1. AlAhmad, Mohammad A., Imad, Alshaikhli, Amal E. Alduwaikh, 2013. A new fragile digital watermarking technique for a PDF digital Holy Quran. In: Proceedings of the 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT ’13). IEEE Computer Society, Washington, DC, USA, pp. 250–253. doi: https://doi.org/10.1109/ACSAT.2013.56.
2. AlAhmad, Mohammad A., Imad, Fakhri Alshaikhli, 2014. Design and analysis of a new hash function gear. In: Proceedings of the 7th International Conference on Security of Information and Networks (SIN ’14). ACM, New York, NY, USA, pp. 128, pp. 9. doi: https://doi.org/10.1145/2659651.2659652.
3. Verification of Qur’anic Quotations Embedded in Online Arabic and Islamic Websites;Alginahi;Int. J. Islamic Appl. Comput. Sci. Technol. [S.l.],2013
4. Alshareef, A., Saddik, A.E., 2012. A Quranic quote verification algorithm for verses authentication. In: 2012 International Conference on Innovations in Information Technology (IIT), Abu Dhabi, pp. 339–343. doi: https://doi.org/10.1109/INNOVATIONS.2012.6207762, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6207762&isnumber=6207707.
5. Online integrity and authentication checking for Quran electronic versions;Alsmadi;Appl. Comput. Inf.,2015