Publications

Export 7 results:
Sort by: Author Title [ Type  (Desc)] Year
Conference Paper
Ghany, K. K. A., H. A. Hefny, A. E. Hassanien, and M. F. Tolba, "Kekre's transform for protecting fingerprint template", Hybrid Intelligent Systems (HIS), 2013 13th International Conference on: IEEE, pp. 185–190, 2013. Abstract
n/a
KAMAL, K. A. R. E. E. M., H. Hefny, A. E. Hassanien, and M. Tolba, "Kekre’s Transform for Protecting Fingerprint Template.", 13th IEEE International Conference on Hybrid Intelligent Systems |(HIS13) Tunisia, 4-6 Dec. pp. 186-191, 2013, Tunisia, , 4-6 Dec, 2013.
Ghnaim, W. A. - E., N. I. Ghali, and A. E. Hassanien, "Known-ciphertext cryptanalysis approach for the Data Encryption Standard technique", Computer Information Systems and Industrial Management Applications (CISIM), 2010 International Conference on: IEEE, pp. 600–603, 2010. Abstract
n/a
Ghnaim, W. A. - E., N. I. Ghali, and A. E. Hassanien, "Known-ciphertext cryptanalysis approach for the Data Encryption Standard technique", Computer Information Systems and Industrial Management Applications (CISIM), 2010 International Conference on: IEEE, pp. 600–603, 2010. Abstract
n/a
Abd-Elmonim, W. G., N. I. Ghali, A. E. Hassanien, and A. Abraham, "Known-plaintext attack of DES-16 using Particle Swarm Optimization", Nature and Biologically Inspired Computing (NaBIC), 2011 Third World Congress on: IEEE, pp. 12–16, 2011. Abstract
n/a
Abd-Elmonim, W. G., N. I. Ghali, A. E. Hassanien, and A. Abraham, "Known-plaintext attack of DES-16 using Particle Swarm Optimization", Nature and Biologically Inspired Computing (NaBIC), 2011 Third World Congress on: IEEE, pp. 12–16, 2011. Abstract
n/a
Book Chapter
Fouad, M. M. M., and A. E. Hassanien, "Key pre-distribution techniques for WSN security services", Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations: Springer Berlin Heidelberg, pp. 265–283, 2014. Abstract
n/a
Tourism