Mohammad, Zeyad
243  Ergebnisse:
Personensuche X
?
1

Session Key Agreement Protocol for Secure D2D Communication:

, In: The Fifth International Conference on Safety and Security with IoT; EAI/Springer Innovations in Communication and Computing,
 
?
2

Privacy Preservation Protocol for Smart Grid Networks:

, In: 2021 International Telecommunications Conference (ITC-Egypt),
 
?
3

An authenticated, secure, and mutable multiple‐session‐keys..:

Abusukhon, Ahmad ; Mohammad, Zeyad ; Al‐Thaher, Ali
Concurrency and Computation: Practice and Experience.  34 (2021)  4 - p. , 2021
 
?
4

Cryptanalysis of a Tightly-Secure Authenticated Key Exchang..:

, In: 2021 International Conference on Information Technology (ICIT),
 
?
5

ROAD TRAFFIC Management SOLUTIONS:

, In: 2021 International Conference on Information Technology (ICIT),
 
?
6

Cryptanalysis and improvement of the YAK protocol with form..:

Mohammad, Zeyad
International Journal of Communication Systems.  33 (2020)  9 - p. , 2020
 
?
7

A hybrid network security algorithm based on Diffie Hellman..:

Abusukhon, Ahmad ; Anwar, Muhammad Naveed ; Mohammad, Zeyad.
Journal of Discrete Mathematical Sciences and Cryptography.  22 (2019)  1 - p. 65-81 , 2019
 
?
9

Study of City Crimes with Smart Solutions Integrating into ..:

, In: 2024 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC),
 
?
 
?
12

Prediction of Flood in Bangladesh Using Different Classifie..:

Hossain, Md Sajid ; Zeyad, Mohammad
AIUB Journal of Science and Engineering (AJSE).  22 (2023)  1 - p. 45-52 , 2023
 
?
15

Scheme and Construction of a Smart Vacuum Cleaner Robot:

, In: 2023 Third International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT),
 
1-15