Search

Your search keyword '"Ghouzali, Sanaa"' showing total 32 results

Search Constraints

Start Over You searched for: Author "Ghouzali, Sanaa" Remove constraint Author: "Ghouzali, Sanaa" Search Limiters Academic (Peer-Reviewed) Journals Remove constraint Search Limiters: Academic (Peer-Reviewed) Journals
32 results on '"Ghouzali, Sanaa"'

Search Results

2. Multispectral Retinal Blood Vessel Analysis for Detecting Eye Diseases.

5. Context-Aware Pending Interest Table Management Scheme for NDN-Based VANETs.

6. Local steerable pyramid binary pattern sequence LSPBPS for face recognition method

7. Cancelable Multimodal Biometrics Based on Chaotic Maps.

8. Secure Image Authentication Using Watermarking and Blockchain.

9. ANDROID SECURE STORAGE APPLICATION USING FUZZY VAULT-BASED KEY BINDING.

10. Hybrid Multimodal Biometric Template Protection.

11. Android data storage security: A review.

12. Combining Watermarking and Hyper-Chaotic Map to Enhance the Security of Stored Biometric Templates.

14. Anonymity-preserving Reputation Management System for health sector.

15. Orchestrating an Effective Formulation to Investigate the Impact of EMSs (Energy Management Systems) for Residential Units Prior to Installation.

16. Balanced Transmissions Based Trajectories of Mobile Sink in Homogeneous Wireless Sensor Networks.

17. An Improved Forwarding of Diverse Events with Mobile Sinks in Underwater Wireless Sensor Networks.

18. Hybrid Multi-Biometric Template Protection Using Watermarking.

22. Biometric Cryptosystems based Fuzzy Commitment Scheme: A Security Evaluation.

23. From Mobile to Wearable System: A Wearable RFID System to Enhance Teaching and Learning Conditions.

24. Trace Attack against Biometric Mobile Applications.

25. Biometric Template Protection Using Spiral Cube: Performance and Security Analysis.

26. Challenges and solutions for Internet of Things Driven by IPv6.

28. Private chaotic biometric template protection algorithm.

29. Biometric cryptosystems based Fuzzy Vault approach: Security analysis.

30. Inter-Communication Classification for Multi-View Face Recognition.

31. Monitoring square and circular fields with sensors using energy-efficient cluster-based routing for underwater wireless sensor networks.

32. Fingerprint shell: Secure representation of fingerprint template.

Catalog

Books, media, physical & digital resources