1. AlKhodaidi T, Gutub A (2020) Trustworthy target key alteration helping counting-based secret sharing applicability. Arab J Sci Eng 45:3403–3423
2. Alotaibi M, Al-hendi D, Alroithy B, AlGhamdi M, Gutub A (2019) Secure mobile computing authentication utilizing hash, cryptography and steganography combination. J Inf Secur Cybercrimes Res (JISCR) 2(1):9–20
3. Gutub A, Al-Haidari F, Al-Kahsah K, Hamodi J (2010) E-text watermarking: Utilizing “Kashida” extensions in Arabic language electronic writing. J Emerg Technol Web Intell (JETWI) 2(1):48–55
4. Almazrooie M, Samsudin A, Gutub A, Salleh MS, Omar MA, Hassan SA (2020) Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. J King Saud Univ Comput Inf Sci 32(1):24–34
5. Alassaf N, Gutub A (2019) Simulating light-weight-cryptography implementation for IoT Healthcare data security applications. Int J E-Health Med Commun (IJEHMC) 10(4):1–15