
Sattar J. Aboud
Sattar J. Aboud
Professor in Applied Cryptography and Cyber Security
About
132
Publications
39,207
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
335
Citations
Introduction
Additional affiliations
November 2013 - present
Education
October 1982 - June 1987
University of Glasgow, UK
Field of study
- Computing System
Publications
Publications (132)
These Malicious intrusions by hackers can disrupt or stop Internet of Things services if basic security needs authentication is inadequately addressed. Current standards cannot secure the Internet of Things context when information is compromised by extending the Internet of Things to intelligent buildings. Therefore, the impact of a network attack...
The article introduces an identity-based online/offline signature system for wireless sensor network (WSN). The authors claim that when the computation cost is low, the proposed system is more suitable for WSN. The authors also claim that their scheme provides multi-level use from offline information allowing the signer to reuse this before the cal...
This paper proposes a new card game and dealing system, designed specifically for poker games. The proposed method benefits from two poker characteristics games that are ignored by public card systems. First, cards are dealt in poker games in the form of rounds, betting with them, instead of all at once. Second, the total number of cards dealt in p...
In this scheme, it determines a price ticket in which a passenger should pay based on the amount of distance traveled in each trip. The recent technology can assist to decrease the price of e-tickets as well as to enhance in a control of the passenger movements. The proposed scheme provides robust privacy to non-fraud passengers, meaning that the a...
This paper captures a snapshot of creative technologies research and development in the context of virtual environments. It also addresses security and the lack of it. the work presented in this brings together teams and work that has been developed from a range of institutions. The lessons learnt have been presented that we believe will spur new r...
E-commerce is the new growing technology in the field of trade systems. One of novelty technologies in such area, is an e-coin scheme. The e-coin transfer scheme denotes a practical innovation which allows to complete the e-operations. In this paper, it presents an efficient e-coin scheme based on an elliptic curve. In order to secure the incorrupt...
Secure e-exam is one of the considerable difficult problems in e-learning environment. The exam process for any educational university should involve different security techniques that should be used to protect the exam characteristics in diverse phases. In this paper, we propose a secure e-exam scheme with all of its information is in digital form...
In this scheme, we compute the fare that the passengers should pay based on the time of service for entry and exit of the scheme. The information and communication technologies let the use of e-tickets, which assists to decrease charges and enhance the control of the communications. But, these schemes should be secure anti-fraud and they should als...
This chapter presents a new group signature scheme using multivariate asymmetric cryptography. Compared with the exited signature schemes, the proposed scheme is applicable to e-voting schemes and can convince the requirements of e-voting schemes because it has two important characteristics, traceability and unlinkability. Traceability denotes that...
In this paper, an e-voting scheme is presented. The proposed scheme can make interaction between electors and e-processes with the least possible number of protocols. The proposed scheme let easy ballot casting and rapid counting for e-users. The scheme merges two signature schemes, blind signature and short signature. The signatures utilize pairin...
Identity-typed encryption has given great attentions in last decant, and most of identity-typed schemes are built from bilinear parings. Thus, identity-typed scheme without pairing is of great concern in the area of public key encryption. So far, there is some challenge to build the identity-typed scheme from quadratic residues. Therefore. In this...
Homomorphic cryptography scheme give the approach to outsource calculation to the cloud while preserving the secrecy of the information. To manage and increased the information that are being treated these days, good encryption result is the significant step for realism of homomorphic cryptography technique. In this paper, we consider the cryptogra...
In this paper, we introduce online-offline an identity-typed signature scheme for a wireless sensor network. Because of major cut in computing time, the proposed scheme is more appropriate for a wireless sensor network setting with strictly limited resources. One of the interesting characteristics of the proposed scheme is that it gives multi-time...
In this paper, we will consider some system, a verifier password-based key agreement system and claim that the system is insecure. Then, the author present an enhanced verifier-based key agreement system relied on Lee, et al. system and show that the propose system resists against password guessing attack and stolen verifier attack. The author is c...
In this paper, we introduced a new modular reduction algorithm which divides the binary string of the integer to be reduced into blocks in terms of its runs. Its computing cost relies on the number of runs in the binary string. We give the complete cost computing analysis of the algorithm. It claims that the new reduction method is about twice fast...
The handover over multiple access points is extremely needed in mobile nodes, but promising efficiency and security of such implementation is difficult. This paper illustrates that preceding handover authentication schemes suffer from the communication and computing costs, and are vulnerable to some security attacks. Additional, a new handover auth...
The digital signature is the main issue in construction the secure authentication
protocol. For example, He et al. introduced two authentication protocols in 2012.
