scispace - formally typeset
A

Ayad Ibrahim

Researcher at University of Basrah

Publications -  20
Citations -  259

Ayad Ibrahim is an academic researcher from University of Basrah. The author has contributed to research in topics: Encryption & Cloud computing. The author has an hindex of 9, co-authored 20 publications receiving 225 citations. Previous affiliations of Ayad Ibrahim include Huazhong University of Science and Technology.

Papers
More filters
Proceedings ArticleDOI

Secure Rank-Ordered Search of Multi-keyword Trapdoor over Encrypted Cloud Data

TL;DR: A secure multi-keyword ranked search scheme over the encrypted cloud data that allows an authorized user to retrieve the most relevant documents in a descending order, while preserving the privacy of his search request and the contents of documents he retrieved.
Proceedings ArticleDOI

Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing

TL;DR: Security analysis and experimental results illustrate that the proposed two-factor authentication scheme based on Schnorr digital signature and feature extraction from fingerprint can withstand the common security attacks as well, and has a good performance of password authentication.

Efficient Password-based Two Factors Authentication in Cloud Computing

TL;DR: This work presents a new setting where users do not need to register their passwords to service provider, and shows good results in terms of high scalability which makes the scheme more suitable to the cloud environment, strong authentication that withstands different known attacks.
Proceedings ArticleDOI

A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing

TL;DR: The scheme proposes the phenomenal context according to three main components: data owner, users, and service provider in cloud where users do not need to register their passwords in the service provider, and preserves privacy of password, unlink ability, and secrecy of session key.
Book ChapterDOI

Cloud Authentication Based on Anonymous One-Time Password

TL;DR: A scheme of 2FA in cloud computing systems that depends on One-Time Password, Asymmetric Scalar-product Preserving Encryption and RSA digital signature as two factors is proposed that overcomes aforementioned issues and does not require extra devices such as token device, card reader in smart card and scanner in physiological biometrics.