Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Elliptic curve cryptography on Windows CE devices., , , and . CONIELECOMP, page 224-229. IEEE, (2012)A performance comparison of elliptic curve scalar multiplication algorithms on smartphones., , , and . CONIELECOMP, page 114-119. IEEE, (2013)A novel strategy for image segmentation of latent fingerprints., , , and . CONIELECOMP, page 196-201. IEEE, (2012)Multi-hop broadcast message dissemination in vehicular ad hoc networks: A security perspective review., , , , , and . Int. J. Distributed Sens. Networks, (2017)A policy-based containerized filter for secure information sharing in organizational environments., , , , , and . Future Gener. Comput. Syst., (2019)FPGA-Based Assessment of Midori and Gift Lightweight Block Ciphers., , and . ICICS, volume 11149 of Lecture Notes in Computer Science, page 745-755. Springer, (2018)Revocation in attribute-based encryption for fog-enabled internet of things: A systematic survey., , and . Internet Things, (October 2023)A Hardware Architecture for Elliptic Curve Cryptography and Lossless Data Compression., and . CONIELECOMP, page 113-118. IEEE Computer Society, (2005)Novel FPGA-Based Low-Cost Hardware Architecture for the PRESENT Block Cipher., , and . DSD, page 646-650. IEEE Computer Society, (2016)A compact FPGA-based microcoded coprocessor for exponentiation in asymmetric encryption., , , , and . LASCAS, page 1-4. IEEE, (2017)