أ.د . رنا سعد محمد

كلية التربية - قسم الحاسبات


البحوث الرصينة

رابط البحث قاعدة البيانات تاريخ النشر اسم المجلة اسم الباحث عنوان البحث ت
scopus 2023-03 International Journal of Intelligent Engineering and Systems أ.د . رنا سعد محمد Lightweight Authentication Enhancement Using Arnold Chaotic Map and Markov-Chain for Internet of Things Applications 1
scopus 2023-02 International Journal of Intelligent Engineering and Systems أ.د . رنا سعد محمد Design a Lightweight Authentication Encryption Based on Stream Cipher and Chaotic Maps with Sponge Structure for Internet of Things Applications 2
scopus 2023-02 IEEE 2022 8th International Conference on Contemporary Information Technology and Mathematics (ICCITM) أ.د . رنا سعد محمد Simon Chaotic: An enhancement of SIMON block cipher by using Arnold and Henon chaotic maps 3
scopus 2022-04 IEEE 2022 International Conference on Computer Science and Software Engineering (CSASE) أ.د . رنا سعد محمد Lightweight Authentication Methods in IoT: Survey 4
scopus 2021-08 International Journal of Electrical and Computer Engineering (IJECE) أ.د . رنا سعد محمد Image encryption under spatial domain based on modify 2D LSCM chaotic map via dynamic substitution-permutation network 5
scopus 2021-12 IEEE 2021 International Conference on Advanced Computer Applications (ACA) أ.د . رنا سعد محمد Modify Twofish Algorithm to Lightweight using Present Techniques for Data Protection 6
scopus 2021-08 IEEE 2021 1st Babylon International Conference on Information Technology and Science (BICITS) أ.د . رنا سعد محمد A Review of the Most Effective cryptography techniques based on Conventional Block Cipher and Lightweight 7
scopus 2021-08 IEEE 2021 1st Babylon International Conference on Information Technology and Science (BICITS) أ.د . رنا سعد محمد Security Challenges and Cyber-Attacks for Internet of Things 8
scopus 2020-11 Solid State Technology أ.د . رنا سعد محمد Data Hiding based on Independent Component Analyses (ICA) 9
scopus 2021-01 IEEE 2020 3rd International Conference on Engineering Technology and its Applications (IICETA) أ.د . رنا سعد محمد Improving Salsa20 Stream Cipher Using Random Chaotic Maps 10
scopus 2020-04 IEEE 2019 First International Conference of Computer and Applied Sciences (CAS) أ.د . رنا سعد محمد Recent Audio Steganography Trails and its Quality Measures 11
scopus 2020-04 IEEE 2019 First International Conference of Computer and Applied Sciences (CAS) أ.د . رنا سعد محمد Stream cipher based on chaotic maps 12
science 2019-09 nternational Journal of Engineering Research and Advanced Technology-IJERAT أ.د . رنا سعد محمد Subject Review: Cloud Computing Security Based on Cryptography 13
scopus 2020-04 IEEE 2019 2nd International Conference on Electrical, Communication, Computer, Power and Control Engineering (ICECCPCE) أ.د . رنا سعد محمد Security and privacy in the Internet of Things (IoT): Survey 14
scopus 2018-06 Journal of Theoretical & Applied Information Technology أ.د . رنا سعد محمد TEXT CRYPTOGRAPHY USING MULTIPLE ENCRYPTION ALGORITHMS BASED ON CIRCULAR QUEUE VIA CLOUD COMPUTING ENVIRONMENT. 15
scopus 2016-12 IEEE Xplore أ.د . رنا سعد محمد Speech scrambler based on proposed random chaotic maps 16
scopus 2016-12 IEEE Xplore أ.د . رنا سعد محمد Image encryption technique using clustering and stochastic standard map 17
scopus 2016-12 IEEE Xplore أ.د . رنا سعد محمد A novel technique of privacy preserving association rule mining 18
science 2016-12 SERSC International Journal of Signal Processing, Image Processing and Pattern Recognition (IJSIP) أ.د . رنا سعد محمد Iris matching Using SURF algorithm 19
science 2016-12 ICCIIDT’16, U.K أ.د . رنا سعد محمد Hybridity of Cryptography and Steganography Techniques: Current Status 20
science 2017-07 CRC press أ.د . رنا سعد محمد Chapter 22 Current Status of Information Security Based on Hybrid Crypto and Stego Systems 21
local 2017-01-02 education college journal أ.د . رنا سعد محمد proposed a variable length block cipher algorithm 22
scopus 2015-01-01 Procedia Computer Science Elsevier أ.د . رنا سعد محمد Proposed random unified chaotic map as PRBG for voice encryption in wireless communication 23