Eyad Salah Taqieddin

Orcid: 0000-0002-8520-1965

Affiliations:
  • Jordan University of Science and Technology, Irbid, Jordan


According to our database1, Eyad Salah Taqieddin authored at least 29 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
RSA cryptanalysis - Fermat factorization exact bound and the role of integer sequences in factorization problem.
J. Inf. Secur. Appl., November, 2023

A Steganographic Method for Color Images using the Salp Swarm Algorithm and Chaotic Maps.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023

Arabic Sentiment Analysis of Food Delivery Services Reviews.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

2021
A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization.
Secur. Commun. Networks, 2021

An Efficient Path Generation Algorithm Using Principle Component Analysis for Mobile Sinks in Wireless Sensor Networks.
J. Sens. Actuator Networks, 2021

Energy efficient fuzzy-based DASH adaptation algorithm.
Digit. Commun. Networks, 2021

2019
Energy-Efficient Fuzzy-Logic-Based Clustering Technique for Hierarchical Routing Protocols in Wireless Sensor Networks.
Sensors, 2019

An Enhanced and Resource-Aware RFID Multitag Grouping Protocol.
Secur. Commun. Networks, 2019

Image Steganography using YCbCr Color Space and Matrix Pattern.
Proceedings of the 2nd International Conference on Signal Processing and Information Security, 2019

2018
Tag Ownership Transfer in Radio Frequency Identification Systems: A Survey of Existing Protocols and Open Challenges.
IEEE Access, 2018

Energy-Efficient and QoS-Aware Multi-Path Geographic Routing Protocol for WMSN.
Proceedings of the IEEE Globecom Workshops, 2018

2017
Location-Aware and Mobility-Based Performance Optimization for Wireless Sensor Networks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

On the Improper Use of CRC for Cryptographic Purposes in RFID Mutual Authentication Protocols.
Int. J. Commun. Networks Inf. Secur., 2017

An Enhanced EPC Gen2v2 RFID Authentication and Ownership Management Protocol.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

2016
EPC Gen2v2 RFID Standard Authentication and Ownership Management Protocol.
IEEE Trans. Mob. Comput., 2016

IEFP: An application layer protocol for Islamic electronic fatawa management and security.
Proceedings of the 2016 12th International Conference on Innovations in Information Technology (IIT), 2016

2015
Fuzzy Logic-Based Cluster Heads Percentage Calculation for Improving the Performance of the LEACH Protocol.
Int. J. Fuzzy Syst. Appl., 2015

Efficient FPGA Implementation of the RC4 Stream Cipher using Block RAM and Pipelining.
Proceedings of the 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2015)/ The 5th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2015)/ Affiliated Workshops, 2015

2014
Transitive Location Verification Algorithm in Location-Based Routing for Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2014

A Gen2v2 compliant RFID authentication and ownership management protocol.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

An efficient clustering approach using genetic algorithm and node mobility in wireless sensor networks.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014

A simulation testbed to jointly exploit multiple image compression techniques for wireless multimedia sensor networks.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014

2013
An Energy-Balanced Cluster-Based Protocol for Wireless Sensor Networks.
Int. J. Inf. Technol. Web Eng., 2013

A new approach for target coverage in wireless sensor networks using fuzzy logic.
Proceedings of 10th IEEE International Conference on Networking, Sensing and Control, 2013

2012
A Practical Study of Jointly Exploiting Multiple Image Compression Techniques for Wireless Multimedia Sensor Networks.
J. Commun., 2012

Combining decision trees classifiers: a case study of automatic sleep stage scoring.
Int. J. Knowl. Eng. Data Min., 2012

Energy-Efficient Clustering Algorithm for Wireless Sensor Networks Using the Virtual Field Force.
Proceedings of the 5th International Conference on New Technologies, 2012

Vulnerability analysis of two ultra-lightweight RFID authentication protocols: RAPP and gossamer.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2008
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks.
Int. J. Netw. Secur., 2008


  Loading...