Follow
Zeyad Al-Odat
Zeyad Al-Odat
Other namesZeyad A Al-Odat
Tafila Technical University
Verified email at ttu.edu.jo - Homepage
Title
Cited by
Cited by
Year
Secure hash algorithms and the corresponding FPGA optimization techniques
ZA Al-Odat, M Ali, A Abbas, SU Khan
ACM Computing Surveys (CSUR) 53 (5), 1-36, 2020
252020
Randomness analyses of the secure hash algorithms, SHA-1, SHA-2 and modified SHA
Z Al-Odat, A Abbas, SU Khan
2019 International Conference on Frontiers of Information Technology (FIT …, 2019
222019
IoT-Based Secure Embedded Scheme for Insulin Pump Data Acquisition and Monitoring
ZA Al-Odat
CYBER 2018, The Third International Conference on Cyber-Technologies and …, 2018
172018
The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions
Z Al-Odat, S Khan
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), 2019
152019
A Reliable IoT-Based Embedded Health Care System for Diabetic Patients
ZA Al-Odat, SK Srinivasan, EM Al-Qtiemat, S Shuja
International Journal On Advances in Internet Technology 12 (1&2), 2019
152019
Mitigation and Improving SHA-1 Standard Using Collision Detection Approach
Z Al-Odat, M Ali, SU Khan
2018 International Conference on Frontiers of Information Technology (FIT …, 2018
122018
A Big Data Storage Scheme Based on Distributed Storage Locations and Multiple Authorizations
Z Al-Odat, E Al-Qtiemat, S Khan
2019 IEEE 5th International Conference on Big Data Security and Privacy …, 2019
102019
Constructions and attacks on hash functions
Z Al-Odat, S Khan
2019 International Conference on Computational Science and Computational …, 2019
82019
Anonymous privacy-preserving scheme for big data over the cloud
ZA Al-Odat, SU Khan
2019 IEEE International Conference on Big Data (Big Data), 5711-5717, 2019
62019
A modified secure hash design to circumvent collision and length extension attacks
ZA Al-Odat, SU Khan, E Al-Qtiemat
Journal of Information Security and Applications 71, 103376, 2022
52022
An efficient lightweight cryptography hash function for big data and iot applications
ZA Al-Odat, EM Al-Qtiemat, SU Khan
2020 IEEE Cloud Summit, 66-71, 2020
52020
Analyses, mitigation and applications of secure hash algorithms
ZAH Al-Odat
North Dakota State University, 2020
22020
Synthesis of Formal Specifications From Requirements for Refinement-based Real Time Object Code Verification
E Al-Qtiemat, S Srinivasan, Z Al-Odat, M Asha Latha Dubasi, S Shuja
International Journal On Advances in Security 12 (1&2), 95-107, 2019
22019
A new method to fit logistic functions with wind turbines power curves using manufacturer datasheets
Q Aldaoudeyeh, Al-Motasem and Alzaareer, Khaled and Harasis, Salman and Al ...
IET Renewable Power Generation, 2021
1*2021
Refinement maps for insulin pump control software safety verification
EM Al-qtiemat, SK Srinivasan, ZA Al-Odat, S Shuja
The Eleventh International Conference on Advances in System Testing and …, 2019
12019
Refinement checker for embedded object code verification
MAL Dubasi, SK Srinivasan, S Shuja, ZA Al-Odat
Proceedings of the The Fourth International Conference on Cyber-Technologies …, 0
1
EXAMINING CLOUD SECURITY: IDENTIFYING RISKS AND THE IMPLEMENTED MITIGATION STRATEGIES
E AL-QTIEMAT, Z AL-ODAT
Journal of Theoretical and Applied Information Technology 102 (7), 2024
2024
A novel monotonic wind turbine power-speed characteristics model.
AM Aldaoudeyeh, K Alzaareer, D Wu, M Obeidat, S Harasis, Z Al-Odat, ...
AIMS Energy 11 (6), 2023
2023
Synthesis of Refinement Maps for Real-Time Object Code Verification
EM Al-qtiemat, SK Srinivasan, ZA Al-Odat, S Shuja
International Journal on Advances in Life Sciences Volume 12, Number 1 & 2, 2020, 2020
2020
Refinement Maps for Insulin Pump Control Software Safety Verification
SS Eman Al-Qtiemat, Sudarshan Srinivasan, Zeyad Al-Odat
VALID 2019, The Eleventh International Conference on Advances in System …, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20