Amina Y. AlSallut

Work place: Computer Engineering Department, Islamic University, Gaza, Palestine

E-mail: a.salut@ucst.edu.ps

Website:

Research Interests: Network Security, Information Security, Computer Networks, Computer Architecture and Organization, Computer systems and computational processes

Biography

Amina Y. Alsallut: Received a Master Degree of Computer Engineering at the Islamic University of Gaza, 2012. Currently, is an enrolled student in Phd Computer Engineering program at the Islamic University of Gaza. Since 2009, she has been a lecturer at the Engineering Department of College of Science at Technology, and has become the head of the Computer Department in January 2015 to July 2016. She has many published researches regarding many fields in Computer Engineering.

Author Articles
Exploratory Study on Hyperledger Fabric Framework: Food Supply Chain as a Case Study

By Amina Y. AlSallut Ruba A. Salamah Aiman A. Abusamra

DOI: https://doi.org/10.5815/ijem.2023.04.02, Pub. Date: 8 Aug. 2023

The wide use of supply chain management systems in various business sectors encouraged researchers and those who were concerned to explore and employ efficient technologies to improve such systems. The integration of blockchain into supply chains has proved its effectiveness at increasing the customer’s trust level, as well as many other features, such as traceability, immutability, provenance awareness, etc. Moreover, the use of private permissioned blockchain networks, for instance Hyperledger Fabric (HLF), not only leverages the level of confidence, but also increases the speed of transaction execution. In this paper, an exploratory detailed study on Hyperledger Fabric framework is conducted. The study focused on the HLF network design, the consensus algorithms used in HLF, the HLF smart contracts and the transaction flow stages. Moreover, a number of illustrative case studies that used HLF into their networks designed for food supply chain management systems have been introduced. The basic design components in each of the applications are reviewed as well as the main goals and desired outcomes.

[...] Read more.
Cryptography Using Multiple Two-Dimensional Chaotic Maps

By Ibrahim S. I. Abuhaiba Amina Y. AlSallut Hana H. Hejazi Heba A. AbuGhali

DOI: https://doi.org/10.5815/ijcnis.2012.08.01, Pub. Date: 8 Aug. 2012

In this paper, a symmetric key block cipher cryptosystem is proposed, involving multiple two-dimensional chaotic maps and using 128-bits external secret key. Computer simulations indicate that the cipher has good diffusion and confusion properties with respect to the plaintext and the key. Moreover, it produces ciphertext with random distribution. The computation time is much less than previous related works. Theoretic analysis verifies its superiority to previous cryptosystems against different types of attacks.

[...] Read more.
Other Articles