Follow
hasan refai
hasan refai
Ass. Professor at Information Security and Cybersecurity- Philadelphia University
Verified email at philadelphia.edu.jo - Homepage
Title
Cited by
Cited by
Year
Measuring user satisfaction from e-Government services: Lessons from Jordan
A Alawneh, H Al-Refai, K Batiha
Government information quarterly 30 (3), 277-288, 2013
3832013
Efficient Routing Leach (Er-Leach) Enhanced On Leach Protocol In Wireless Sensor Networks.
H Al-Refai, A Al-Awneh, K Batiha, AA Ali, YME Rahman
International Journal of Academic Research 3 (3), 2011
352011
User authentication and authorization framework in IoT protocols
A Mohammad, H Al-Refai, AA Alawneh
Computers 11 (10), 147, 2022
72022
An enhanced user authentication framework in cloud computing
H Al-Refai, K Batiha, AM Al-Refai
International Journal of Network Security & Its Applications (IJNSA) Vol 12, 2020
32020
Enhanced model of Payment Phase for SET Protocol
H Al-Refai, A Alawneh, KA Jarah
Int. J. VideoImage Process. Netw. Secur. IJVIPNS-IJENS 14, 1-8, 2014
32014
Generating Python Code from Object-Z Specifications
AF Al Azzawi, M Bettaz, HM Al-Refai
arXiv preprint arXiv:1802.06224, 2018
22018
A comparative study in wireless sensor networks
H Al-Refai, A Alawneh, K Batiha
International Journal of Wireless & Mobile Networks 6 (1), 61, 2014
22014
Decidablity of Cryptographic Protocol Properties through Framed bisimulation
HM Al-Refai, TMT Sembok, M Yusoff
22004
An Enhanced AODV Protocol Against Black Hole Attack Based on Classification Algorithm
H Al-Refai
Int. J. Open Probl. Compt 13, 2020
12020
Improved SPI Calculus for Reasoning on Cryptographic Protocols
H Al-Refai, K Batiha, A Alwaneh, SB Hani
International Journal of Video&Image Processing and Network Security IJVIPNS …, 2014
12014
Evaluation technique in the spicalculus for cryptographic protocols
HM Al-Refai
Third International Symposium on Innovation and Information and …, 2009
12009
Automatic Crowd Detection, Prediction and Surveillance System using Collaborative IoT Sensor Network for Physical Security
H Jojo, MT Alrashdan, Y Khan, H Al-Refai
2023 International Conference on Integrated Intelligence and Communication …, 2023
2023
An Analysis of Neighbor Discovery Protocol Attacks
F Najjar, Q Bsoul, H Al-Refai
Computers 12 (6), 125, 2023
2023
Correction: Mohammad et al. User Authentication and Authorization Framework in IoT Protocols. Computers 2022, 11, 147
A Mohammad, H Al-Refai, AA Alawneh
Computers 11 (12), 168, 2022
2022
Enhancing formal specification and verification of e-commerce protocol
H Al-Refai, K Batiha
Journal of Advanced Computer Science & Technology 6 (1), 13-19, 2017
2017
E-Business Adoption by Jordanian Banks: An Exploratory Study of the Key Factors and Performance Indicators
A Alawneh, H Al-Refai, K Batiha
Actor-Network Theory and Technology Innovation: Advancements and New …, 2011
2011
IJNSA 04
H Al-Refai, AM KhaldounBatiha
AN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORK
H Al-Refai
1st PART
M Andrade, MAM Ferreira, JA Mahar, GQ Memon, SH Danwar, H Al-Refai, ...
THE NEW FORMAL METHOD CALCULUS FOR CRYPTOGRAPHIC PROTOCOLS
HM Al-Refai
The system can't perform the operation now. Try again later.
Articles 1–20