Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Practical Sensors Software to Manage Fault Signals' Impact., , , , and . EUSPN/ICTH, volume 141 of Procedia Computer Science, page 207-214. Elsevier, (2018)Supervised Machine Learning: A Survey., , and . CommNet, page 1-10. IEEE, (2021)A TinyDL Model for Gesture-Based Air Handwriting Arabic Numbers and Simple Arabic Letters Recognition., , , , , and . IEEE Access, (2024)Security on Blockchain Technology., , , and . CommNet, page 1-7. IEEE, (2020)Fast Modular Exponentiation Methods for Public-Key Cryptography., , , , , and . CommNet, page 1-6. IEEE, (2022)IoT security: challenges and countermeasures., , , , and . EUSPN/ICTH, volume 177 of Procedia Computer Science, page 503-508. Elsevier, (2020)An Intelligent Anti-cheating Model in Education Exams., , , , and . CommNet, page 1-6. IEEE, (2022)MultiPrime Cloud-RSA Scheme to Promote Data Confidentiality in the Cloud Environment., , and . SCA, volume 37 of Lecture Notes in Networks and Systems, page 445-452. Springer, (2017)Securely Adapt a Paillier Encryption Scheme to Protect the Data Confidentiality in the Cloud Environment., , and . BDAW, page 57:1-57:3. ACM, (2016)Cloud-ElGamal: An efficient homomorphic encryption scheme., , and . WINCOM, page 63-66. IEEE, (2016)