<?xml version="1.0"?>
<dblpperson name="Shadi Rasheed Masadeh" pid="14/9863" n="13">
<person key="homepages/14/9863" mdate="2023-09-12">
<author pid="14/9863">Shadi Rasheed Masadeh</author>
</person>
<r><article key="journals/ijesdf/Masadeh23" mdate="2023-09-12">
<author pid="14/9863">Shadi Rasheed Masadeh</author>
<title>A new encryption system for IoT devices using embedded key cryptosystem.</title>
<pages>56-65</pages>
<year>2023</year>
<volume>15</volume>
<journal>Int. J. Electron. Secur. Digit. Forensics</journal>
<number>1</number>
<ee>https://doi.org/10.1504/IJESDF.2023.10046009</ee>
<ee>https://www.wikidata.org/entity/Q114845880</ee>
<url>db/journals/ijesdf/ijesdf15.html#Masadeh23</url>
</article>
</r>
<r><article key="journals/ijics/MasadehAA23" mdate="2023-09-13">
<author pid="14/9863">Shadi Rasheed Masadeh</author>
<author pid="211/8889">Hamza Abbass Al-Sewadi</author>
<author pid="05/10546">Mohammed Abbas Fadhil Al-Husainy</author>
<title>A message encryption scheme inspired by Sudoku puzzle.</title>
<pages>399-413</pages>
<year>2023</year>
<volume>21</volume>
<journal>Int. J. Inf. Comput. Secur.</journal>
<number>3/4</number>
<ee>https://doi.org/10.1504/IJICS.2023.132739</ee>
<url>db/journals/ijics/ijics21.html#MasadehAA23</url>
</article>
</r>
<r><article key="journals/ijesdf/Al-HusainyAM22" mdate="2023-08-28">
<author pid="05/10546">Mohammed Abbas Fadhil Al-Husainy</author>
<author pid="211/8889">Hamza Abbass Al-Sewadi</author>
<author pid="14/9863">Shadi Rasheed Masadeh</author>
<title>Using a DNA tape as a key for encrypt images.</title>
<pages>373-387</pages>
<year>2022</year>
<volume>14</volume>
<journal>Int. J. Electron. Secur. Digit. Forensics</journal>
<number>4</number>
<ee>https://doi.org/10.1504/IJESDF.2022.10043141</ee>
<ee>https://www.wikidata.org/entity/Q114964764</ee>
<url>db/journals/ijesdf/ijesdf14.html#Al-HusainyAM22</url>
</article>
</r>
<r><inproceedings key="conf/icfnds/MasadehAA18" mdate="2025-01-19">
<author pid="14/9863">Shadi Rasheed Masadeh</author>
<author pid="211/8889">Hamza Abbass Al-Sewadi</author>
<author orcid="0000-0003-3554-3614" pid="05/10546">Mohammed Abbas Fadhil Al-Husainy</author>
<title>Embedded key cryptosystem for cloud computing applications.</title>
<pages>25:1-25:7</pages>
<year>2018</year>
<booktitle>ICFNDS</booktitle>
<ee>https://doi.org/10.1145/3231053.3231078</ee>
<ee>https://www.wikidata.org/entity/Q130855089</ee>
<crossref>conf/icfnds/2018</crossref>
<url>db/conf/icfnds/icfnds2018.html#MasadehAA18</url>
</inproceedings>
</r>
<r><article key="journals/jcsci/MasadehA17" mdate="2025-01-19">
<author pid="14/9863">Shadi Rasheed Masadeh</author>
<author orcid="0000-0001-7334-0266" pid="211/8889">Hamza Abbass Al-Sewadi</author>
<title>Segmented Block Cipher Algorithm Based on ASCII-Codes Maneuver.</title>
<pages>748-755</pages>
<year>2017</year>
<volume>13</volume>
<journal>J. Comput. Sci.</journal>
<number>12</number>
<ee>https://doi.org/10.3844/jcssp.2017.748.755</ee>