Both protocols rely on the identity-typed signature scheme and they claimed that their
protocols are secure and efficient. But, at the same year, He et al. indicated that both
schemes ar...
Secure e-exam is one of the considerable difficult problems in e-learning environment. The exam process for any educational university should involve different security techniques that should be used to protect the exam characteristics in diverse phases. In this paper, we propose a secure e-exam scheme with all of its information is in digital form...
The digital signature is the main issue in construction the secure authentication protocol. For example, He et al. introduced two authentication protocols in 2012. Both protocols rely on the identity-typed signature scheme and they claimed that their protocols are secure and efficient. But, at the same year, He et al. indicated that both schemes ar...
If we construct e-cash scheme, the main motivation is to stop users’ malicious insiders. Players such as banks might have vital and secret information of the users; the insiders in the un-trusted banks can become threats to e-cash schemes. Many authors in this regard study the security of the e-cash schemes but many of them insufficient. In this pa...
In 2012, Fan et al. presented the user recoverable offline e-coin system with rapid anonymity revoking. The authors claimed that their system can accomplish the security needs of e-coin scheme such as unlinkability, over-spending checking, anonymity control and rapid anonymity revoking on over-spending. They added prove unforgeability characteristi...
Recently, Shm et al. introduced the efficient identity-typed transmission authentication scheme relied on some system in order to reach security properties in wireless sensor networks. They claim that their system can attain security properties and alleviated denial-of-service attack by preventive the times of signature verification nonsuccess in w...
Password authentication is one of easiest and most
appropriate authentication methods under unprotected
channels. The problem of password authentication over
unprotected channel is existed in various uses. Computing
resources have increased considerably, password
authentication is more often needed essential to login to
computers, and wireless netw...
Present public-key schemes are relied mostly on arithmetic operations such as multiplication and exponentiation of large inte-gers, ranging of 128-2048 binary bits. Carrying out calculation of the large length with multiple precisions is not quick and not easy to employ. Most algorithms base on modular reduction methods to decrease a length and com...
the password authentication systems have been increasing in recent years. Therefore authors have been concentrated these days on introducing more password authentication systems. Thus, in 2011, Lee et al., presented an enhanced system to resolve the vulnerabilities of selected system. But, we notice that Lee et al., system is still weak to server a...
We will present in this paper, an enhanced system
to eliminate the vulnerabilities and at the same time to
increase the security characteristics. In a suggested system,
there is no valuable information can be gained from a data
saved in smart card. So, a stolen user smart card attack is
blocked. To prevent server attack, we shift a user
authenticat...
in some years ago, an Internet has been developed what so-called Web. But, the broad use of an existing Internet services has made individual users the possible target for cyber crimes. In this paper, we study and analysis different cyber crime cases and compare the result with the preceding work. The illustrated results include all cases that desc...
The threshold proxy signature scheme allows the
original signer to delegate a signature authority to the proxy
group to cooperatively sign message on behalf of an original
signer. In this paper, we propose a new scheme which includes
the features and benefits of the RSA scheme. Also, we will
evaluate the security of undeniable threshold proxy signa...
Call Admission Control (CAC) is one of the various radio resource management (RRM) congestion control functions in WCDMA systems. A lot of call admission control CAC algorithms are being used to keeping the interference below specific threshold level in order to improve the quality of service (QoS) and performance of the system . This paper perform...
in this paper, we propose a secure virtual casino for large number of players; the multicast network is credible to be used for one-to-many communication. So, we introduced the scheme for Internet bingo by which prevents the failure in many-to-one transmission between the players and a bingo hall. The scheme combines bits employing the probabilisti...
In the attribute typed signature scheme the user can sign a document with any predicate that is satisfied by his attributes issued from the attribute agency. Based on this assumption, the signature shows not to an identity of a user signed the document, other than the demand concerning the attributes underlying signer possesses. In attribute based...
The threshold proxy signature scheme allows the
original signer to delegate a signature authority to the proxy
group to cooperatively sign message on behalf of an original
signer. In this paper, we propose a new scheme which includes
the features and benefits of the RSA scheme. Also, we will
evaluate the security of undeniable threshold proxy signa...
We will present in this paper, an enhanced system
to eliminate the vulnerabilities and at the same time to
increase the security characteristics. In a suggested system,
there is no valuable information can be gained from a data
saved in smart card. So, a stolen user smart card attack is
blocked. To prevent server attack, we shift a user
authenticat...
The threshold proxy signature scheme allows the original signer to delegate a signature authority to the proxy group member to cooperatively sign message on behalf of an original signer. In this paper, we also propose a new scheme which includes the features and benefits of the RSA scheme which is a popular security technique. Also, we will evaluat...
