Dr. Ali A. Yassin
Dr. Ali A. Yassin
Assistant Professor of Computer Science, University of Basrah
Verified email at uobasrah.edu.iq - Homepage
Title
Cited by
Cited by
Year
Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data
A Ibrahim, H Jin, AA Yassin, D Zou
2012 IEEE Asia-Pacific Services Computing Conference, 263-270, 2012
402012
Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing
AA Yassin, H Jin, A Ibrahim, D Zou
2012 Second International Conference on Cloud and Green Computing, 282-289, 2012
392012
Efficient password-based two factors authentication in cloud computing
AA Yassin, H Jin, A Ibrahim, W Qiang, D Zou
International Journal of Security and Its Applications 6 (2), 143-148, 2012
342012
Cloud authentication based on anonymous one-time password
AA Yassin, H Jin, A Ibrahim, W Qiang, D Zou
Ubiquitous Information Technologies and Applications, 423-431, 2013
292013
A practical privacy-preserving password authentication scheme for cloud computing
AA Yassin, H Jin, A Ibrahim, W Qiang, D Zou
2012 IEEE 26th International Parallel and Distributed Processing Symposium …, 2012
292012
Approximate keyword-based search over encrypted cloud data
A Ibrahim, H Jin, AA Yassin, D Zou
2012 IEEE Ninth International Conference on e-Business Engineering, 238-245, 2012
172012
Towards privacy preserving mining over distributed cloud databases
A Ibrahim, H Jin, AA Yassin, D Zou
2012 Second International Conference on Cloud and Green Computing, 130-136, 2012
122012
Cloud authentication based on encryption of digital image using edge detection
AA Yassin, AA Hussain, KAA Mutlaq
2015 The International Symposium on Artificial Intelligence and Signal …, 2015
112015
Towards efficient yet privacy-preserving approximate search in cloud computing
A Ibrahim, H Jin, AA Yassin, D Zou, P Xu
The Computer Journal 57 (2), 241-254, 2014
112014
Using discrete wavelet transformation to enhance underwater image
AA Yassin, RM Ghadban, SF Saleh, HZ Neima
International Journal of Computer Science Issues (IJCSI) 10 (5), 220, 2013
112013
Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext
ZA Hussien, H Jin, ZA Abduljabbar, AA Yassin, MA Hussain, SH Abbdal, ...
2015 11th International Conference on Information Assurance and Security …, 2015
102015
Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network
MA Alazzawi, H Lu, AA Yassin, K Chen
IEEE Access 7, 71424-71435, 2019
62019
Encrypted remote user authentication scheme by using smart card
AA Yassin, H Jin, A Ibrahim, D Zou
International Conference on Web Information Systems and Mining, 314-323, 2012
52012
Secure and efficient e-health scheme based on the Internet of Things
ZA Hussien, H Jin, ZA Abduljabbar, MA Hussain, AA Yassin, SH Abbdal, ...
2016 IEEE International Conference on Signal Processing, Communications and …, 2016
42016
An efficient and robust one-time message authentication code scheme using feature extraction of iris in cloud computing
ZA Abduljabbar, H Jin, D Zou, AA Yassin, ZA Hussien, MA Hussain
Proceedings of 2014 International Conference on Cloud Computing and Internet …, 2014
42014
Security and integrity of data in cloud computing based on feature extraction of handwriting signature
AA Yassin, HZ Neima, HS Hashim
International Journal of Cyber-Security and Digital Forensics 3 (2), 93-106, 2014
42014
Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment
ZA Abduljabbar, H Jin, ZA Hussien, AA Yassin, MA Hussain, SH Abbdal, ...
2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016
32016
An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage
SH Abbdal, H Jin, AA Yassin, ZA Abduljabbar, MA Hussain, ZA Hussien, ...
2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016
32016
Secure and Efficient Data Integrity Based on Iris Features in Cloud Computing
SH Abbdal, H Jin, D Zou, AA Yassin
2014 7th International Conference on Security Technology, 3-6, 2014
32014
TOWARD FOR STRONG AUTHENTICATION CODE IN CLOUD OF INTERNET OF THINGS BASED ON DWT AND STEGANOGRAPHY.
ALIA YASSIN, AM RASHID, ZA ABDULJABBAR, HALIA ALASADI, ...
Journal of Theoretical & Applied Information Technology 96 (10), 2018
22018
The system can't perform the operation now. Try again later.
Articles 1–20