default search action
Mustafa A. Al Sibahee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Mustafa A. Al Sibahee, Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Chengwen Luo, Jin Zhang, Junchao Ma:
Two-Factor Privacy-Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks. IEEE Internet Things J. 11(8): 14253-14266 (2024) - [j10]Mustafa A. Al Sibahee, Zaid Ameen Abduljabbar, Alladoumbaye Ngueilbaye, Chengwen Luo, Jianqiang Li, Yijing Huang, Jin Zhang, Naveed Khan, Vincent Omollo Nyangaresi, Ali Hasan Ali:
Blockchain-Based Authentication Schemes in Smart Environments: A Systematic Literature Review. IEEE Internet Things J. 11(21): 34774-34796 (2024) - 2023
- [c13]Haitang Zhang, Junchao Ma, Zixia Qiu, Junmei Yao, Mustafa A. Al Sibahee, Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi:
Multi-GPU Parallel Pipeline Rendering with Splitting Frame. CGI 2023: 223-235 - [c12]Mustafa A. Al Sibahee, Chengwen Luo, Jin Zhang, Yijing Huang, Zaid Ameen Abduljabbar:
Dynamic Searchable Scheme with Forward Privacy for Encrypted Document Similarity. TrustCom 2023: 1653-1660 - 2022
- [j9]Zaid Ameen Abduljabbar, Iman Qays Abduljaleel, Junchao Ma, Mustafa A. Al Sibahee, Vincent Omollo Nyangaresi, Dhafer G. Honi, Ayad I. Abdulsada, Xianlong Jiao:
Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Map. IEEE Access 10: 26257-26270 (2022) - [j8]Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi, Mustafa A. Al Sibahee, Mudhafar Jalil Jassim Ghrabat, Junchao Ma, Iman Qays Abduljaleel, Abdulla J. Y. Aldarwish:
Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks. J. Sens. Actuator Networks 11(3): 55 (2022) - [j7]Iman Qays Abduljaleel, Zaid Ameen Abduljabbar, Mustafa A. Al Sibahee, Mudhafar Jalil Jassim Ghrabat, Junchao Ma, Vincent Omollo Nyangaresi:
A Lightweight Hybrid Scheme for Hiding Text Messages in Colour Images Using LSB, Lah Transform and Chaotic Techniques. J. Sens. Actuator Networks 11(4): 66 (2022) - [c11]Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi, Junchao Ma, Mustafa A. Al Sibahee, Mustafa S. Khalefa, Dhafer G. Honi:
MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones. FABULOUS 2022: 16-36 - [c10]Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Ismail Yaqub Maolood, Mustafa A. Al Sibahee, Junchao Ma, Abdulla J. Y. Aldarwish:
Transient Session Key Derivation Protocol for Key Escrow Prevention in Public Key Infrastructure. IoECon 2022: 103-116 - 2021
- [c9]Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Mustafa A. Al Sibahee, Enas Wahab Abood, Iman Qays Abduljaleel:
Dynamic Ephemeral and Session Key Generation Protocol for Next Generation Smart Grids. ADHOCNETS/TRIDENTCOM 2021: 188-204 - [c8]Zaid Ameen Abduljabbar, Ayad Ibrahim, Mustafa A. Al Sibahee, Songfeng Lu, Samir M. Umran:
Lightweight Privacy-Preserving Similar Documents Retrieval over Encrypted Data. COMPSAC 2021: 1397-1398 - [c7]Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Salah H. Abbdal Refish, Mustafa A. Al Sibahee, Enas Wahab Abood, Songfeng Lu:
