapatra, GK Pradhan Journal Impact Factor 4 (3), 389-409, 2013 | 5* | 2013 |
Comparison between bitcoin and quarkchain JS Aldakheel, MA AlAhmad, A Al-Foudery Journal of Computational and Theoretical Nanoscience 16 (3), 818-822, 2019 | 4 | 2019 |