Secure Data In LoRaWAN Network By Adaptive Method Of Elliptic-curve Cryptography N Raad, T Hasan, A Chalak, J Waleed 2019 International Conference on Computing and Information Science and …, 2019 | 13 | 2019 |
Iraqi e-voting system based on smart contract using private blockchain technology MH Jumaa, AC Shakir Informatica 46 (6), 2022 | 10 | 2022 |
Chinese language steganography using the Arabic diacritics as a covered media AC Shakir, G Xuemai, J Min International Journal of Computer Applications 11 (1), 43-46, 2010 | 7 | 2010 |
Verification Process of Academic Certificates Using Blockchain Technology. AS Kareem, AC Shakir Kirkuk University Journal for Scientific Studies 18 (1), 2023 | 5 | 2023 |
A Novel VLSI Architecture of a Weighted Average Method based Defuzzifier Unit SA Loan, AM Murshid, AC Shakir, AR Alamoud, SA Abbasi Proceedings of the International MultiConference of Engineers and Computer …, 2014 | 4 | 2014 |
Securing Message in Wireless Sensor Network by using New Method of Code Conversions JM Ahmed Chalak Shakir, GuXuemai International Journal of Electronics and Communication Engineering 5 (5 …, 2011 | 3* | 2011 |
An end to end key establishment scheme for detecting black hole attacks in mobile ad hoc networks BA Mahmood, AA Majeed, AC Shakir Indonesian Journal of Electrical Engineering and Computer Science 21 (2 …, 2021 | 2 | 2021 |
ECC Based Data Retrieval Using LoRaWAN Technology ACS Nibras Raad, Taha Mohammed Hasan International journal of engineering and technology 7 (4), 4918-4921, 2018 | 2* | 2018 |
The Enhanced data sequence method for ECC cryptosystem AA Majeed, KA Ameen, AC Shakir, Y Alyeksyeyenkov Applied Mathematical Sciences 8 (109-112), 5553-5564, 2014 | 2 | 2014 |
A secure and energy saving protocol for wireless sensor networks AA Majeed, BA Mahmood, AC Shakir Bulletin of Electrical Engineering and Informatics 10 (6), 3353-3360, 2021 | 1 | 2021 |
Secure Data Transmissions for Iraqi National Identification Card Using LoRaWAN Protocol N Raad, TM Hasan, A Chalak, J Waleed 2019 2nd International Conference on Engineering Technology and its …, 2020 | 1 | 2020 |
Hastening Point Multiplication in the ECC AC Shakir, J Min, G Xuemai Information Technology Journal 12 (9), 1780, 2013 | 1 | 2013 |
Review Study: Blockchain Application in Payroll System MM Ahmed, AC Shakir Al-Kitab Journal for Pure Sciences 7 (1), 83-99, 2023 | | 2023 |
Review Study of E-Voting System Based on Smart Contracts Using Blockchain Technology MH Jumaa, AC Shakir Iraqi Journal of Science, 2001-2022, 2023 | | 2023 |
Center of Largest Area Defuzzifier Vnit VLSI Architecture AM Murshid, AC Shakir, SN Mohammed Tikrit Journal of Pure Science 21 (6), 160-166, 2016 | | 2016 |
Data Center Temperature Monitoring via Simulated Sensor Network NWBAC Shakir JZS 16 (4), 25-30, 2014 | | 2014 |
New Scalar Encoding Method to Accelerate Point Multiplication in Elliptic Curve Cryptography CS Ahmed, M Jia, X Gu Communications, Signal Processing, and Systems: The 2012 Proceedings of the …, 2012 | | 2012 |
Securing Messages in Wireless Channel by Using New Method of Compression AC Shakir, G Xuemai, J Min Research Journal of Applied Sciences, Engineering and Technology 3 (7), 625-632, 2011 | | 2011 |