Follow
Rana Saad Mohammed
Rana Saad Mohammed
Assistant Professor Phd at Computer Science Department-Education college, Mustansiriyah University
Verified email at uomustansiriyah.edu.iq
Title
Cited by
Cited by
Year
Proposed random unified chaotic map as PRBG for voice encryption in wireless communication
SB Sadkhan, RS Mohammed
Procedia computer science 65, 314-323, 2015
572015
Speech scrambler based on proposed random chaotic maps
RS Mohammed, SB Sadkhan
Multidisciplinary in IT and Communication Science and Applications (AIC …, 2016
202016
Recent Audio Steganography Trails and its Quality Measures
SB Sadkhan, AA Mahdi, RS Mohammed
2019 First International Conference of Computer and Applied Sciences (CAS …, 2019
172019
A proposed voice encryption based on Random Lorenz map with DCT permutation
SB Sadkhan, RS Mohammed
International Journal of Advancements in Computing Technology 7 (3), 90, 2015
162015
Chaos based cryptography for voice encryption in wireless communication
SB Sadkhan, A Al-Sherbaz, RS Mohammed
2013 International Conference on Electrical Communication, Computer, Power …, 2013
152013
Security and privacy in the Internet of Things (IoT): Survey
RS Mohammed, AH Mohammed, FN Abbas
2019 2nd International Conference on Electrical, Communication, Computer …, 2019
122019
Data hiding based on independent component analyses (ICA)
AA Mahdi, RS Mohammed, SB Sadkhan
Solid State Technology 63 (3), 3617-3638, 2020
112020
Stream cipher based on chaotic maps
EL Mohaisen, RS Mohammed
2019 First International Conference of Computer and Applied Sciences (CAS …, 2019
92019
Lightweight authentication methods in IoT: Survey
WK Ahmed, RS Mohammed
2022 International Conference on Computer Science and Software Engineering …, 2022
82022
Image encryption under spatial domain based on modify 2D LSCM chaotic map via dynamic substitution-permutation network
RS Mohammed, KK Jabbar, HA Hilal
International Journal of Electrical and Computer Engineering (IJECE) 11 (4 …, 2021
62021
Subject review: cloud computing security based on cryptography
AA Maryoosh, RS Mohammed, RA Mustafa
International Journal of Engineering Research and Advanced Technology-IJERAT …, 2019
62019
Hybridity of Cryptography and Steganography Techniques: Current Status
RS Mohammed, SB Sadkhan
International Conference on Change, Innovation, Informatics and Disruptive …, 2016
62016
A novel technique of privacy preserving association rule mining
RS Mohammed, EM Hussien, JR Mutter
Multidisciplinary in IT and Communication Science and Applications (AIC …, 2016
62016
Security Challenges and Cyber-Attacks for Internet of Things
RM Abdul-Hussein, RS Mohammed, AH Mohammed
2021 1st Babylon International Conference on Information Technology and …, 2021
52021
Improving Salsa20 stream cipher using random chaotic maps
EL Mohaisen, RS Mohammed
2020 3rd International Conference on Engineering Technology and its …, 2020
52020
Chaos-Based Cryptography for Voice Secure Wireless-Chapter 4
SB Sadkhan, R Saad
Multidisciplinary Perspectives in Cryptology and Information Security, 97-132, 2014
52014
TEXT CRYPTOGRAPHY USING MULTIPLE ENCRYPTION ALGORITHMS BASED ON CIRCULAR QUEUE VIA CLOUD COMPUTING ENVIRONMENT.
KK JABBAR, HABD HILAL, RS MOHAMMED
Journal of Theoretical & Applied Information Technology 96 (12), 2018
42018
Iris matching Using SURF algorithm
RS Mohammed, NJ Habeeb, ZM Abood
International Journal of Signal Processing, Image Processing and Pattern …, 2016
42016
Improving Keystream Generation for Sosemanuk Stream Cipher Using Twofish Block Cipher
SK Avakian, RS Mohammed
Engineering and Technology Journal 27 (10), 2009
42009
Image encryption technique using clustering and stochastic standard map
RS Mohammed, FH Abbood, IA Yousif
Multidisciplinary in IT and Communication Science and Applications (AIC …, 2016
32016
The system can't perform the operation now. Try again later.
Articles 1–20