Mohammed AbuTaha

Orcid: 0000-0002-2480-0913

According to our database1, Mohammed AbuTaha authored at least 12 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
RAD: reinforcement authentication model based on DYMO protocol for MANET.
Int. J. Internet Protoc. Technol., 2023

2022
Parallel and Practical Approach of Efficient Image Chaotic Encryption Based on Message Passing Interface (MPI).
Entropy, 2022

2020
Privacy Protection in Real Time HEVC Standard Using Chaotic System.
Cryptogr., 2020

Enhancement of an Encryption System Performance using MPI.
Proceedings of the 13th International Conference on Communications, 2020

2019
Image-Based Ciphering of Video Streams and Object Recognition for Urban and Vehicular Surveillance Services.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019

2018
Parallel Generator of Discrete Chaotic Sequences Using Multi-threading Approach.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

End-to-End Real-Time ROI-Based Encryption in HEVC Videos.
Proceedings of the 26th European Signal Processing Conference, 2018

2016
Design of a pseudo-chaotic number generator as a random number generator.
Proceedings of the International Conference on Communications, 2016

Secure Hash Algorithm based on Efficient Chaotic Neural Network.
Proceedings of the International Conference on Communications, 2016

Comparative study of two pseudo chaotic number generators for securing the IoT.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

2015
Chaos-based cryptosystems using dependent diffusion: An overview.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

Hash function based on efficient Chaotic Neural Network.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015


  Loading...