Suivre
Ja'afer Al-Saraireh
Ja'afer Al-Saraireh
Adresse e-mail validée de psut.edu.jo
Titre
Citée par
Citée par
Année
A new authentication protocol for UMTS mobile networks
J Al-Saraireh, S Yousef
EURASIP Journal on wireless communications and networking 2006, 1-10, 2006
492006
Extension of authentication and key agreement protocol (AKA) for universal mobile telecommunication system (UMTS)
J Al-Saraireh, S Yousef
International Journal of Theoretical and Applied Computer Sciences 1 (1 …, 2006
302006
Analytical model for authentication transmission overhead between entities in mobile networks
S Yousef
Computer communications 30 (8), 1713-1720, 2007
192007
Enhancement mobile security and user confidentiality for umts
J Al-Saraireh, S Yousef, M Al Nabhan
Second European Conference on Mobile Governement, 2006
122006
An Efficient Approach for Query Processing Over Encrypted Database
AEAQPOE Database
Journal of Computer Science 13 (10), 548-557, 2017
11*2017
An enhancement of authentication protocol and key agreement (AKA) for 3G mobile networks
ALF Mustafa, ALS Ja’afer
International Journal of Security (IJS) 5 (1), 35-51, 2011
112011
Image encryption scheme based on filter bank and lifting
S Saraireh, Y Al-Sbou, O Alsmadi
Int'l J. of Communications, Network and System Sciences 2014, 2014
82014
Analysis and enhancement of authentication algorithms in mobile networks
J AL-Saraireh, S Justus Yousef, MAL Nabhan
Journal of applied Sciences 6 (4), 872-877, 2006
72006
A Novel Adaptive Contention Window Scheme for IEEE 802.11 MAC Protocol
M Saraireh, ALS Ja'afer, S Saraireh
Trends in Applied Sciences Research 9 (6), 275, 2014
42014
Analyses authentication and keyagreement (AKA) protocol for UMTS mobile networks
S Yousef
2006 Proceedings of the First Mobile Computing and Wireless Communication …, 2006
42006
Authentication transmission overhead between entities in mobile networks
ALS Ja’afer, S Yousef
IJCSNS 6 (3B), 150, 2006
42006
Asymmetric Identification Model for Human-Robot Contacts via Supervised Learning
AAH Qasem, J Al-Saraireh
Symmetry 14 (3), 1-19, 2022
3*2022
Efficient detection of hacker community based on twitter data using complex networks and machine learning algorithm
A Al-Tarawneh, J Al-Saraireh
Journal of Intelligent & Fuzzy Systems 40 (6), 12321-12337, 2021
32021
A HYBRID TEXT-IMAGE SECURITY TECHNIQUE.
S Saraireh, J Al-Saraireh, Y Al-Sbou, M SARAIREH
Journal of Theoretical & Applied Information Technology 96 (9), 2018
32018
HVM: A METHOD FOR IMPROVING THE PERFORMANCE OF EXECUTING SQL-QUERY OVER ENCRYPTED DATABASE.
JAA AL-SARAIREH
Journal of Theoretical & Applied Information Technology 95 (14), 2017
32017
Passive DNS Analysis Using Bro-IDS
D Hadi, A., AL-Saraireh, J., Dakhgan, A. and Rababh
The International Conference on New Trends in Computing Sciences (ICTCS …, 2017
3*2017
Factors analysis for e-services adoption in jordan: A technology acceptance study
AL Ja’afer, M Alnabhan
Modern Applied Science 8 (3), 192, 2014
32014
A Preliminary Evaluation Study for M-learning Services and Implications for Future Design
M Alnabhan, M Ja'afer
World Comput. Sci. Inf. Technol. J. 2 (1), 13-17, 2012
32012
Efficient and secure authentication and key agreement protocol
J AL-Saraireh
International Journal of UbiComp 2 (2), 2011
32011
A new authentication protocol for GSM and UMTS networks
J Al-Saraireh, S Yousef
Proceedings of the 17th IASTED international conference on Modelling and …, 2006
32006
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20