Dr. Ali A. Yassin
Dr. Ali A. Yassin
Assistant Professor of Computer Science, Basra University
Verified email at uobasrah.edu.iq - Homepage
TitleCited byYear
Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing
AA Yassin, H Jin, A Ibrahim, D Zou
2012 Second International Conference on Cloud and Green Computing, 282-289, 2012
382012
Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data
A Ibrahim, H Jin, AA Yassin, D Zou
2012 IEEE Asia-Pacific Services Computing Conference, 263-270, 2012
342012
Efficient password-based two factors authentication in cloud computing
AA Yassin, H Jin, A Ibrahim, W Qiang, D Zou
International Journal of Security and Its Applications 6 (2), 143-148, 2012
312012
A practical privacy-preserving password authentication scheme for cloud computing
AA Yassin, H Jin, A Ibrahim, W Qiang, D Zou
2012 IEEE 26th International Parallel and Distributed Processing Symposium …, 2012
282012
Cloud authentication based on anonymous one-time password
AA Yassin, H Jin, A Ibrahim, W Qiang, D Zou
Ubiquitous Information Technologies and Applications, 423-431, 2013
272013
Using discrete wavelet transformation to enhance underwater image
AA Yassin, RM Ghadban, SF Saleh, HZ Neima
International Journal of Computer Science Issues (IJCSI) 10 (5), 220, 2013
112013
Towards privacy preserving mining over distributed cloud databases
A Ibrahim, H Jin, AA Yassin, D Zou
2012 Second International Conference on Cloud and Green Computing, 130-136, 2012
112012
Approximate keyword-based search over encrypted cloud data
A Ibrahim, H Jin, AA Yassin, D Zou
2012 IEEE Ninth International Conference on e-Business Engineering, 238-245, 2012
112012
Cloud authentication based on encryption of digital image using edge detection
AA Yassin, AA Hussain, KAA Mutlaq
2015 The International Symposium on Artificial Intelligence and Signal …, 2015
102015
Towards efficient yet privacy-preserving approximate search in cloud computing
A Ibrahim, H Jin, AA Yassin, D Zou, P Xu
The Computer Journal 57 (2), 241-254, 2014
92014
Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext
ZA Hussien, H Jin, ZA Abduljabbar, AA Yassin, MA Hussain, SH Abbdal, ...
2015 11th International Conference on Information Assurance and Security …, 2015
62015
Encrypted remote user authentication scheme by using smart card
AA Yassin, H Jin, A Ibrahim, D Zou
International Conference on Web Information Systems and Mining, 314-323, 2012
42012
Secure and Efficient Data Integrity Based on Iris Features in Cloud Computing
SH Abbdal, H Jin, D Zou, AA Yassin
2014 7th International Conference on Security Technology, 3-6, 2014
32014
Security and integrity of data in cloud computing based on feature extraction of handwriting signature
AA Yassin, HZ Neima, HS Hashim
International Journal of Cyber-Security and Digital Forensics 3 (2), 93-106, 2014
32014
Secure and efficient e-health scheme based on the Internet of Things
ZA Hussien, H Jin, ZA Abduljabbar, MA Hussain, AA Yassin, SH Abbdal, ...
2016 IEEE International Conference on Signal Processing, Communications and …, 2016
22016
Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment
ZA Abduljabbar, H Jin, ZA Hussien, AA Yassin, MA Hussain, SH Abbdal, ...
2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016
22016
An efficient and robust one-time message authentication code scheme using feature extraction of iris in cloud computing
ZA Abduljabbar, H Jin, D Zou, AA Yassin, ZA Hussien, MA Hussain
Proceedings of 2014 International Conference on Cloud Computing and Internet …, 2014
22014
Efficiency and Flexibility of Fingerprint Scheme Using Partial Encryption and Discrete Wavelet Transform to Verify User in Cloud Computing
AA Yassin
International scholarly research notices 2014, 2014
22014
Efficient and Secure Mutual Authentication Scheme in Cloud Computing
HSH AA Yassin, HZ Neima, ZA Abduljabbar
International Journal of Engineering and Advanced Technology (IJEAT) 3 (1 …, 2013
2*2013
Efficient Conditional Anonymity with Message Integrity and Authentication in a Vehicular Ad-Hoc Network
MA Alazzawi, H Lu, AA Yassin, K Chen
IEEE Access, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–20