Design of a robust cryptosystem algorithm for non-invertible matrices based on hill cipher R Hamamreh, M Farajallah International Journal of Computer Science and Network Security, 2009 | 48 | 2009 |
Improved caesar cipher with random number generation technique and multistage encryption SG Srikantaswamy, DHD Phaneendra International Journal on Cryptography and Information Security (IJCIS) 2 (4 …, 2012 | 44 | 2012 |
A practical one way hash algorithm based on matrix multiplication M Abutaha, M Farajallah, R Tahboub International Journal of Computer Applications, 2011 | 23 | 2011 |
Hash algorithm for data integrity based on matrix combination RA Hamamreh, MA Jamoos The 14th International Arab Conference on Information Technology (ACIT'2013), 2014 | 21 | 2014 |
Privacy protection of biometric traits using modified hill cipher with involutory key and robust cryptosystem B Acharya, MD Sharma, S Tiwari, VK Minz Procedia Computer Science 2, 242-247, 2010 | 20 | 2010 |
Protocol for dynamic avoiding end-to-end congestion in MANETs RA Hamamreh, MJ Bawatna Journal of Wireless Networking and Communications 4 (3), 67-75, 2014 | 19 | 2014 |
Joint block and stream cipher based on a modified skew tent map R Qumsieh, M Farajallah, R Hamamreh Multimedia Tools and Applications 78 (23), 33527-33547, 2019 | 15 | 2019 |
An energy-efficient clustering routing protocol for WSN based on MRHC RA Hamamreh, MM Haji, AA Qutob The Society of Digital Information and Wireless Communications 20/F, Tower 5 …, 2018 | 15 | 2018 |
New one way hash algorithm using non-invertible matrix M Abutaha, R Hamamreh 2013 International Conference on Computer Medical Applications (ICCMA), 1-5, 2013 | 12 | 2013 |
Efficient mechanism for mitigating multiple black hole attacks in MANETs AR Salem, R Hamamreh Journal of Theoretical and Applied Information Technology 83 (1), 156, 2016 | 10 | 2016 |
Encryption and decryption of informative image by key image using modified Hill cipher technique based on non-invertible matrices B Acharya, N Thomas, DRK Arasu, NV Prasad Proceedings of the 2011 International Conference on Communication, Computing …, 2011 | 9 | 2011 |
Protocol for Multiple Black Hole Attack Avoidance in Mobile Ad Hoc Networks RA Hamamreh | 7 | 2018 |
Protocol for Multiple Black Hole Attack Avoidance in Mobile Ad Hoc Networks RA Hamamreh Recent Advances in Cryptography and Network Security, 3, 25-41, 2018 | 7 | 2018 |
Tag ranking multi-agent semantic social networks RA Hamamreh, S Awad 2017 International Conference on Computational Science and Computational …, 2017 | 5 | 2017 |
DCM+: a multi-purpose protocol for congestion control RA Hamamreh, D Khader 2019 IEEE 7th Palestinian International Conference on Electrical and …, 2019 | 4 | 2019 |
Recent advances in cryptography and network security P Mitra BoD–Books on Demand, 2018 | 4 | 2018 |
An intelligent routing protocol based on DYMO for MANET RA Hamamreh, OI Salah Published by The Society of Digital Information and Wireless Communications …, 2018 | 4 | 2018 |
DILH: Data integrity using linear combination for hash algorithm RA Hamamreh, MA Jamoos, R Zaghal 2014 World Symposium on Computer Applications & Research (WSCAR), 1-5, 2014 | 4 | 2014 |
RAD: reinforcement authentication DYMO protocol for MANET RA Hamamreh, M Ayyad, M Jamoos 2019 International Conference on Promising Electronic Technologies (ICPET …, 2019 | 3 | 2019 |
Generation of Keymatrix for Hill cipher encryption using quadratic form DK Mani, AB Begam International Journal of Scientific & Technology Research 8 (10), 964-968, 2019 | 3 | 2019 |