shoura ahmed balatta, ishak hashim, ahmad sami bataineh, eddie shahril ismail. (2022). oscillation criteria of fourth-order differential equations with delay terms. - journal of function spaces. 1-7. |
fairuz shohaimay, eddie shahril ismail. (2022). a provably secure and efficient remote password authentication scheme using smart cards. - cmc-computers materials & continua. 6125-6145. |
nadiah shapuan; eddie shahril ismail. (2022). a strong designated verifier signature scheme with hybrid cryptographic hard problems. - journal of applied security research. 546-558. |
faieza samat, eddie shahril ismail. (2021). modified hybrid method with four stages for second order ordinary differential equations. - mathematics. 1-8. |
faieza samat, eddie shahril ismail. (2020). a two-step modified explicit hybrid method with step-size-dependent parameters for oscillatory problems. - journal of mathematics. 1-7. |
mohammad s. hijazi, nedal tahat, ashraf a. tahat, raft abdelrahim, eddie shahril ismail. (2020). authenticated encryption scheme based on ecdlp and dlp. - applied mathematics & information sciences. 425-430. |
liyana chew nizam chew, eddie shahril ismail. (2020). s-box construction based on linear fractional transformation and permutation function. - symmetry. 1-16. |
faieza samat, eddie shahril ismail. (2020). variable step exponentially fitted explicit sixth-order hybrid method with four stages for spring-mass and other oscillatory problems. - symmetry. 1-12. |
izzmier izzuddin zulkepli, eddie shahril ismail. (2020). a secure key authentication scheme based on the hardness of solving elliptic curve discrete logarithm problem. - journal of computer science. 583-590. |
muhammad helmi ali, eddie shahril ismail, firdaus mohamad hamzah. (2019). a practical and secure hash function-based password authentication scheme. - journal of computer science. 954-960. |
nedal tahat, eddie shahril ismail, ashraf h. aljammal. (2019). a cryptosystem based on chaotic maps and factoring problems. - international journal of mathematics in operational research. 55-64. |
ali h. kashmar, ahmed k. hassn, e. s. ismail. (2019). hybrid chaotic keystream generation (hckg) for symmetric image encryption. - journal of theoretical and applied information technology. 984-993. |
nedal tahat & eddie shahril ismail. (2018). improvement of signature scheme based on factoring and chaotic maps. - int. j. electronic security and digital forensics. . |
nedal tahat, e.s. ismail, a.k. alomari. (2018). partially blind signature scheme based on chaotic maps and factoring problems. - italian journal of pure and applied mathematics. . |
ali, h. kashmar & eddie s. ismail. (2017). blostream: a high speed stream cipher. - journal of engineering science and technology. 1111-1128. |
a. h. kashmar dan e. s. ismail. (2015). pseudorandom number generator using rabbit cipher. - applied mathematical sciences. 4399-4412. |
a.h.kashmar, e.s.ismail. (2015). a secure auto-key round combiner algorithm. - international journal of applied engineering research. 8191-8202. |
m.s.a mohamad, e.s.ismail. (2015). threshold cryptosystem with factoring and elliptic curve discrete logarithm problems. - international journal of applied engineering research. 34974-34977. |
m.s.a. mohamad, e.s.ismail. (2014). a threshold authenticated encryption scheme using hybrid problems. - applied mathematical sciences. 8(31):1499-1507. |
n. n. ramlee, e. s. ismail. (2013). a new directed signature scheme with hybrid problems. - applied mathematical sciences. 7(125):6217-6225. |
m. mat-isa, e. s. ismail. (2013). a new proxy signature with revocation based on factoring and discrete logarithm. - applied mathematical sciences. 7(123):6141-6152. |
s. atawna, r. abu-saris, i. hashim, e.s. ismail. (2013). on the period-two cycles of x(n+1)=(a+bx(n)+cx(n-k))/(a+bx(n)+cx(n-k)). - abstract and applied analysis. 2013:Article ID 179423. |
e.s. ismail, w.s. wan-daud. (2013). id-based signature scheme using elliptic curve cryptosystem. - applied mathematical sciences. 7(73):3615-3624. |
e.s. ismail, e. sakib. (2012). a new secure and efficient elliptic curve cryptosystem. - applied mathematical sciences. 6(112):5573-5579. |
e.s. ismail, m.s. hijazi. (2012). development of a new elliptic curve cryptosystem with factoring problem. - american journal of applied sciences. 9(9):1443-1447. |
ismail, e.s. and s. baharudin. (2012). secure hybrid mode-based cryptosystem. - american journal of applied sciences. 9(3):289-292. |
nedal tahat, e.s. ismail, feras bani-ahmad. (2012). id-based signature scheme using the conic curve over zn on two hard problems. - international journal of pure and applied mathematics. 77(3):443-452. |
e.s. ismail and m.s. hijazi. (2011). new cryptosystem using multiple cryptographic assumptions. - journal of computer science. 7(12):1765-1769. |
o. y. ababneh, r. ahmad and e. s. ismail. (2009). design of new diagonally implicit runge-kutta methods for stiff problems. - applied mathematical sciences. 3(45-48):2241-2253. |
o. y. ababneh, r. ahmad and e. s. ismail. (2009). new multi-step runge-kutta method. - applied mathematical sciences. 3(45-48):2255-2262. |
abdulaziz, o., hashim, i., ismail, e.s.. (2009). approximate analytical solution to fractional modified kdv equations. - mathematical and computer modelling. 49(1-2):136-145. |
ababneh o.y., ahmad r.r., ismail e.s.. (2009). on cases of fourth-order runge-kutta methods. - european journal of scientific research. 31(4):605-615. |
ismail e.s, n.m.f. tahat and r.r ahmad. (2008). a new digital signature scheme based on factoring and discrete logarithms. - journal of mathematics and statistics. 4(4):222-225. |
n.m.f. tahat, s.m.a. shatnawi and e.s. ismail. (2008). a new partially blind signature based on factoring and discrete logarithms. - journal of mathematics and statistics. 4(2):124-129. |