Mousa Farajallah

According to our database1, Mousa Farajallah authored at least 16 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Selective Encryption of the Versatile Video Coding Standard.
IEEE Access, 2022

2021
Joint Crypto-Compression Based on Selective Encryption for WMSNs.
IEEE Access, 2021

An Efficient Approach for Secure Data Outsourcing using Hybrid Data Partitioning.
Proceedings of the International Conference on Information Technology, 2021

2020
Towards a Hybrid Data Partitioning Technique for Secure Data Outsourcing.
Proceedings of the 21st International Arab Conference on Information Technology, 2020

2019
Joint block and stream cipher based on a modified skew tent map.
Multim. Tools Appl., 2019

2018
Cryptanalyzing an image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion.
Multim. Tools Appl., 2018

2017
Real-time selective video encryption based on the chaos system in scalable HEVC extension.
Signal Process. Image Commun., 2017

2016
A new chaos-based image encryption system.
Signal Process. Image Commun., 2016

Fast and Secure Chaos-Based Cryptosystem for Images.
Int. J. Bifurc. Chaos, 2016

2015
Chaos-based cryptosystems using dependent diffusion: An overview.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

ROI encryption for the HEVC coded video contents.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

Selective video encryption using chaotic system in the SHVC extension.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

2014
Chaos-based block ciphers: An overview.
Proceedings of the 10th International Conference on Communications, 2014

2013
Dynamic Adjustment of the Chaos-Based Security in Real-Time Energy Harvesting Sensors.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

2012
How to guarantee secured transactions with QoS and real-time constraints.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2009
Self Generating Multi Keys Cryptosystem Model for Non-Invertible Matrices based on Hill Cipher.
Proceedings of the 2009 International Conference on Security & Management, 2009


  Loading...