Sattar B. Sadkhan Al Maliky

Sattar B. Sadkhan Al Maliky (S’80, M’06, SM’11) is a professor at the College of Information Technology of the University of Babylon, Hilla, Iraq. He received a PhD degree in Wireless Communication Engineering in 1984, and MSc degree from the VAAZ Academy in Brno, Czech Republic in 1981. His BSc degree in Electrical and Electronic Engineering from Military Engineering College (MTC) in Baghdad, Iraq in 1978. He received a Diploma in Radar Repairing (4 years in 1974) in Iraq, and another Diploma in Cryptography from Switzerland in 1988. His main research interests include wireless digital communication, cryptography, cryptanalysis, security evaluation, information hiding, digital watermarking, ICA, and soft computing techniques. He was the leader of many scientific research groups in different research institutes in Iraq from 1986 – 2003. He is the creator and the chair of IEEE Iraq Section since Sept. 2008. He is the creator and chair of IEEE ComSoc Iraq Chapter since 2011. He is the Editor-in-Chief of 8 international scientific journals, and he is the Associate Editor-in-Chief of 6 international journals, and a member of 20 international scientific journals. He has served as honorable chair, general chair, member of scientific committee, technical program committee chair, and symposium chair for many international conferences. He participated in many international TPCs and several editorial review boards. He has authored or coauthored over 230 papers in refereed international journals and conferences. He has translated 3 books into Arabic. He is the creator and chair of URSI Iraq Committee since 2012. He is the Chair of Iraq Group in BRCORP Institute in 2014.

Publications

International Journal of Public Health Management and Ethics (IJPHME)
Qiang (Shawn) Cheng. Est. 2017.
The International Journal of Public Health Management and Ethics (IJPHME) is a premier source featuring emerging research on the current issues facing public health and welfare...
Privacy and Security of Wireless Communication Networks
Sattar B. Sadkhan, Nidaa A. Abbas. © 2016. 21 pages.
Wireless networks are inherently more vulnerable than their wired counterparts. In addition, complications arise in the presence of node mobility and dynamic network topology....
Chaos-Based Cryptography for Voice Secure Wireless Communication
Sattar B. Sadkhan Al Maliky, Rana Saad. © 2015. 34 pages.
Chaos theory was originally developed by mathematicians and physicists. The theory deals with the behaviors of nonlinear dynamic systems. Chaos theory has desirable features...
Privacy and Security of Wireless Communication Networks
Sattar B. Sadkhan, Nidaa A. Abbas. © 2014. 21 pages.
Wireless networks are inherently more vulnerable than their wired counterparts. In addition, complications arise in the presence of node mobility and dynamic network topology....
Multidisciplinary Perspectives in Cryptology and Information Security
Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas. © 2014. 443 pages.
With the prevalence of digital information, IT professionals have encountered new challenges regarding data security. In an effort to address these challenges and offer solutions...
Multidisciplinary in Cryptology
Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas. © 2014. 28 pages.
To reach the high depths of knowledge and expertise that are required nowadays, scientists focus their attention on minute areas of study. However, the most complex problems...
Chaos-Based Cryptography for Voice Secure Wireless Communication
Sattar B. Sadkhan Al Maliky, Rana Saad. © 2014. 36 pages.
Chaos theory was originally developed by mathematicians and physicists. The theory deals with the behaviors of nonlinear dynamic systems. Chaos theory has desirable features...
Fuzzy Logic-Based Security Evaluation of Stream Cipher
Sattar B. Sadkhan Al Maliky, Sabiha F. Jawad. © 2014. 22 pages.
The main aim of this chapter is to provide a security evaluation method based on fuzzy logic “for a pseudo-random sequences used (mainly) in stream cipher systems. The designed...
ICA and PCA-Based Cryptology
Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas. © 2014. 18 pages.
Blind Source Separation (BSS) represented by Independent Component Analysis (ICA) has been used in many fields such as communications and biomedical engineering. Its application...
RSA-Public Key Cryptosystems Based on Quadratic Equations in Finite Field
Sattar B. Sadkhan Al Maliky, Luay H. Al-Siwidi. © 2014. 21 pages.
The importance of Public Key Cryptosystems (PKCs) in the cryptography field is well known. They represent a great revolution in this field. The PKCs depend mainly on mathematical...