Follow
Rushdi Hamamreh , Rushdi A. Hamamreh
Rushdi Hamamreh , Rushdi A. Hamamreh
Al-Quds University, Computer Engineering Department, Associate Professor
Verified email at staff.alquds.edu
Title
Cited by
Cited by
Year
Design of a robust cryptosystem algorithm for non-invertible matrices based on hill cipher
R Hamamreh, M Farajallah
International Journal of Computer Science and Network Security, 2009
482009
Improved caesar cipher with random number generation technique and multistage encryption
SG Srikantaswamy, DHD Phaneendra
International Journal on Cryptography and Information Security (IJCIS) 2 (4 …, 2012
442012
A practical one way hash algorithm based on matrix multiplication
M Abutaha, M Farajallah, R Tahboub
International Journal of Computer Applications, 2011
232011
Hash algorithm for data integrity based on matrix combination
RA Hamamreh, MA Jamoos
The 14th International Arab Conference on Information Technology (ACIT'2013), 2014
212014
Privacy protection of biometric traits using modified hill cipher with involutory key and robust cryptosystem
B Acharya, MD Sharma, S Tiwari, VK Minz
Procedia Computer Science 2, 242-247, 2010
202010
Protocol for dynamic avoiding end-to-end congestion in MANETs
RA Hamamreh, MJ Bawatna
Journal of Wireless Networking and Communications 4 (3), 67-75, 2014
192014
Joint block and stream cipher based on a modified skew tent map
R Qumsieh, M Farajallah, R Hamamreh
Multimedia Tools and Applications 78 (23), 33527-33547, 2019
152019
An energy-efficient clustering routing protocol for WSN based on MRHC
RA Hamamreh, MM Haji, AA Qutob
The Society of Digital Information and Wireless Communications 20/F, Tower 5 …, 2018
152018
New one way hash algorithm using non-invertible matrix
M Abutaha, R Hamamreh
2013 International Conference on Computer Medical Applications (ICCMA), 1-5, 2013
122013
Efficient mechanism for mitigating multiple black hole attacks in MANETs
AR Salem, R Hamamreh
Journal of Theoretical and Applied Information Technology 83 (1), 156, 2016
102016
Encryption and decryption of informative image by key image using modified Hill cipher technique based on non-invertible matrices
B Acharya, N Thomas, DRK Arasu, NV Prasad
Proceedings of the 2011 International Conference on Communication, Computing …, 2011
92011
Protocol for Multiple Black Hole Attack Avoidance in Mobile Ad Hoc Networks
RA Hamamreh
72018
Protocol for Multiple Black Hole Attack Avoidance in Mobile Ad Hoc Networks
RA Hamamreh
Recent Advances in Cryptography and Network Security, 3, 25-41, 2018
72018
Tag ranking multi-agent semantic social networks
RA Hamamreh, S Awad
2017 International Conference on Computational Science and Computational …, 2017
52017
DCM+: a multi-purpose protocol for congestion control
RA Hamamreh, D Khader
2019 IEEE 7th Palestinian International Conference on Electrical and …, 2019
42019
Recent advances in cryptography and network security
P Mitra
BoD–Books on Demand, 2018
42018
An intelligent routing protocol based on DYMO for MANET
RA Hamamreh, OI Salah
Published by The Society of Digital Information and Wireless Communications …, 2018
42018
DILH: Data integrity using linear combination for hash algorithm
RA Hamamreh, MA Jamoos, R Zaghal
2014 World Symposium on Computer Applications & Research (WSCAR), 1-5, 2014
42014
RAD: reinforcement authentication DYMO protocol for MANET
RA Hamamreh, M Ayyad, M Jamoos
2019 International Conference on Promising Electronic Technologies (ICPET …, 2019
32019
Generation of Keymatrix for Hill cipher encryption using quadratic form
DK Mani, AB Begam
International Journal of Scientific & Technology Research 8 (10), 964-968, 2019
32019
The system can't perform the operation now. Try again later.
Articles 1–20