Follow
Dr. Mohammad AlAhmad
Dr. Mohammad AlAhmad
Doctor of Computer Teacher Department, College of Basic Education, The Public Authority of Applied
Verified email at paaet.edu.kw - Homepage
Title
Cited by
Cited by
Year
Survey of web application vulnerability attacks
OB Al-Khurafi, MA Al-Ahmad
2015 4th International Conference on Advanced Computer Science Applications …, 2015
67*2015
Cryptographic hash function: A high level view
AA Alkandari, IF Al-Shaikhli, MA Alahmad
2013 international conference on informatics and creative multimedia, 128-134, 2013
362013
Broad view of cryptographic hash functions
MA AlAhmad, IF Alshaikhli
International Journal of Computer Science Issues (IJCSI) 10 (4), 239, 2013
282013
A new fragile digital watermarking technique for a PDF digital Holy Quran
MA AlAhmad, I Alshaikhli, AE Alduwaikh
2013 International Conference on Advanced Computer Science Applications and …, 2013
252013
Hisec: A new lightweight block cipher algorithm
SSM AlDabbagh, IFT Al Shaikhli, MA Alahmad
Proceedings of the 7th International Conference on Security of Information …, 2014
232014
Comparison and analysis study of SHA-3 finalists
IF Alshaikhli, MA Alahmad, K Munthir
2012 International Conference on Advanced Computer Science Applications and …, 2012
222012
Achieving Security for Images by LSB and MD5
MA Ahmad, DI Alshaikhli, SO Alhussainan
J Adv Comput Sci Technol Res, 127-39, 2012
172012
Hash function of finalist SHA-3: Analysis study
I Al Shaikhli, M Alahmad, K Munthir
International Journal of Advanced Computer Science and Information …, 2014
152014
Protection of the Digital Holy Quran hash digest by using cryptography algorithms
MA AlAhmad, I Alshaikhli, B Jumaah
2013 International Conference on Advanced Computer Science Applications and …, 2013
142013
Protection of the texts using Base64 and MD5
MA Ahmad, IF Al
Journal of Advanced Computer Science and Technology Research 2 (1), 22, 2012
142012
Comparison between pow and pos systems of cryptocurrency
MA Al Ahmad, A Al-Saleh, FA Al Masoud
Indonesian Journal of Electrical Engineering and Computer Science 10 (3 …, 2018
132018
Identifying significant elements of the digital transformation of organizations in Kuwait
A Alshehab, T Alfozan, HF Gaderrab, MA Alahmad, A Alkandari
Indonesian Journal of Electrical Engineering and Computer Science 26 (1 …, 2022
82022
Design of a new cryptographic hash function–titanium
MA AlAhmad
Indonesian Journal of Electrical Engineering and Computer Science 10 (2 …, 2018
82018
Joux multicollisions attack in sponge construction
MA AlAhmad, IF Alshaikhli, M Nandi
Proceedings of the 6th International Conference on Security of Information …, 2013
82013
Method for generating a secure cryptographic hash function
MA Alahmad, IF Alshaikhli
US Patent App. 14/167,902, 2015
72015
Interference management in femtocells
A Alkandari, MA Ahmad
Journal of Advanced Computer Science and Technology Research 2 (1), 10-21, 2012
72012
Security threats of finger print biometric in network system environment
IF Alshaikhli, MA Ahmad
Journal of Advanced Computer Science and Technology Research 1, 36-51, 2011
62011
Double-A--A Salsa20 Like: The Design
A Issa, MA Al-Ahmad, A Al-Saleh
2015 4th International Conference on Advanced Computer Science Applications …, 2015
52015
International Journal of Computer Engineering & Technology (ijcet)
DK Mahapatra, GK Pradhan
Journal Impact Factor 4 (3), 389-409, 2013
5*2013
Comparison between bitcoin and quarkchain
JS Aldakheel, MA AlAhmad, A Al-Foudery
Journal of Computational and Theoretical Nanoscience 16 (3), 818-822, 2019
42019
The system can't perform the operation now. Try again later.
Articles 1–20