Proposed random unified chaotic map as PRBG for voice encryption in wireless communication SB Sadkhan, RS Mohammed Procedia computer science 65, 314-323, 2015 | 57 | 2015 |
Speech scrambler based on proposed random chaotic maps RS Mohammed, SB Sadkhan Multidisciplinary in IT and Communication Science and Applications (AIC …, 2016 | 20 | 2016 |
Recent Audio Steganography Trails and its Quality Measures SB Sadkhan, AA Mahdi, RS Mohammed 2019 First International Conference of Computer and Applied Sciences (CAS …, 2019 | 18 | 2019 |
A proposed voice encryption based on Random Lorenz map with DCT permutation SB Sadkhan, RS Mohammed International Journal of Advancements in Computing Technology 7 (3), 90, 2015 | 16 | 2015 |
Chaos based cryptography for voice encryption in wireless communication SB Sadkhan, A Al-Sherbaz, RS Mohammed 2013 International Conference on Electrical Communication, Computer, Power …, 2013 | 15 | 2013 |
Security and privacy in the Internet of Things (IoT): Survey RS Mohammed, AH Mohammed, FN Abbas 2019 2nd International Conference on Electrical, Communication, Computer …, 2019 | 13 | 2019 |
Lightweight authentication methods in IoT: Survey WK Ahmed, RS Mohammed 2022 International Conference on Computer Science and Software Engineering …, 2022 | 11 | 2022 |
Data hiding based on independent component analyses (ICA) AA Mahdi, RS Mohammed, SB Sadkhan Solid State Technology 63 (3), 3617-3638, 2020 | 11 | 2020 |
Stream cipher based on chaotic maps EL Mohaisen, RS Mohammed 2019 First International Conference of Computer and Applied Sciences (CAS …, 2019 | 9 | 2019 |
Image encryption under spatial domain based on modify 2D LSCM chaotic map via dynamic substitution-permutation network RS Mohammed, KK Jabbar, HA Hilal International Journal of Electrical and Computer Engineering (IJECE) 11 (4 …, 2021 | 6 | 2021 |
Improving Salsa20 stream cipher using random chaotic maps EL Mohaisen, RS Mohammed 2020 3rd International Conference on Engineering Technology and its …, 2020 | 6 | 2020 |
Subject review: cloud computing security based on cryptography AA Maryoosh, RS Mohammed, RA Mustafa International Journal of Engineering Research and Advanced Technology-IJERAT …, 2019 | 6 | 2019 |
Hybridity of Cryptography and Steganography Techniques: Current Status RS Mohammed, SB Sadkhan International Conference on Change, Innovation, Informatics and Disruptive …, 2016 | 6 | 2016 |
A novel technique of privacy preserving association rule mining RS Mohammed, EM Hussien, JR Mutter Multidisciplinary in IT and Communication Science and Applications (AIC …, 2016 | 6 | 2016 |
Security Challenges and Cyber-Attacks for Internet of Things RM Abdul-Hussein, RS Mohammed, AH Mohammed 2021 1st Babylon International Conference on Information Technology and …, 2021 | 5 | 2021 |
Chaos-Based Cryptography for Voice Secure Wireless-Chapter 4 SB Sadkhan, R Saad Multidisciplinary Perspectives in Cryptology and Information Security, 97-132, 2014 | 5 | 2014 |
TEXT CRYPTOGRAPHY USING MULTIPLE ENCRYPTION ALGORITHMS BASED ON CIRCULAR QUEUE VIA CLOUD COMPUTING ENVIRONMENT. KK JABBAR, HABD HILAL, RS MOHAMMED Journal of Theoretical & Applied Information Technology 96 (12), 2018 | 4 | 2018 |
Iris matching Using SURF algorithm RS Mohammed, NJ Habeeb, ZM Abood International Journal of Signal Processing, Image Processing and Pattern …, 2016 | 4 | 2016 |
Improving Keystream Generation for Sosemanuk Stream Cipher Using Twofish Block Cipher SK Avakian, RS Mohammed Engineering and Technology Journal 27 (10), 2009 | 4 | 2009 |
Design a Lightweight Authentication Encryption Based on Stream Cipher and Chaotic Maps with Sponge Structure for Internet of Things Applications RS Mohammed International Journal of Intelligent Engineering and Systems 16 (1), 532–547, 2023 | 3 | 2023 |