<ee>https://www.wikidata.org/entity/Q123334384</ee>
<url>db/journals/jcsci/jcsci13.html#MasadehA17</url>
</article>
</r>
<r><article key="journals/ijcac/AlhajAMA13" mdate="2023-09-12">
<author pid="151/9848">Abdullah A. Alhaj</author>
<author orcid="0000-0001-5748-4921" pid="18/7954">Shadi A. Aljawarneh</author>
<author pid="14/9863">Shadi Rasheed Masadeh</author>
<author orcid="0000-0002-6540-0334" pid="81/9027">Evon M. O. Abu-Taieh</author>
<title>A Secure Data Transmission Mechanism for Cloud Outsourced Data.</title>
<pages>34-43</pages>
<year>2013</year>
<volume>3</volume>
<journal>Int. J. Cloud Appl. Comput.</journal>
<number>1</number>
<ee>https://doi.org/10.4018/ijcac.2013010104</ee>
<url>db/journals/ijcac/ijcac3.html#AlhajAMA13</url>
</article>
</r>
<r><article key="journals/ijisp/MasadehAOA13" mdate="2023-09-12">
<author pid="14/9863">Shadi Rasheed Masadeh</author>
<author orcid="0000-0001-5748-4921" pid="18/7954">Shadi A. Aljawarneh</author>
<author pid="73/8460">Ashraf Odeh</author>
<author pid="151/9848">Abdullah A. Alhaj</author>
<title>Secure Communication: A Proposed Public Key Watermark System.</title>
<pages>1-10</pages>
<year>2013</year>
<volume>7</volume>
<journal>Int. J. Inf. Secur. Priv.</journal>
<number>4</number>
<ee>https://doi.org/10.4018/ijisp.2013100101</ee>
<url>db/journals/ijisp/ijisp7.html#MasadehAOA13</url>
</article>
</r>
<r><article key="journals/ns/MasadehTO12" mdate="2023-09-12">
<author pid="14/9863">Shadi Rasheed Masadeh</author>
<author orcid="0000-0002-2179-4570" pid="90/8473">Nedal Turab</author>
<author pid="91/9862">Farhan Obisat</author>
<title>A secure model for building e-learning systems.</title>
<pages>17-20</pages>
<year>2012</year>
<volume>2012</volume>
<journal>Netw. Secur.</journal>
<number>1</number>
<ee>https://doi.org/10.1016/S1353-4858(12)70008-9</ee>
<url>db/journals/ns/ns2012.html#MasadehTO12</url>
</article>
</r>
<r><article key="journals/ns/AljawarnehMA10" mdate="2023-09-12">
<author pid="18/7954">Shadi A. Aljawarneh</author>
<author pid="14/9863">Shadi Rasheed Masadeh</author>
<author orcid="0000-0001-6019-6875" pid="31/2940">Faisal Alkhateeb</author>
<title>A secure wifi system for wireless networks: an experimental evaluation.</title>
<pages>6-12</pages>
<year>2010</year>
<volume>2010</volume>
<journal>Netw. Secur.</journal>
<number>6</number>
<ee>https://doi.org/10.1016/S1353-4858(10)70081-7</ee>
<url>db/journals/ns/ns2010.html#AljawarnehMA10</url>
</article>
</r>
<r><inproceedings key="conf/iswsa/TurabAM10" mdate="2023-09-12">
<author orcid="0000-0002-2179-4570" pid="90/8473">Nedal Turab</author>
<author pid="18/7954">Shadi A. Aljawarneh</author>
<author pid="14/9863">Shadi Rasheed Masadeh</author>
<title>A study of secure deployment of wireless technology in the medical fields.</title>
<pages>25</pages>
<year>2010</year>
<booktitle>ISWSA</booktitle>
<ee>https://doi.org/10.1145/1874590.1874615</ee>
