Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supervised Machine Learning: A Survey., , and . CommNet, page 1-10. IEEE, (2021)A Practical Sensors Software to Manage Fault Signals' Impact., , , , and . EUSPN/ICTH, volume 141 of Procedia Computer Science, page 207-214. Elsevier, (2018)Security on Blockchain Technology., , , and . CommNet, page 1-7. IEEE, (2020)A TinyDL Model for Gesture-Based Air Handwriting Arabic Numbers and Simple Arabic Letters Recognition., , , , , and . IEEE Access, (2024)An Intelligent Anti-cheating Model in Education Exams., , , , and . CommNet, page 1-6. IEEE, (2022)Fast Modular Exponentiation Methods for Public-Key Cryptography., , , , , and . CommNet, page 1-6. IEEE, (2022)IoT security: challenges and countermeasures., , , , and . EUSPN/ICTH, volume 177 of Procedia Computer Science, page 503-508. Elsevier, (2020)MultiPrime Cloud-RSA Scheme to Promote Data Confidentiality in the Cloud Environment., , and . SCA, volume 37 of Lecture Notes in Networks and Systems, page 445-452. Springer, (2017)Securely Adapt a Paillier Encryption Scheme to Protect the Data Confidentiality in the Cloud Environment., , and . BDAW, page 57:1-57:3. ACM, (2016)Can hybrid Homomorphic Encryption schemes be practical?, , and . ICMCS, page 294-298. IEEE, (2016)