Prof.
Jaafer
Mohammed
AL-Saraireh
academic
Biography:
Ja’afer AL-Saraireh received his B.Sc. degree in Computer Science from Mu’tah University, Karak, Jordan, in 1994. He earned his M.Sc. degree in Computer Science from the University of Jordan, Amman, in 2002. From 2002, he was a member of the Computer Engineering Department. He received a PhD degree in Mobile Network Security from the Faculty of Science and Technology at Anglia Ruskin University, UK. His research interests include mobile, wireless network security, QoS and database. He is currently working as an full Professor at Princess Sumaya University for Technology, Jordan.
Academic Rank:
Professor
Position:
Director of Computer Center
Faculty:
King Hussein School of Computing Sciences
KHCS Departments:
Computer Science
Unit:
Center of Consultancy and Training
Useful Link:
Phone:
+96265359949
Extension:
5023
Fax:
+96267295534
Office:
A104
Email:
Curriculum Vitae:
Publications:
- Al-Saraireh, J., and Yousef, S. (2007), "Analytical Model: Authentication Transmission Overhead Between Entities in Mobile Networks", Elsevier, Computer Communications Journal, vol. 30, no. 9. Page(s):1713-1720.
- Al-Saraireh, J., and Yousef, S. (2006), "A New Authentication Protocol for UMTS Mobile Networks", EURASIP Journal on wireless communications and networking, vol. 2006. Pages(s): 1-10, Article ID 98107
- Al-Saraireh, J., and Yousef, S. (2006), "Authentication Transmission Overhead Between Entities in Mobile Networks", (IJCSNS) International Journal of Computer Science and Network Security, vol.6, No.3, ISSN 1738-7906, March, 2006. Page(s):150-154.
- Al-Saraireh, J., Yousef, Y. and AL Nabhan, M. (2006), "Analysis and Enhancement of Authentication Algorithms in Mobile Networks", Journal of Applied Science, Network for Scientific Information, vol. 6 no. 4, ISNN 1812-5654. Page(s): 872-877.
- Al-Saraireh, J., and Yousef, S. (2006), “ Extension of Authentication and Key Agreement Protocol (AKA) for Universal Mobile Telecommunication System (UMTS)”, Journal of Theoretical and Applied Computer Sciences, vol. 1, no. 1 (2006), Page(s): 109–118
- Al-Saraireh, J., and Yousef, S. (2006), "A new Authentication Protocol for GSM and UMTS Networks", The 17th IASTED International Conference on Modeling and Simulation (MS-2006), 2006 Montreal, Canada.
- Al-Saraireh, J., and Yousef, S. (2006), "Analysis and Enhancement Authentication Protocol for UMTS Mobile Networks Based on Public Key", World Wireless Congress (WWC’2006), May 2006, San Francisco, USA.
- Al-Saraireh, J., Yousef, S. and AL Nabhan, M. (2006), "Analysis and Enhancement Authentication Algorithm in UMTS Networks", Wireless Euro-Mediterranean International Conference (WEMIC 2006), March 2006, Jordan.
- Al-Saraireh, J., and Yousef, S. (2006), "Classification of Security Authentication for Roaming User in Mobile Networks", 7th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2006), ISBN 1-9025-6013-9, Page(s): 88-93. June 2006 -Liverpool, UK.
- Al-Saraireh, J., and Yousef, S. (2006), "Investigate the Performance of Signalling Traffic and Load Transaction between Mobile Entities", 1st Conference on Advances in Computer Security and Forensics (ACSF), July 2006 -Liverpool, UK.
- Al-Saraireh, J., and Yousef, S. (2006), "Reduce the Network Traffic and Signalling Message for Authentication Process in Mobile Networks", IADAT – TCN’2006, International conference on Telecommunications and Computer Networks, September 2006, University of Portsmouth, Portsmouth, UK.
- AL Nabhan, M., Yousef, S. and Al-Saraireh, J. (2006), “Mobility Handoff Management during Active session Using H.323 protocol”, IEEE Vehicular Technology Conference (VTC 2006), September 2006, Montreal, Canada.
- AL Nabhan, M., Yousef, S. and Al-Saraireh, J. (2006), “Handoff Management in H.323 Mobile Environment",15th IST Mobile & Wireless Communications Summit, Myconos, Greece, June 2006
- AL Nabhan, M., Yousef, S. and Al-Saraireh, J. (2006), “H.510 Protocol and HMAL Filter to Support H.323 Multimedia Services in UMTS Networks”, 7th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2006), Page(s): 147-151. June 2006 -Liverpool, UK
- AL Nabhan, M., Yousef, S. and Al-Saraireh, J. (2006),” Real Time Multimedia Support in UMTS Networks Using H.323 Protocol and an Efficient Adaptation Filter”, Fifth IASTED International Conference on Communication Systems and Networks, CSN 2006,Palma de Mallorca, Spain August 2006
- Al-Saraireh, J., and Yousef, S. (2006), “Analyses Authentication and Key Agreement (AKA) Protocol for UMTS Mobile Networks,” IEEE conference, MCWC 2006 - Mobile Computing and Wireless Communications International Conference, 17-20 September 2006, Amman, Jordan
- AL Nabhan, M., Yousef, S. and Al-Saraireh, J. (2006), “Effects of RED and TCP Protocol on the QoS of Multimedia Transmissions Over Wireless Networks”, Information Technology Journal 5(4). 689-697, 2006 ISSN 1812-5638
- Al-Hawari, M., Al-Obisat, F., AL-Saraireh, J. and Mousa, S. (2008). Toward the Factors of E-learning Adoption in High Schools: Jordan Case Study. In: The International Conference on Technology, Communication and Education, Gulf University for Science and technology, Kuwait 7-9 April 2008, pp.105–109.
