Penerbitan SCOPUS/ERA

shoura ahmed balatta, ishak hashim, ahmad sami bataineh, eddie shahril ismail.  (2022).  oscillation criteria of fourth-order differential equations with delay terms.  - journal of function spaces.  1-7. 

fairuz shohaimay, eddie shahril ismail.  (2022).  a provably secure and efficient remote password authentication scheme using smart cards.  - cmc-computers materials & continua.  6125-6145. 

nadiah shapuan; eddie shahril ismail.  (2022).  a strong designated verifier signature scheme with hybrid cryptographic hard problems.  - journal of applied security research.  546-558. 

faieza samat, eddie shahril ismail.  (2021).  modified hybrid method with four stages for second order ordinary differential equations.  - mathematics.  1-8. 

faieza samat, eddie shahril ismail.  (2020).  a two-step modified explicit hybrid method with step-size-dependent parameters for oscillatory problems.  - journal of mathematics.  1-7. 

mohammad s. hijazi, nedal tahat, ashraf a. tahat, raft abdelrahim, eddie shahril ismail.  (2020).  authenticated encryption scheme based on ecdlp and dlp.  - applied mathematics & information sciences.  425-430. 

liyana chew nizam chew, eddie shahril ismail.  (2020).  s-box construction based on linear fractional transformation and permutation function.  - symmetry.  1-16. 

faieza samat, eddie shahril ismail.  (2020).  variable step exponentially fitted explicit sixth-order hybrid method with four stages for spring-mass and other oscillatory problems.  - symmetry.  1-12. 

izzmier izzuddin zulkepli, eddie shahril ismail.  (2020).  a secure key authentication scheme based on the hardness of solving elliptic curve discrete logarithm problem.  - journal of computer science.  583-590. 

muhammad helmi ali, eddie shahril ismail, firdaus mohamad hamzah.  (2019).  a practical and secure hash function-based password authentication scheme.  - journal of computer science.  954-960. 

nedal tahat, eddie shahril ismail, ashraf h. aljammal.  (2019).  a cryptosystem based on chaotic maps and factoring problems.  - international journal of mathematics in operational research.  55-64. 

ali h. kashmar, ahmed k. hassn, e. s. ismail.  (2019).  hybrid chaotic keystream generation (hckg) for symmetric image encryption.  - journal of theoretical and applied information technology.  984-993. 

nedal tahat & eddie shahril ismail.  (2018).  improvement of signature scheme based on factoring and chaotic maps.  - int. j. electronic security and digital forensics. 

nedal tahat, e.s. ismail, a.k. alomari.  (2018).  partially blind signature scheme based on chaotic maps and factoring problems.  - italian journal of pure and applied mathematics. 

ali, h. kashmar & eddie s. ismail.  (2017).  blostream: a high speed stream cipher.  - journal of engineering science and technology.  1111-1128. 

a. h. kashmar dan e. s. ismail.  (2015).  pseudorandom number generator using rabbit cipher.  - applied mathematical sciences.  4399-4412. 

a.h.kashmar, e.s.ismail.  (2015).  a secure auto-key round combiner algorithm.  - international journal of applied engineering research.  8191-8202. 

m.s.a mohamad, e.s.ismail.  (2015).  threshold cryptosystem with factoring and elliptic curve discrete logarithm problems.  - international journal of applied engineering research.  34974-34977. 

m.s.a. mohamad, e.s.ismail.  (2014).  a threshold authenticated encryption scheme using hybrid problems.  - applied mathematical sciences.  8(31):1499-1507. 

n. n. ramlee, e. s. ismail.  (2013).  a new directed signature scheme with hybrid problems.  - applied mathematical sciences.  7(125):6217-6225. 

m. mat-isa, e. s. ismail.  (2013).  a new proxy signature with revocation based on factoring and discrete logarithm.  - applied mathematical sciences.  7(123):6141-6152. 

s. atawna, r. abu-saris, i. hashim, e.s. ismail.  (2013).  on the period-two cycles of x(n+1)=(a+bx(n)+cx(n-k))/(a+bx(n)+cx(n-k)).  - abstract and applied analysis.  2013:Article ID 179423. 

e.s. ismail, w.s. wan-daud.  (2013).  id-based signature scheme using elliptic curve cryptosystem.  - applied mathematical sciences.  7(73):3615-3624. 

e.s. ismail, e. sakib.  (2012).  a new secure and efficient elliptic curve cryptosystem.  - applied mathematical sciences.  6(112):5573-5579. 

e.s. ismail, m.s. hijazi.  (2012).  development of a new elliptic curve cryptosystem with factoring problem.  - american journal of applied sciences.  9(9):1443-1447. 

ismail, e.s. and s. baharudin.  (2012).  secure hybrid mode-based cryptosystem.  - american journal of applied sciences.  9(3):289-292. 

nedal tahat, e.s. ismail, feras bani-ahmad.  (2012).  id-based signature scheme using the conic curve over zn on two hard problems.  - international journal of pure and applied mathematics.  77(3):443-452. 

e.s. ismail and m.s. hijazi.  (2011).  new cryptosystem using multiple cryptographic assumptions.  - journal of computer science.  7(12):1765-1769. 

o. y. ababneh, r. ahmad and e. s. ismail.  (2009).  design of new diagonally implicit runge-kutta methods for stiff problems.  - applied mathematical sciences.  3(45-48):2241-2253. 

o. y. ababneh, r. ahmad and e. s. ismail.  (2009).  new multi-step runge-kutta method.  - applied mathematical sciences.  3(45-48):2255-2262. 

abdulaziz, o., hashim, i., ismail, e.s..  (2009).  approximate analytical solution to fractional modified kdv equations.  - mathematical and computer modelling.  49(1-2):136-145. 

ababneh o.y., ahmad r.r., ismail e.s..  (2009).  on cases of fourth-order runge-kutta methods.  - european journal of scientific research.  31(4):605-615. 

ismail e.s, n.m.f. tahat and r.r ahmad.  (2008).  a new digital signature scheme based on factoring and discrete logarithms.  - journal of mathematics and statistics.  4(4):222-225. 

n.m.f. tahat, s.m.a. shatnawi and e.s. ismail.  (2008).  a new partially blind signature based on factoring and discrete logarithms.  - journal of mathematics and statistics.  4(2):124-129.