The threshold proxy signature scheme allows the original signer to delegate a signature authority to the proxy group member to cooperatively sign message on behalf of an original signer. In this paper, we also propose a new scheme which includes the features and benefits of the RSA scheme which is a popular security technique. Also, we will evaluat...
In this paper we analyzed the Harkins scheme that is the password
authenticated key exchange scheme which has been proposed for an Internet
as the standard scheme for universal internet use. We studied a security of
this scheme and developed the attack that is able of obtaining both the
session key and password from the real participant. The attack...
In this paper, we analyze the Akleylek, et al. scheme and their try to enhance a security of peer-to-peer network by merging El-Gamal scheme with knapsack system. We demonstrate that this combination disclose a security and causes a scheme weak to cipher-text only attack. So, in a network a hacker can use this attack and easily decrypt an encrypted...
In this paper, we look into some methods for finding
square roots that need more than one exponentiation in
finite field Fq . Our proposed method calculates the
primitive th e 2 root so that e is a biggest positive
integer, and is suitable for cases if e is small. The
proposed method enhances a related exponentiation
caused from a well revised ex...
In the attribute typed signature scheme, the user can sign a
document with any predicate that is satisfied by his
attributes issued from the attribute agency. Based on this
assumption, the signature does not show the identity of a
user who signed the document. It only shows the demand
related to the attributes that the underlying signer possesses....
Ad hoc Network is self-configurable, infrastructure-less multi-hop wireless networks, characterized by their frequent topology changes and the need for dynamic routing protocols capable of coping with these characteristics. A new reactive ad hoc routing protocol is proposed in this paper, which relies on the Artificial Intelligence Bidirectional Se...
In this paper, we suggest the practical identity-typed partial blind signature scheme. The proposed scheme combines a presented philosophy of blind signature and identity-typed cryptosystem. A proposed signature is demonstrated secure in a random oracle model. We illustrate the use of the proposed identity- typed partial blind signature scheme to b...
The aggregate signature is very convenient in milieus with
low bandwidth transmission, and calculable low storage
because it significantly decreases an entire signature size
and verification cost. Recently, some authors suggested an
efficient certificateless aggregate signature scheme. They
claimed that the scheme is secure in the robust security
m...
In this paper we analyzed the Harkins scheme that is the password
authenticated key exchange scheme which has been proposed for an Internet
as the standard scheme for universal internet use. We studied a security of
this scheme and developed the attack that is able of obtaining both the
session key and password from the real participant. The attack...
Any digital signature is similar to a handwritten signature, in which we can prove an entity signature to a message and also we can prove that a message is identical to an entity signed message. As, we understand that Elgamal digital signature scheme employ exponent key technique to generate a digital signature. The integrity of that digital signat...
E-business is the comparatively contemporary and continually developing subject for business organization technology. One of the practical modernisms in banking, finance and e-business is an e-payment schemes. E-payment scheme introduce the technical advance that facilitates to achieve financial e-payments. In this article, we suggest a secure e-pa...
In this patent paper, a proxy blind signature scheme typed bilinear pairings is suggested. The proxy blind signature
scheme is demonstrated as secure under discrete logarithm problem, decision bilinear Diffie-Hellman scheme and the
chosen-target computational Diffie-Hellman in the random oracle model. In reality, users can withdraw and deposit fund...
In this paper, we suggest a multiple-collision trapdoor hash family under both integer factoring and discrete logarithm problems, and we present their security proofs. In multiple-collision trapdoor hash family, exposing multiple collisions of similar hash functions will not disclose the private key of trapdoor hash value. In the proposed multiple-...
Simulation is the implementation of a model, denoted by a program code that provides information regarding the scheme being inspected. Simulation models are employed to carry out tests that are costly, risky or time consuming to be performed using analytical or experimental approaches. There are a number of methodologies that can be used to classif...
In this paper, we introduce a new threshold signature RSA-typed scheme. The proposed scheme has the characteristics of un-forgeable and robustness in random oracle model. Also, signature generation and verification is entirely non-interactive. In addition, the length of the entity signature participate is restricted by a steady times of the length...
In this paper, we review certain password scheme that using a smart card. The scheme verifies the logon password without password file. The idea of that scheme based on both integer factoring and discrete logarithm problem. Also, we describe some schemes which indicated there are two security problems in that password-typed smart card scheme, these...
A proxy signature scheme is a variation of
the ordinary digital signature scheme which
enables a proxy signer to generate signatures
on behalf of an original signer. In this paper,
we present two efficient types of proxy
signature scheme. The first one is the proxy
signature for warrant partial delegation
combines an advantage of two well known
war...
