Publications

Export 7 results:
Sort by: Author [ Title  (Asc)] Type Year
A B C D E F G H I J [K] L M N O P Q R S T U V W X Y Z   [Show ALL]
K
Ghany, K. K. A., H. A. Hefny, A. E. Hassanien, and M. F. Tolba, "Kekre's transform for protecting fingerprint template", Hybrid Intelligent Systems (HIS), 2013 13th International Conference on: IEEE, pp. 185–190, 2013. Abstract
n/a
KAMAL, K. A. R. E. E. M., H. Hefny, A. E. Hassanien, and M. Tolba, "Kekre’s Transform for Protecting Fingerprint Template.", 13th IEEE International Conference on Hybrid Intelligent Systems |(HIS13) Tunisia, 4-6 Dec. pp. 186-191, 2013, Tunisia, , 4-6 Dec, 2013.
Fouad, M. M. M., and A. E. Hassanien, "Key pre-distribution techniques for WSN security services", Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations: Springer Berlin Heidelberg, pp. 265–283, 2014. Abstract
n/a
Ghnaim, W. A. - E., N. I. Ghali, and A. E. Hassanien, "Known-ciphertext cryptanalysis approach for the Data Encryption Standard technique", Computer Information Systems and Industrial Management Applications (CISIM), 2010 International Conference on: IEEE, pp. 600–603, 2010. Abstract
n/a
Ghnaim, W. A. - E., N. I. Ghali, and A. E. Hassanien, "Known-ciphertext cryptanalysis approach for the Data Encryption Standard technique", Computer Information Systems and Industrial Management Applications (CISIM), 2010 International Conference on: IEEE, pp. 600–603, 2010. Abstract
n/a
Abd-Elmonim, W. G., N. I. Ghali, A. E. Hassanien, and A. Abraham, "Known-plaintext attack of DES-16 using Particle Swarm Optimization", Nature and Biologically Inspired Computing (NaBIC), 2011 Third World Congress on: IEEE, pp. 12–16, 2011. Abstract
n/a
Abd-Elmonim, W. G., N. I. Ghali, A. E. Hassanien, and A. Abraham, "Known-plaintext attack of DES-16 using Particle Swarm Optimization", Nature and Biologically Inspired Computing (NaBIC), 2011 Third World Congress on: IEEE, pp. 12–16, 2011. Abstract
n/a