Dr. Ali A. Yassin
Dr. Ali A. Yassin
Assistant Professor of Computer Science, University of Basrah
Verified email at uobasrah.edu.iq - Homepage
Title
Cited by
Cited by
Year
Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data
A Ibrahim, H Jin, AA Yassin, D Zou
2012 IEEE Asia-Pacific Services Computing Conference, 263-270, 2012
432012
Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing
AA Yassin, H Jin, A Ibrahim, D Zou
2012 Second International Conference on Cloud and Green Computing, 282-289, 2012
382012
Efficient password-based two factors authentication in cloud computing
AA Yassin, H Jin, A Ibrahim, W Qiang, D Zou
International Journal of Security and Its Applications 6 (2), 143-148, 2012
342012
Cloud authentication based on anonymous one-time password
AA Yassin, H Jin, A Ibrahim, W Qiang, D Zou
Ubiquitous Information Technologies and Applications, 423-431, 2013
312013
A practical privacy-preserving password authentication scheme for cloud computing
AA Yassin, H Jin, A Ibrahim, W Qiang, D Zou
2012 IEEE 26th International Parallel and Distributed Processing Symposium …, 2012
302012
Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network
MA Alazzawi, H Lu, AA Yassin, K Chen
IEEE Access 7, 71424-71435, 2019
262019
Approximate keyword-based search over encrypted cloud data
A Ibrahim, H Jin, AA Yassin, D Zou
2012 IEEE Ninth International Conference on e-Business Engineering, 238-245, 2012
172012
Cloud authentication based on encryption of digital image using edge detection
AA Yassin, AA Hussain, KAA Mutlaq
2015 The International Symposium on Artificial Intelligence and Signal …, 2015
132015
Towards privacy preserving mining over distributed cloud databases
A Ibrahim, H Jin, AA Yassin, D Zou
2012 Second International Conference on Cloud and Green Computing, 130-136, 2012
132012
Towards efficient yet privacy-preserving approximate search in cloud computing
A Ibrahim, H Jin, AA Yassin, D Zou, P Xu
The Computer Journal 57 (2), 241-254, 2014
122014
Using discrete wavelet transformation to enhance underwater image
AA Yassin, RM Ghadban, SF Saleh, HZ Neima
International Journal of Computer Science Issues (IJCSI) 10 (5), 220, 2013
112013
Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext
ZA Hussien, H Jin, ZA Abduljabbar, AA Yassin, MA Hussain, SH Abbdal, ...
2015 11th International Conference on Information Assurance and Security …, 2015
102015
Vppcs: Vanet-based privacy-preserving communication scheme
MA Al-Shareeda, M Anbar, S Manickam, AA Yassin
IEEE Access 8, 150914-150928, 2020
82020
Secure and efficient e-health scheme based on the Internet of Things
ZA Hussien, H Jin, ZA Abduljabbar, MA Hussain, AA Yassin, SH Abbdal, ...
2016 IEEE International Conference on Signal Processing, Communications and …, 2016
62016
Robust conditional privacy-preserving authentication based on pseudonym root with cuckoo filter in vehicular ad hoc networks
MA Alazzawi, H Lu, AA Yassin, K Chen
KSII Transactions on Internet and Information Systems (TIIS) 13 (12), 6121-6144, 2019
52019
Encrypted remote user authentication scheme by using smart card
AA Yassin, H Jin, A Ibrahim, D Zou
International Conference on Web Information Systems and Mining, 314-323, 2012
52012
Low-Overhead Remote User Authentication Protocol for IoT Based on a Fuzzy Extractor and Feature Extraction
BH Taher, S Jiang, AA Yassin, H Lu
IEEE Access 7, 148950-148966, 2019
42019
An efficient and robust one-time message authentication code scheme using feature extraction of iris in cloud computing
ZA Abduljabbar, H Jin, D Zou, AA Yassin, ZA Hussien, MA Hussain
Proceedings of 2014 International Conference on Cloud Computing and Internet …, 2014
42014
Security and integrity of data in cloud computing based on feature extraction of handwriting signature
AA Yassin, HZ Neima, HS Hashim
International Journal of Cyber-Security and Digital Forensics 3 (2), 93-106, 2014
42014
Authentication and revocation scheme for VANETs based on Chinese Remainder Theorem
MA Alazzawi, K Chen, AA Yassin, H Lu, F Abedi
2019 IEEE 21st International Conference on High Performance Computing and …, 2019
32019
The system can't perform the operation now. Try again later.
Articles 1–20