Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SDR Implementation of WIFI Attacks Using GNURadio., , and . CSA, volume 513 of Lecture Notes in Networks and Systems, page 299-309. Springer, (2022)New hardware Cryptosystem based chaos for the secure real-time of embedded applications., , , and . SiPS, page 251-254. IEEE, (2011)Embedded hyperchaotic Lorenz generator for secure communications., , , and . NEWCAS, page 1-4. IEEE, (2013)Perceptual Masking Model Using Lifting Wavelet Transform for Fingerprint Images., , , and . CSA, volume 199 of Lecture Notes in Networks and Systems, page 175-184. Springer, (2020)Real time hardware implementation of a new Duffing's chaotic attractor., , , and . ICECS, page 559-562. IEEE, (2009)A lightweight efficient chaos-based cryptosystem for constrained-node networks., , , and . Int. J. Commun. Syst., (2020)Embedded Genesio-Tesi chaotic generator for ciphering communications., , , , and . CSNDSP, page 234-238. IEEE, (2010)A new image crypto-compression system SPIHT-PSCS., , , and . CoDIT, page 706-711. IEEE, (2014)Hyperchaos-Based Spreading Codes Generator for DS-CDMA Communication Systems., , and . Journal of Circuits, Systems, and Computers, 27 (13): 1850207:1-1850207:23 (2018)The impact of intentional interference on the performances of ML detector in MIMO systems., , and . Phys. Commun., (2022)