This paper investigates the growing number of cybercrimes in Iraq and considers the demographic properties of individuals in charge for such activity. The paper relies on information taken from the Iraqi Department of Cybercrimes Records for the years 2006-2011. This paper describes cybercrime types and their properties. The results illustrate that...
In this paper, we introduce a new threshold signature RSA-typed scheme. The proposed scheme has the characteristics of un-forgeable and robustness in random oracle model. Also, signature generation and verification is entirely non-interactive. In addition, the length of the entity signature participate is restricted by a steady times of the length...
In this paper, we introduce a new threshold signature
RSA-typed scheme. The proposed scheme has the characteristics
of un-forgeable and robustness in random oracle model. Also,
signature generation and verification is entirely non-interactive.
In addition, the length of the entity signature participate is
restricted by a steady times of the length...
In this paper we study a scheme for making cryptanalysis and security improvement. This protocol by Song, is a password authentication protocol using smart card. We note that this protocol has been shown to be prone to the offline password guessing attack. We perform an additional cryptanalysis on this scheme and detect that it is vulnerable to the...
In 2000, Peyravian and Zunic presented a simple
password authentication scheme using collisionresistant
hash function. Later, Hwang and Yeh
denoted that Peyravian and Zunic scheme is insecure
and suggested an improvement one using the server
public key. However, in practice, services that do not
use public keys are quite often superior to PKIs.
Sim...
In 2005, Lee suggested a password scheme for three participants without trusted server. Lee claimed that the scheme can withstand different attacks and give the perfect secrecy. In this paper, we will demonstrate that the Lee scheme undergoes from the imitation attack. Simultaneously, we will suggest an enhanced algorithm to resist the mentioned at...
In 2005, Lee suggested a password scheme for three participants without trusted server. Lee claimed that the scheme can withstand different attacks and give the perfect secrecy. In this paper, the authors demonstrate what the Lee scheme undergoes from the imitation attack. Simultaneously, the authors suggest an enhanced algorithm to resist the ment...
This paper introduces and analyses cryptography attacks on knapsack public key cryptography that is relied on thought of Hwang scheme. That is, it relied on a new algorithm called permutation combination method. We will show that this scheme is not secure by using Shamir attack on the basic Merkle and Hellman knapsack method which is based on the e...
Abstract—In this paper we study a scheme for making cryptanalysis and security improvement. This protocol by Song, is a password authentication protocol using smart card. We note that this protocol has been shown to be prone to the offline password guessing attack. We perform an additional cryptanalysis on this scheme and detect that it is vulnerab...
In this paper we study a scheme for making cryptanalysis and security improvement. This protocol by Song, is a password authentication protocol using smart card. We note that this protocol has been shown to be prone to the offline password guessing attack. We perform an additional cryptanalysis on this scheme and detect that it is vulnerable to the...
There are many proposals which offer anonymous and non-repudiation e-payment protocols. But they have the drawbacks that the anonymity can be misused fraudulently to perform a perfect crime. Currently, the hot research concentrates on the accepting of e-payment protocols where the anonymity of the coins is cancelable via a trusted authority in the...
In this article e-payment scheme by mobile machine is considered. The requirements for a mobile machine in e-payment are presented, particularly when merchant employing accounts for payments and when using advertising. In the proposed scheme we will use the public key infrastructure and certificate for authenticate purchaser and merchant and to sec...
In this paper, we analyze a knapsack scheme suggested by Hwang, which is relied on a new method entitled permutation combination method. We demonstrate that this permutation method is not efficient to the security of the scheme since, we can break this scheme employ the algorithm provided by Shamir scheme. Finally, we provide an enhanced version of...
There are many proposals which offer anonymous and non-repudiation e-payment protocols. But they have the drawbacks that the anonymity can be misused fraudulently to perform a perfect crime. Currently, the hot research concentrates on the accepting of e-payment protocols where the anonymity of the coins is cancelable via a trusted authority in the...
In this paper, we analyze a knapsack schemes. The one is suggested by Su, which is relied on a new method entitled permutation combination method. We demonstrate that this permutation method is useless to the security of the scheme. Since the special super increasing construction, we can break this scheme employ the algorithm provided by Shamir sch...
E-payment is now one of the most central research areas in e-commerce, mainly regarding online and offline payment scenarios. Customers are generally passive in e-commerce transaction. Relied on a blind signature, this paper introduces an e-payment protocol, in which customers have more initiative, and can terminate the transaction before possible...
