An efficient RSA public key encryption scheme SJ Aboud, MA AL-Fayoumi, M Al-Fayoumi, HS Jabbar Fifth International Conference on Information Technology: New Generations …, 2008 | 58 | 2008 |
An efficient method for attack RSA scheme SJ Aboud 2009 Second International Conference on the Applications of Digital …, 2009 | 33 | 2009 |
Baghdad method for calculating multiplicative inverse SJ Aboud International Conference on Information Technology: Coding and Computing …, 2004 | 21 | 2004 |
Practical e-payment scheme M Al-Fayoumi, S Aboud, M Al-Fayoumi International Journal of Computer Science Issues (IJCSI) 7 (3), 18, 2010 | 19 | 2010 |
Two efficient digital multisignature schemes SJ Aboud, MA Al-Fayoumi Int. J. Soft. Comput 2, 113-117, 2007 | 16 | 2007 |
Verification and validation of simulation models SJ Aboud, M Al Fayoumi, M Alnuaimi Handbook of Research on Discrete Event Simulation Environments: Technologies …, 2010 | 13 | 2010 |
Secure password authentication system using smart card SJ Aboud International Journal of Emerging Trends & Technology in Computer Science …, 2014 | 11 | 2014 |
An overview of cybercrime in Iraq SJ Aboud The Research Bulletin of Jordan ACM 2 (2), 31-34, 2012 | 11 | 2012 |
Bidirectional search routing protocol for mobile ad hoc networks M Ahmed, S Yousef, SJ Aboud International Journal of Computer Engineering & Technology (IJCET) 4 (1 …, 2013 | 9 | 2013 |
Cybercrime in Iraq SJ Aboud International Journal of Scientific & Engineering Research 5 (3), 422-425, 2014 | 8 | 2014 |
Secure E-payment Protocol SJ Aboud International Journal of Computer Science and Security 3 (3), 2009 | 8 | 2009 |
A new multisignature scheme using re-encryption technique. J SJ Aboud, MA Al-Fayoumi Applied Sci 7, 1813-1817, 2007 | 8 | 2007 |
Anonymous and non-repudiation E-payment protocol SJ Aboud, MA Al-Fayoumi American Journal of Applied Sciences 4 (8), 538-542, 2007 | 8 | 2007 |
A new deterministic rsa-factoring algorithm SJ Aboud, EM Abu-Taieh JORDAN JOURNAL OF APPLIED SCIENCE NATURAL SCIENCES 8 (1), 54, 2006 | 7 | 2006 |
Fraction–Integer Method (FIM) for Calculating Multiplicative Inverse S Aboud Journal of Systemics, Cybernetics and Informatics 2 (5), 2005 | 7 | 2005 |
A New Method for Public Key Cryptosystem and Digital Signature Scheme Based on both Integer Factorizations and Discrete Logarithms SJ Aboud, A El Sheikh Asian Journal of Information Technology 3 (4), 284-289, 2004 | 6 | 2004 |
Analysis of a known offline e-coin system SJ Aboud, A Agoun International Journal of Computer Applications 975, 8887, 2014 | 5 | 2014 |
Secure E-Exam Scheme SJ Aboud Int. J. Science and Research 3 (9), 2200-2203, 2012 | 5 | 2012 |
An improved knapsack public key cryptography system SJ Aboud International Journal of Internet Technology and Secured Transactions 3 (3 …, 2011 | 5 | 2011 |
A New Digital Signature Scheme Based on Integer Factoring and Discrete Logarithm Problem. M Al-Fayoumi, SJ Aboud, MA Al-Fayoumi Int. J. Comput. Their Appl. 17 (2), 108-115, 2010 | 5 | 2010 |