Search

Your search keyword '"Zeyad, Mohammad"' showing total 16 results

Search Constraints

Start Over You searched for: Author "Zeyad, Mohammad" Remove constraint Author: "Zeyad, Mohammad" Topic business.industry Remove constraint Topic: business.industry
16 results on '"Zeyad, Mohammad"'

Search Results

1. An analysis of a benchmarking initiative to help government entities to learn from best practices – the 'Dubai We Learn' initiative

2. An authenticated, secure, and mutable multiple‐session‐keys protocol based on elliptic curve cryptography and text‐to‐image encryption algorithm

3. An analysis of a structured benchmarking project

4. Cryptanalysis of a Tightly-Secure Authenticated Key Exchange without NAXOS Approach Based on Decision Linear Problem

5. On the Security of the Standardized MQV Protocol and Its Based Evolution Protocols

6. ROAD TRAFFIC Management SOLUTIONS

7. A Comparative Performance Analysis of Route Redistribution among Three Different Routing Protocols Based on OPNET

8. Awareness of Dental Interns to Treat Pregnant Patients

9. A Survey of Authenticated Key Agreement Protocols for Securing IoT

10. Security Weaknesses and Attacks on the Internet of Things Applications

11. Efficient and Secure Key Exchange Protocol Based on Elliptic Curve and Security Models

12. A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm

13. Performance Analysis of Route Redistribution among Diverse Dynamic Routing Protocols based on OPNET Simulation

14. Vulnerability of an Improved Elliptic Curve Diffie-Hellman Key Agreement and its Enhancement

15. Clustering of cardiovascular diseases risk factors, and cardiovascular risk prediction, primary health care centers, Jeddah

16. Cryptanalysis and enhancement of two-pass authenticated key agreement with key confirmation protocols

Catalog

Books, media, physical & digital resources