The spreading of information in the last decade has led to great development in e-commerce. For instance, e-trade and e-bank are two main Internet services that implement e-transaction from anyplace in the world. This helps merchant and bank speed up the financial transaction process and to give user instant services at any time. However, the cost...
Software piracy is the major challenge to software providers, and most trade organizations today face problems with software piracy. As a result, there are several developed systems available in the market to deal with this problem. Unfortunately, the majority of these systems do not provide an appropriate solution and the problem has not been solv...
A new idea for digital signature scheme is suggested. The suggested scheme employs a composite modulus that is a product of two distinct prime numbers. There is a similarity with the most widely used digital signature schemes such as RSA regarding the algebraic background. The new scheme uses operations in prime integer order, a characteristic that...
In this paper, we will study [Lee, Kim and Yoo, a verifier password typed key agreement] scheme and demonstrate that the scheme is not secure. Then, the authors will propose an enhanced verifier typed key agreement scheme relied on [Lee, Kim and Yoo] scheme and demonstrate that the propose scheme resists against password guessing attack and stolen...
Since the mobile systems are growing quickly, the e-commerce will change gently to
m-commerce. As a result, mobile security will become the one of the most important
part of mobile system and will become the hottest area facing the mobile payment due
to mobile networks directness. However, the appropriate encryption scheme for
mobile communication...
Multiplicative inverse is a crucial operation in public key cryptography, and been widely used in cryptography. Public key cryptography has given rise to such a need, in which we need to generate a related public and private pair of numbers, each of which is the inverse of the other. The basic method to find multiplicative inverses is Extended-Eucl...
The vast spreading of information in the last decade has led to greatdevelopment in e-commerce. For instance, e-trade and e-bank are two mainInternet services that implement e-transaction from anyplace in the world. Thishelps merchant and bank to ease the financial transaction process and to giveuser friendly services at any time. However, the cost...
Unfortunately, cost and time are always restraints; the impact of simulation models to study the dynamic system performance is always rising. Also, with admiration of raising the network security models, the complexity of real model applications is rising too. As a result, the complexity of simulation models applications is also rising and the nece...
Soft Computing is a common name for algorithms
that take from individual knowledge and imitate individual skills.
In this paper, we will review the major elements of soft
computing methods embracing artificial neural network, fuzzy
logic, genetic algorithm and probabilistic logic system. Soft
Computing methods are being extensively employed by the...
The security on many public key encryption schemes relied on the intractability of finding the integer factoring problem such as RSA scheme. However, there are great deals of researches concerning the RSA factoring modulus compared with the other type of attack the RSA scheme. So the need for more methods of attacks other than RSA factoring modulus...
As long as sensitive data over browsing the net
can be the access to the information abuse and to
other diseases. Through e-commerce process critical
business transactions are transmitted, even entities
act online transactions such as banking and
shopping over the net and the real threat hangs on
the minds of each common individual that is the data...
Annotation: This paper presents a threshold designated receiver signature scheme that includes certain characteristic in which the signature can be verified by the assistance of the signature recipient only. The aim of the proposed signature scheme is to protect the privacy of the signature recipient. However, in many applications of such signature...
The security on many public key encryption schemes relied on the
intractability of finding the integer factoring problem such as RSA
scheme. However, there are great deals of researches related to the
RSA factoring modulus compared with the other type of attacks
RSA scheme. So the need for more methods of attacks other than
RSA factoring modulus to...
Cyber security is the significant issue for customers, sellers, and discipliners since hackers who utilize vulnerabilities can make considerable damage. In this chapter, we study key topics in a nascent literature on a cyber security. We first concentrate on how inducements influence the major topics in information security. Three significant topic...
E-test is that test performed over the internet inwhich questions and solutions are computer files rather thansheets of paper. The application of e-test as a perspectiveknowledge measurement is apparent. But, security for suchscheme is not obvious. Thus in this article we introduce asecure e-test scheme with wireless networks. In addition, wesugges...
Identity authentication and key agreement schemes play significant role in ad hoc networks. In this study, a new identity authentication scheme relies on the threshold group signature is introduced. Compared with the current schemes it is secure, efficient and adaptable to a multi-hop feature of ad hoc networks. In addition, a new key agreement sch...
Anew multisignature scheme using re-encryption technique based on the RSA algorithm is suggested what enhance version of Okamoto scheme. The suggested scheme results bit expansion in block length of the multisignature, but the bit size of the expansion is not larger than the number of signers irrespective of their modulus. In addition, the new sche...
Usability assessment plays a fundamental role in discovering usability problems and the determination of the level of usability for a given software product. One crucial aspect in every usability assessment is the estimation of the sample size desired for a software product. Once we start estimating the sample size needed for a usability assessment...