- AL-Saraireh, J. (2011). Efficient and Secure Authentication and Key Agreement Protocol. International Journal of UbiComp (IJU). Vol. 2, No. 2, pp.1- 15.
- AL-Saraireh, J. (2011). Security Performance Analysis and Enhancement of Authentication Protocol in Wireless Mobile Networks. Journal of American Science. Vol. 7, No. 5, pp.599- 610.
- Fayoumi, M. and AL-Saraireh, J. (2011). An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobile Networks. International Journal of Security (IJS). Vol.5, No. 1, pp.35-51.
- AL-Saraireh, J. and Al-Bdour, H. (2011). Enhancement of Authentication Mechanisms for Roaming Users in Mobile Networks. World Applied Science Journal.Vol.13, No. 5, pp.1165- 1177.
- AL-Saraireh, J., Saraireh, M., Saraireh, S. and Al Nbhan, M. (2011). Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol. Journal of Computer Science and Technology (JCS&T). Vol. 11, No. 2, pp.86-92.
- AL Nabhan, M., Haboush, A., AL-Saraireh, J. and Matter, N. (2013). A Preliminary Evaluation Study for M-learning Services and Implications for Future Design. World of Computer Science and Information Technology Journal (WCST), Vol.3, No.11, pp. 185-189.
- AL-Saraireh, J. (2013). Studying the Factors that Affecting the Adoption and Acceptance of E-commerce in Jordan. The 20th International Business Information Management Association (IBIMA) Conference, Kuala Lumpur, Malaysia 25-26 March 2013, pp.323–331.
- Saraireh S., Al-Sbou Y, Al-Saraireh J., and Alsmadi O. (2014). Image Encryption Scheme Based on Filter Bank and Lifting. International Journal Communications, Network and System Sciences, Vol. 7, No. 1, pp. 43-53.
- AL Nabhan, M., Matter N., Hussain, A. and AL-Saraireh, J. (2014). Location-Aware Mobile Learning Model: A Case for Positioning Performance Measurements. Computer and Information Science. 7(2), pp. 28-35
- Saraireh, M., AL-Saraireh, J. and Saraireh, S. (2014). A Novel Adaptive Contention Window Scheme for IEEE 802.11 MAC Protocol. Journal Trends in Applied Sciences Research. 9(6), pp. 275-289
- AL-Saraireh, J. and AL Nabhan, M. (2014). Factors analysis for E-Services Adoption in Jordan: A Technology Acceptance Study. Modern Applied Science. 8(3), pp. 192-201.
- AL-Saraireh, J. (2014). Information Retrieval To Improve Search Results. The 23rd International Business Information Management Association (IBIMA) Conference, Valencia, Malaysia 13-14 May 2014.
- AL-Saraireh, J., Saraireh, M., Saraireh, S. and Bani Younis M. (2014). Adaptive Distributed Inter Frame Space For IEEE 802.11 MAC Protocol. Communications and Network, 6(3), pp. 165-174
- AL-Saraireh, J., Saraireh, S. and Saraireh, M. (2015). A Novel Adaptive Contention Window and Distributed Inter Frame Space for IEEE 802.11. International Review on Computers and Software (I.RE.CO.S.) , 10(3), pp. 12-18
- AL-Saraireh, J. (2017). An Efficient Approach for Query Processing Over Encrypted Database. Journal of Computer Science, 13(10), pp. 12-19
- AL-Saraireh, J. (2017). Reducing Authentication Signaling Traffic for LTE Mobile Networks. International Journal of Applied Engineering Research, 12(19), pp. 12-19
- Sattar, A., Al-Fayoumi. M., Al-Fayoumi, M and AL-Saraireh, J. (2017). An Efficient E-Coin Scheme Under Elliptic Curve Cryptography Passive DNS Analysis Using Bro-IDS, The International Conference on New Trends in Computing Sciences (ICTCS)
- Hadi, A., AL-Saraireh, J., Dakhgan, A. and Rababh, D. (2017). Passive DNS Analysis Using Bro-IDS, The International Conference on New Trends in Computing Sciences (ICTCS)
- AL-Saraireh, J. (2017). HVM: A Method for Improving the Performance of Executing SQL-Query Over Encrypted Database. Journal of Theoretical and Applied Information Technology(JATIT), 95(14), pp. 3394-3402
- Al-Fayoumi, M., Haj Hamad, R., and AL-Saraireh J. (2018). SSOAM: Automated Security Testing Framework for SOA Middleware in Banking Domain. Journal of Computer Science. 14 (7): pp. 957.968.
- Saraireh, S., AL-Saraireh, J. and Saraireh, M. (2018). Integration of Hash –Crypto= Steganography for Efficient Security Technique. Internation Journal of Circuits, Sustems and Signal Processing, 12(1), pp. 274-278
- Saraireh, S., AL-Saraireh, J. and Al-Sbou, Y. (2018). A Hybrid Text – Image Security TechniqueI. Journal of Theoretical and Applied Information Technology(JATIT), 96(9), pp. 2414--2422
- AL-Saraireh, J. (2019). A Novel Approach for Query over Encrypted Data in Database. International Journal of Information and Computer Security, 11(6), pp. 621-635