<crossref>conf/iswsa/2010</crossref>
<url>db/conf/iswsa/iswsa2010.html#TurabAM10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iswsa/Al-JedaiahMAA10" mdate="2025-11-15">
<author pid="14/8241">Mohamad Al-Jedaiah</author>
<author pid="14/9863">Shadi Rasheed Masadeh</author>
<author orcid="0009-0006-9749-5557" pid="13/9863">Aymen M. Abu-Errub</author>
<author orcid="0000-0003-0379-7409" pid="98/9862">Ahmad Y. Areiqat</author>
<title>The impact of web applications on decision-making process in the public sector.</title>
<pages>26</pages>
<year>2010</year>
<booktitle>ISWSA</booktitle>
<ee>https://doi.org/10.1145/1874590.1874616</ee>
<crossref>conf/iswsa/2010</crossref>
<url>db/conf/iswsa/iswsa2010.html#Al-JedaiahMAA10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ncm/MasadehATA10" mdate="2023-09-12">
<author pid="14/9863">Shadi Rasheed Masadeh</author>
<author pid="18/7954">Shadi A. Aljawarneh</author>
<author pid="90/8473">Nedal Turab</author>
<author pid="13/9863">Aymen M. Abu-Errub</author>
<title>A comparison of data encryption algorithms with the proposed algorithm: Wireless security.</title>
<pages>341-345</pages>
<year>2010</year>
<booktitle>NCM</booktitle>
<ee>https://ieeexplore.ieee.org/document/5572047/</ee>
<crossref>conf/ncm/2010</crossref>
<url>db/conf/ncm/ncm2010.html#MasadehATA10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ndt/Al-HajOM10" mdate="2023-09-12">
<author pid="19/2386-1">Ali Al-Haj 0001</author>
<author pid="73/8460">Ashraf Odeh</author>
<author pid="14/9863">Shadi Rasheed Masadeh</author>
<title>Copyright Protection of Relational Database Systems.</title>
<pages>143-150</pages>
<year>2010</year>
<booktitle>NDT (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-642-14292-5_16</ee>
<crossref>conf/ndt/2010-1</crossref>
<url>db/conf/ndt/ndt2010-1.html#Al-HajOM10</url>
</inproceedings>
</r>
<coauthors n="13" nc="1">
<co c="0"><na f="a/Abu=Errub:Aymen_M=" pid="13/9863">Aymen M. Abu-Errub</na></co>
<co c="0"><na f="a/Abu=Taieh:Evon_M=_O=" pid="81/9027">Evon M. O. Abu-Taieh</na></co>
<co c="0"><na f="a/Al=Haj_0001:Ali" pid="19/2386-1">Ali Al-Haj 0001</na></co>
<co c="0"><na f="a/Al=Husainy:Mohammed_Abbas_Fadhil" pid="05/10546">Mohammed Abbas Fadhil Al-Husainy</na></co>
<co c="0"><na f="a/Al=Jedaiah:Mohamad" pid="14/8241">Mohamad Al-Jedaiah</na></co>
<co c="0"><na f="a/Al=Sewadi:Hamza_Abbass" pid="211/8889">Hamza Abbass Al-Sewadi</na></co>
<co c="0"><na f="a/Alhaj:Abdullah_A=" pid="151/9848">Abdullah A. Alhaj</na></co>
<co c="0"><na f="a/Aljawarneh:Shadi_A=" pid="18/7954">Shadi A. Aljawarneh</na></co>
<co c="0"><na f="a/Alkhateeb:Faisal" pid="31/2940">Faisal Alkhateeb</na></co>
<co c="0"><na f="a/Areiqat:Ahmad_Y=" pid="98/9862">Ahmad Y. Areiqat</na></co>
<co c="0"><na f="o/Obisat:Farhan" pid="91/9862">Farhan Obisat</na></co>
<co c="0"><na f="o/Odeh:Ashraf" pid="73/8460">Ashraf Odeh</na></co>
<co c="0"><na f="t/Turab:Nedal" pid="90/8473">Nedal Turab</na></co>
</coauthors>
</dblpperson>

