Follow
Mohammed Abu Taha
Mohammed Abu Taha
Assistant Professor in Information security Palestine Polytechnic University
Verified email at ppu.edu
Title
Cited by
Cited by
Year
Survey paper: cryptography is the science of information security
M AbuTaha, M Farajallah, R Tahboub, M Odeh
International Journal of Computer Science and Security (IJCSS), 2011
782011
Design and efficient implementation of a chaos-based stream cipher
MA Taha, SE Assad, A Queudet, O Deforges
International Journal of Internet Technology and Secured Transactions 7 (2 …, 2017
332017
SURVEY PAPER: PSEUDO RANDOM NUMBER GENERATORS AND SECURITY TESTS.
O Salhab, N Jweihan, MA Jodeh, M Abutaha, M Farajallah
262018
A practical one way hash algorithm based on matrix multiplication
M Abutaha, M Farajallah, R Tahboub
International Journal of Computer Applications, 2011
232011
Secure hash algorithm based on efficient chaotic neural network
N Abdoun, S El Assad, MA Taha, R Assaf, O Deforges, M Khalil
2016 International Conference on Communications (COMM), 405-410, 2016
222016
Privacy protection in real time HEVC standard using chaotic system
M Abu Taha, W Hamidouche, N Sidaty, M Viitanen, J Vanne, S El Assad, ...
Cryptography 4 (2), 18, 2020
212020
Design of a pseudo-chaotic number generator as a random number generator
M Abutaha, S El Assad, O Jallouli, A Queudet, O Deforges
2016 International Conference on Communications (COMM), 401-404, 2016
142016
End-to-end real-time ROI-based encryption in HEVC videos
MA Taha, N Sidaty, W Hamidouche, O Dforges, J Vanne, M Viitanen
2018 26th European Signal Processing Conference (EUSIPCO), 171-175, 2018
132018
Chaos-based cryptosystems using dependent diffusion: An overview
M AbuTaha, S El Assad, M Farajallah, A Queudet, O Deforge
2015 10th International Conference for Internet Technology and Secured …, 2015
132015
New one way hash algorithm using non-invertible matrix
M Abutaha, R Hamamreh
2013 International Conference on Computer Medical Applications (ICCMA), 1-5, 2013
122013
Hash function based on efficient chaotic neural network
N Abdoun, S El Assad, MA Taha, R Assaf, O Deforges, M Khalil
2015 10th International Conference for Internet Technology and Secured …, 2015
92015
Comparative study of two pseudo chaotic number generators for securing the iot
O Jallouli, M Abutaha, S El Assad, M Chetto, A Queudet, O Déforges
2016 International Conference on Advances in Computing, Communications and …, 2016
82016
Using AES, RSA, SHA1 for securing cloud
MS Abutaha, AA Amro
International conference on communication, internet and information …, 2014
82014
Secure lightweight cryptosystem for IoT and pervasive computing
M Abutaha, B Atawneh, L Hammouri, G Kaddoum
Scientific Reports 12 (1), 19649, 2022
72022
Power consumption of a chaos-based stream cipher algorithm
B Atawneh, ALH Layla, M Abutaha
2020 3rd International Conference on Computer Applications & Information …, 2020
62020
An efficient pseudo chaotic number generator based on coupling and multiplexing techniques
O Jallouli, S El Assad, MA Taha, M Chetto, R Lozi, D Caragata
International Conference on Emerging Security Information, Systems and …, 2016
62016
Parallel and Practical Approach of Efficient Image Chaotic Encryption Based on Message Passing Interface (MPI)
M Abutaha, I Amar, S AlQahtani
Entropy 24 (4), 2022
52022
Real-time and portable chaos-based crypto-compression systems for efficient embedded architectures
M Abutaha
Nantes, 2017
52017
PSEUDO RANDOM NUMBER GENERATOR BASED ON LOOK-UP TABLE AND CHAOTIC MAPS
Farajallah, Mousa, Mohammed Abutaha
JATIT, 2020
42020
A survey of lightweight image encryption for IoT
H Dweik, M Abutaha
Lightweight Cryptographic Techniques and Cybersecurity Approaches, 2022
32022
The system can't perform the operation now. Try again later.
Articles 1–20