Seguir
Zeyad Al-Odat
Zeyad Al-Odat
Otros nombresZeyad A Al-Odat
Tafila Technical University
Dirección de correo verificada de ttu.edu.jo - Página principal
Título
Citado por
Citado por
Año
Secure hash algorithms and the corresponding FPGA optimization techniques
ZA Al-Odat, M Ali, A Abbas, SU Khan
ACM Computing Surveys (CSUR) 53 (5), 1-36, 2020
252020
Randomness analyses of the secure hash algorithms, SHA-1, SHA-2 and modified SHA
Z Al-Odat, A Abbas, SU Khan
2019 International Conference on Frontiers of Information Technology (FIT …, 2019
222019
IoT-Based Secure Embedded Scheme for Insulin Pump Data Acquisition and Monitoring
ZA Al-Odat
CYBER 2018, The Third International Conference on Cyber-Technologies and …, 2018
172018
The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions
Z Al-Odat, S Khan
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), 2019
152019
A Reliable IoT-Based Embedded Health Care System for Diabetic Patients
ZA Al-Odat, SK Srinivasan, EM Al-Qtiemat, S Shuja
International Journal On Advances in Internet Technology 12 (1&2), 2019
152019
Mitigation and Improving SHA-1 Standard Using Collision Detection Approach
Z Al-Odat, M Ali, SU Khan
2018 International Conference on Frontiers of Information Technology (FIT …, 2018
122018
A Big Data Storage Scheme Based on Distributed Storage Locations and Multiple Authorizations
Z Al-Odat, E Al-Qtiemat, S Khan
2019 IEEE 5th International Conference on Big Data Security and Privacy …, 2019
102019
Constructions and attacks on hash functions
Z Al-Odat, S Khan
2019 International Conference on Computational Science and Computational …, 2019
82019
Anonymous privacy-preserving scheme for big data over the cloud
ZA Al-Odat, SU Khan
2019 IEEE International Conference on Big Data (Big Data), 5711-5717, 2019
62019
A modified secure hash design to circumvent collision and length extension attacks
ZA Al-Odat, SU Khan, E Al-Qtiemat
Journal of Information Security and Applications 71, 103376, 2022
52022
An efficient lightweight cryptography hash function for big data and iot applications
ZA Al-Odat, EM Al-Qtiemat, SU Khan
2020 IEEE Cloud Summit, 66-71, 2020
52020
Analyses, mitigation and applications of secure hash algorithms
ZAH Al-Odat
North Dakota State University, 2020
22020
Synthesis of Formal Specifications From Requirements for Refinement-based Real Time Object Code Verification
E Al-Qtiemat, S Srinivasan, Z Al-Odat, M Asha Latha Dubasi, S Shuja
International Journal On Advances in Security 12 (1&2), 95-107, 2019
22019
A new method to fit logistic functions with wind turbines power curves using manufacturer datasheets
Q Aldaoudeyeh, Al-Motasem and Alzaareer, Khaled and Harasis, Salman and Al ...
IET Renewable Power Generation, 2021
1*2021
Refinement maps for insulin pump control software safety verification
EM Al-qtiemat, SK Srinivasan, ZA Al-Odat, S Shuja
The Eleventh International Conference on Advances in System Testing and …, 2019
12019
Refinement checker for embedded object code verification
MAL Dubasi, SK Srinivasan, S Shuja, ZA Al-Odat
Proceedings of the The Fourth International Conference on Cyber-Technologies …, 0
1
EXAMINING CLOUD SECURITY: IDENTIFYING RISKS AND THE IMPLEMENTED MITIGATION STRATEGIES
E AL-QTIEMAT, Z AL-ODAT
Journal of Theoretical and Applied Information Technology 102 (7), 2024
2024
A novel monotonic wind turbine power-speed characteristics model.
AM Aldaoudeyeh, K Alzaareer, D Wu, M Obeidat, S Harasis, Z Al-Odat, ...
AIMS Energy 11 (6), 2023
2023
Synthesis of Refinement Maps for Real-Time Object Code Verification
EM Al-qtiemat, SK Srinivasan, ZA Al-Odat, S Shuja
International Journal on Advances in Life Sciences Volume 12, Number 1 & 2, 2020, 2020
2020
Refinement Maps for Insulin Pump Control Software Safety Verification
SS Eman Al-Qtiemat, Sudarshan Srinivasan, Zeyad Al-Odat
VALID 2019, The Eleventh International Conference on Advances in System …, 2019
2019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20