Follow
Nashwan Ahmed Al-Majmar
Nashwan Ahmed Al-Majmar
Associate professor of computer sciences
Verified email at ust.edu - Homepage
Title
Cited by
Cited by
Year
Deniability of symmetric encryption based on computational indistinguishability from probabilistic ciphering
NA Moldovyan, AAM Nashwan, DT Nguyen, NH Nguyen, HM Nguyen
Information Systems Design and Intelligent Applications: Proceedings of …, 2018
82018
Solving of Lectures Timetabling Problem and Automatic Timetable Generation using Genetic Algorithm
THAS  Nashwan Ahmed Al-Majmar
International Journal of Advanced Research in Computer and Communication …, 2016
62016
Normal Profile Updating Method for Enhanced Packet Header Anomaly Detection
WM Alsharafi, MN Omar, NA Al-Majmar, Y Fazea
Emerging Trends in Intelligent Computing and Informatics: Data Science …, 2020
32020
Feature selection optimization for highlighting opinions using supervised and unsupervised learning on Arabic language
KM Alalayah, IMG Alwayle, FA Alqasemi, NA Al-Majmar
International Journal 10 (2), 2021
12021
Algebraic Supports and New Forms of the Hidden Discrete Logarithm Problem for Post-quantum Public-key Cryptoschemes
AM  Dmitriy Moldovyan, Nashwan Ahmed Al-Majmar
The International Arab Journal of Information Technology 18 (3), 372-379, 2021
12021
Zero-Knowledge Protocols Based On Public-Encryption
NA Al-Majmar, DN Moldovyan, NA Moldovyan
International Journal of Innovation and Applied Studies 11 (1), 90, 2015
12015
Smart System for Dengue Fever Diagnosis: A Machine Learning Approach
ALH Salah, KM Alalayah, NA Al-Majmar, AA Mohsen, A Aqlan, ...
2023 3rd International Conference on Emerging Smart Technologies and …, 2023
2023
Development a Model for Drug Interaction Prediction Based on Patient State
NA Al-Majmar, AA Mohsen, MS Al-Thulathi
International Journal of Intelligent Systems and Applications 12 (6), 28, 2022
2022
Normal Profile Updating Method for Enhanced Packet Header Anomaly Detection
NA Al-Majmar, Y Fazea
2020
Post-Quantum Protocol for Non-Key Encryption Based On Discrete Logarithm Problem on an Elliptic Curve
AAM N. A. Al-Majmar, A. A. Kostina, N. A. Moldovyan
International Journal of Electrical, Electronics and Computers (EEC Journal …, 2019
2019
Simulation of an Intranet-Based Module Gnuplot
AA Mohsen, NA Al-Majmar, KM Alalayah
International Journal of Innovation and Applied Studies 24 (1), 109-116, 2018
2018
Simulation of Module GNUPLOT Based On INTRANET
KMA  Ayedh Abdul-Aziz Mohsen, Nashwan Ahmed Al-Majmar
International Journal of Innovation and Applied Studies 24 (1), 109-116, 2018
2018
التشفير و أمنية المعلومات
NA Al-Majmar
2016
Cryptographic Method of Protecting Educational Certificates From Forgery Using DSS
AAAM  Nashwan Ahmed Al-Majmar
International Journal of Computer Science And Technology 6 (4), 42-44, 2015
2015
Схема цифровой подписи над простым полем, основанная на сложности факторизации
НА Аль-Маджмар, ДН Молдовян
Известия СПбГЭТУ ЛЭТИ, 25-29, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–15