Muawya Naser
Muawya Naser
King Hussein School of Computing Sciences
Verified email at - Homepage
Cited by
Cited by
Security considerations in embedding RFID in'hajj'system
M Naser, M Rafie, R Budiarto, W Alsalihy
European Journal of Scientific Research 42 (1), 133-138, 2010
ECG-RNG: A random number generator based on ECG signals and suitable for securing wireless sensor networks
C Camara, P Peris-Lopez, H Martín, M Aldalaien
Sensors 18 (9), 2747, 2018
Design and analysis of a true random number generator based on GSR signals for body sensor networks
C Camara, H Martín, P Peris-Lopez, M Aldalaien
Sensors 19 (9), 2033, 2019
The influence of human resources management processes (HRMPs) to achieving sustainable competitive advantage
MAAL Jarrah, L Karadsheh, M Naser, S Alhawari
Human performance technology: Concepts, methodologies, tools, and …, 2019
Gender Effect on Cloud Computing Services Adoption by University Students: Case Study of Saudi Arabia
AA Almarazroi, E Kabbar, M Naser, H Shen
International Journal of Innovation: IJI Journal 7 (1), 155-177, 2019
Cryptography: Protocols, design, and applications
K Lek, N Rajapakse
Nova Science Publishers, 2012
A Framework for RFID Systems' Security for Human Identification Based on Three-Tier Categorization Model
M Al Majaly, M Rafie, R Budiarto
2009 International Conference on Signal Acquisition and Processing, 103-107, 2009
Internet of Things (IoT) security and privacy
MN Al Dalaien, A Bensefia, SA Hoshang, ARA Bathaqili
Powering the Internet of Things With 5G Networks, 247-267, 2018
A note on the security of PAP
M Naser, P Peris-Lopez, R Budiarto, BR Álvarez
Computer communications 34 (18), 2248-2249, 2011
SLRV: An RFID Mutual Authentication Protocol Conforming to EPC Generation-2 Standard.
M Naser, I Aldmour, R Budiarto, P Peris-Lopez
Telkomnika 13 (3), 2015
Vulnerability Analysis of PAP for RFID Tags
M Naser, P Peris-Lopez, M Rafie, J van der Lubbe
arXiv preprint arXiv:1008.3625, 2010
E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption
NA Abuadhmah, M Naser, A Samsudin
Journal of Computer Science 6 (7), 723, 2010
Gender Effect on Cloud Computing Services Adoption by University Students: Case Study of Saudi Arabia
AA Almazroi, E Kabbar, M Naser, H Shen
International Journal of Innovation 7 (1), 155-177, 2019
Vulnerability Analysis of a Mutual Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard
R Budiarto, I Aldmour, PP Lopez
Proceeding of the Electrical Engineering Computer Science and Informatics 1 …, 2014
Ping Flood Attack Pattern Recognition Using a K-Means Algorithm in an Internet of Things (IoT) Network
D Stiawan, ME Suryani, MY Idris, MN Aldalaien, N Alsharif, R Budiarto
IEEE Access 9, 116475-116484, 2021
Problems of Proving the Electronic Arbitration Agreement in Applicable International Laws and Agreements
MN Al Dalaien, Z Al Enizi, A Al Dalaien
Journal of Applied Security Research, 1-27, 2021
Clients Acceptance towards Mobile Banking Application in Jordan Based on TAM Model
YK Shaheen, AM Elian, RF Ibrahim, M Al Dalain
2021 12th International Conference on Information and Communication Systems …, 2021
Fault Light Detection and Identification System using RFID
M Naser, F Abuamara
Proceedings of the 8th International Joint Conference on Pervasive and …, 2018
SURV: Shelled Ultralightweight Randomized Value Authentication Protocol for Low-Cost RFID Tags
M Naser, Y Alshamaila, R Budiarto, P Peris-Lopez
International Journal of Computer and Electrical Engineering 7 (3), 206-214, 2015
A Microprocessor Controlled Population Counter
SMM Kafumbe, HN Kundaeli, M Aldalaien
The system can't perform the operation now. Try again later.
Articles 1–20