Head of the Profile

Ayad Hazim Al-Adhami

Computer Sciences Department

Dr. Lecturer

عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.

Ayad Al-Adhami is a lecturer in computer security and his role in the computer science department is as the head of the computer security branch. He earned his Ph.D. degree in computing – Computer security from Plymouth University, Plymouth- United Kingdom, 2018. His M.Sc. Degree was in Mathematics & Computer Applications, and specified in information security, from AlNahrain University Baghdad-Iraq, 2008. The Bachelor degree earned in 2003 from AlNahrain university department of Mathematics & computer applications. Ayad is a faculty staff member in the computer science department and he joined the Department of Computer Sciences in 2009 as an academic member teaching different topic. His research interests include: Computer security, RFIID security, Cryptography, Network security, Mathematics for computer science, data science & coding theory.

CV

Google Scholar Profile

ResearchGate Profile

Publons Profile

ORCID iD

Scopus

  • B.Sc. - Mathematics & computer applications-AlNahrain University-2003
  • M.Sc. – Data security, Mathematics & computer applications. AlNahrain University 2008
  • PhD – Computer security, Computing- Plymouth University, UK- 2018.

  • Computer security
  • Cryptography
  • Multimedia & Network security
  • Error correction codes
  • Mathematics for computer applications
  • RFID Authentication & Privacy

  • A secure sharing design for multi-tag RFID authentication protocol 2015 A Al-Adhami, M Ambroze, C Cristopher, I Stengel, M Tomlinson
  • A Quorum RFID System Using Threshold Cryptosystem A Al-Adhami, M Ambroze, I Stengel, M Tomlinson Future Internet of Things and Cloud (FiCloud), 2016 IEEE
  • A Quorum System for Distributing RFID Tags A Al-Adhami, M Ambroze, I Stengel, M Tomlinson Ubiquitous Intelligence & Computing, Advanced and Trusted Computing 2016 IEEE
  • A 256 bit implementation of ECC-RFID based system using Shamir secret sharing scheme and Keccak hash function A Al-Adhami, M Ambroze, I Stenget, M Tomlinson Ubiquitous and Future Networks (ICUFN), 2017 IEEE
  • An Effencient Improvement of RFID Authentication Protocol Using Hash Function ZKP AH Al-Adhami, M Ambroze, I Stengel, M Tomlinson 2019 2nd Scientific Conference of Computer Sciences (SCCS), IEEE 2019
  • An Innovative Bit Block Cipher Model for AES Cryptosystem HJ Mohammed, A Al-Adhami Revista AUS Journal , 381-386. 2019

  • Mathematics 2009-2010 / 2011-2012 University of Technology, Department of computer science
  • Numerical analysis 2010-2011 / 2012-2013 University of Technology, Department of computer science
  • MATLAB Lab 2010-2011 / 2012-2013 University of Technology, Department of computer science
  • Data security principles, 2018-2019 University of Technology, Department of computer science
  • Fuzzy logic 2018-2019 University of Technology, Department of computer science
  • Software design 2018-2019 University of Technology, Department of computer science
  • English 3 2018-2019 / 2019-2020 University of Technology, Department of computer science
  • Number theory 2018-2019 University of Technology, Department of computer science
  • Mathematical cryptography 2019-2020 University of Technology, Department of computer science
  • Advanced Cryptography 2019-2020 University of Technology, Department of computer science

  • More than (9) certificates of appreciation from the University of Technology’s Chancellor
  • More than (6) certificates of appreciation from the computer science department’s dean
  • Two certificates of appreciation from the Iraqi cultural Attaché London during the PhD study
  • More than (3) certificates of reviewing from different international conferences.
Top