Author of the publication

Study of security problem in cloud computing with access control based on the blockchain.

, , , and . ISIVC, page 1-6. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A progression strategy of proximal algorithm applied to the digital images inpainting., , and . ISIVC, page 282-285. IEEE, (2018)A robust minutia-based approach for securing fingerprint templates., , and . ISIVC, page 286-290. IEEE, (2018)Deep Validation of Spatial Temporal Features of Synthetic Mobility Models., , , , and . Comput., 7 (4): 71 (2018)Flaws Validation of Maze Mobility Model using Spatial-temporal Synthetic Mobility Metrics., , , , and . PECCS, page 106-112. ScitePress, (2019)Automatic detection of Moroccan coastal upwelling from chlorophyll-a concentration images using the Expectation-Maximization method., , and . ISIVC, page 1-5. IEEE, (2022)Delineation of Moroccan Coastal Upwelling Using The Principal Component Analysis Fusion Algorithm on SSC and SST Images., , , and . ISIVC, page 174-178. IEEE, (2018)FTSMAC: A Multi-Channel Hybrid Reader Collision Avoidance Protocol for RFID Network., , , and . J. Sens. Actuator Networks, 10 (3): 46 (2021)An improved method for accurate computation of coastal upwelling index using Sea Surface Temperature Images., , , , and . ISIVC, page 76-81. IEEE, (2018)Calculation of ambiguity functions with Fermat Number Transform., , , and . EUSIPCO, page 1-5. IEEE, (2008)Analysis of the ambiguity function for phase-coded waveforms., , , and . AICCSA, page 1-4. IEEE Computer Society, (2015)