|
scopus |
2023-03 |
International Journal of Intelligent Engineering and Systems |
أ.د . رنا سعد محمد |
Lightweight Authentication Enhancement Using Arnold Chaotic Map and Markov-Chain for Internet of Things Applications |
1 |
|
scopus |
2023-02 |
International Journal of Intelligent Engineering and Systems |
أ.د . رنا سعد محمد |
Design a Lightweight Authentication Encryption Based on Stream Cipher and Chaotic Maps with Sponge Structure for Internet of Things Applications |
2 |
|
scopus |
2023-02 |
IEEE 2022 8th International Conference on Contemporary Information Technology and Mathematics (ICCITM) |
أ.د . رنا سعد محمد |
Simon Chaotic: An enhancement of SIMON block cipher by using Arnold and Henon chaotic maps |
3 |
|
scopus |
2022-04 |
IEEE 2022 International Conference on Computer Science and Software Engineering (CSASE) |
أ.د . رنا سعد محمد |
Lightweight Authentication Methods in IoT: Survey |
4 |
|
scopus |
2021-08 |
International Journal of Electrical and Computer Engineering (IJECE) |
أ.د . رنا سعد محمد |
Image encryption under spatial domain based on modify 2D LSCM chaotic map via dynamic substitution-permutation network |
5 |
|
scopus |
2021-12 |
IEEE 2021 International Conference on Advanced Computer Applications (ACA) |
أ.د . رنا سعد محمد |
Modify Twofish Algorithm to Lightweight using Present Techniques for Data Protection |
6 |
|
scopus |
2021-08 |
IEEE 2021 1st Babylon International Conference on Information Technology and Science (BICITS) |
أ.د . رنا سعد محمد |
A Review of the Most Effective cryptography techniques based on Conventional Block Cipher and Lightweight |
7 |
|
scopus |
2021-08 |
IEEE 2021 1st Babylon International Conference on Information Technology and Science (BICITS) |
أ.د . رنا سعد محمد |
Security Challenges and Cyber-Attacks for Internet of Things |
8 |
|
scopus |
2020-11 |
Solid State Technology |
أ.د . رنا سعد محمد |
Data Hiding based on Independent Component Analyses (ICA) |
9 |
|
scopus |
2021-01 |
IEEE 2020 3rd International Conference on Engineering Technology and its Applications (IICETA) |
أ.د . رنا سعد محمد |
Improving Salsa20 Stream Cipher Using Random Chaotic Maps |
10 |
|
scopus |
2020-04 |
IEEE 2019 First International Conference of Computer and Applied Sciences (CAS) |
أ.د . رنا سعد محمد |
Recent Audio Steganography Trails and its Quality Measures |
11 |
|
scopus |
2020-04 |
IEEE 2019 First International Conference of Computer and Applied Sciences (CAS) |
أ.د . رنا سعد محمد |
Stream cipher based on chaotic maps |
12 |
|
science |
2019-09 |
nternational Journal of Engineering Research and Advanced Technology-IJERAT |
أ.د . رنا سعد محمد |
Subject Review: Cloud Computing Security Based on Cryptography |
13 |
|
scopus |
2020-04 |
IEEE 2019 2nd International Conference on Electrical, Communication, Computer, Power and Control Engineering (ICECCPCE) |
أ.د . رنا سعد محمد |
Security and privacy in the Internet of Things (IoT): Survey |
14 |
|
scopus |
2018-06 |
Journal of Theoretical & Applied Information Technology |
أ.د . رنا سعد محمد |
TEXT CRYPTOGRAPHY USING MULTIPLE ENCRYPTION ALGORITHMS BASED ON CIRCULAR QUEUE VIA CLOUD COMPUTING ENVIRONMENT. |
15 |
|
scopus |
2016-12 |
IEEE Xplore |
أ.د . رنا سعد محمد |
Speech scrambler based on proposed random chaotic maps |
16 |
|
scopus |
2016-12 |
IEEE Xplore |
أ.د . رنا سعد محمد |
Image encryption technique using clustering and stochastic standard map |
17 |
|
scopus |
2016-12 |
IEEE Xplore |
أ.د . رنا سعد محمد |
A novel technique of privacy preserving association rule mining |
18 |
|
science |
2016-12 |
SERSC International Journal of Signal Processing, Image Processing and Pattern Recognition (IJSIP) |
أ.د . رنا سعد محمد |
Iris matching Using SURF algorithm |
19 |
|
science |
2016-12 |
ICCIIDT’16, U.K |
أ.د . رنا سعد محمد |
Hybridity of Cryptography and Steganography Techniques: Current Status |
20 |
|
science |
2017-07 |
CRC press |
أ.د . رنا سعد محمد |
Chapter 22 Current Status of Information Security Based on Hybrid Crypto and Stego Systems |
21 |
|
local |
2017-01-02 |
education college journal |
أ.د . رنا سعد محمد |
proposed a variable length block cipher algorithm |
22 |
|
scopus |
2015-01-01 |
Procedia Computer Science Elsevier |
أ.د . رنا سعد محمد |
Proposed random unified chaotic map as PRBG for voice encryption in wireless communication |
23 |