Anonymous Key Agreement and Mutual Authentication Protocol for Smart Grids. CrownCom/WiCON 2021: 325-340 - [c6]Mustafa A. Al Sibahee, Songfeng Lu, Zaid Ameen Abduljabbar, Ke Xu, Enas Wahab Abood, Ahmed Abdulelah Jasim Al-Ashoor, Samet Yilmaz, Erasmus Xin Liu:
Towards Iris-Based Authentication for Smart Devices in the Cloud. ICICT (3) 2021: 953-964 - [c5]Mohammed Abdulridha Hussain, Salah H. Abbdal Refish, Mustafa S. Khalefa, Sarah Abdulridha Hussain, Zaid Alaa Hussien, Zaid Ameen Abduljabbar, Mustafa A. Al Sibahee:
Web application database protection from SQLIA using permutation encoding. ICISS 2021: 13-21 - [c4]Mustafa A. Al Sibahee, Vincent Omollo Nyangaresi, Junchao Ma, Zaid Ameen Abduljabbar:
Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things. IoTaaS 2021: 3-18 - 2020
- [j6]Mustafa A. Al Sibahee, Songfeng Lu, Zaid Ameen Abduljabbar, Erasmus Xin Liu, Hemn B. Abdalla, Mohammed Abdulridha Hussain, Zaid Alaa Hussien, Mudhafar Jalil Jassim Ghrabat:
Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System. IEEE Access 8: 218331-218347 (2020) - [j5]Hemn Barzan Abdalla, Awder M. Ahmed, Mustafa A. Al Sibahee:
Optimization Driven MapReduce Framework for Indexing and Retrieval of Big Data. KSII Trans. Internet Inf. Syst. 14(5): 1886-1908 (2020) - [c3]Keyan Abdul-Aziz Mutlaq, Zaid Ameen Abduljabbar, Zainab Amin Abduljabbar, Erasmus Xin Liu, Mustafa A. Al Sibahee:
Toward Awareness Locality Algorithms of Peer-to-Peer File Sharing Network. CCIOT 2020: 6-12 - [c2]Mustafa A. Al Sibahee, Songfeng Lu, Zaid Ameen Abduljabbar, Erasmus Xin Liu, Yanli Ran, Ahmed Abdulelah Jasim Al-Ashoor, Mohammed Abdulridha Hussain, Zaid Alaa Hussien:
Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud. ICSPCC 2020: 1-6
2010 – 2019
- 2019
- [j4]Mudhafar Jalil Jassim Ghrabat, Guangzhi Ma, Zaid Ameen Abduljabbar, Mustafa A. Al Sibahee, Safa Jalil Jassim:
Greedy Learning of Deep Boltzmann Machine (GDBM)'s Variance and Search Algorithm for Efficient Image Retrieval. IEEE Access 7: 169142-169159 (2019) - [j3]Mohammad Z. Masoud, Yousef Jaradat, Ismael Jannoud, Mustafa A. Al Sibahee:
A hybrid clustering routing protocol based on machine learning and graph theory for energy conservation and hole detection in wireless sensor network. Int. J. Distributed Sens. Networks 15(6) (2019) - [j2]Zaid Ameen Abduljabbar, Ayad Ibrahim, Mohammed Abdulridha Hussain, Zaid Alaa Hussien, Mustafa A. Al Sibahee, Songfeng Lu:
EEIRI: Efficient Encrypted Image Retrieval in IoT-Cloud. KSII Trans. Internet Inf. Syst. 13(11): 5692-5716 (2019) - [c1]Zaid Alaa Hussien, Zaid Ameen Abduljabbar, Mohammed Abdulridha Hussain, Mustafa A. Al Sibahee, Songfeng Lu, Hamid Ali Abed Al-Asadi:
An Efficient and Secure Scheme for Dynamic Shared Data in Cloud. CSAE 2019: 155:1-155:6 - 2018
- [j1]Mustafa A. Al Sibahee, Songfeng Lu, Zaid Ameen Abduljabbar, Ayad Ibrahim, Zaid Alaa Hussien, Keyan Abdul-Aziz Mutlaq, Mohammed Abdulridha Hussain:
Efficient encrypted image retrieval in IoT-cloud with multi-user authentication. Int. J. Distributed Sens. Networks 14(2) (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint