Search

Your search keyword '"Yasmine Abouelseoud"' showing total 32 results

Search Constraints

Start Over You searched for: Author "Yasmine Abouelseoud" Remove constraint Author: "Yasmine Abouelseoud" Topic business Remove constraint Topic: business
32 results on '"Yasmine Abouelseoud"'

Search Results

1. Privacy preserving search index for image databases based on SURF and order preserving encryption

2. New video encryption schemes based on chaotic maps

3. A Symmetric Key Dynamic Gates Encryption Algorithm Based on Quantum Computing

4. A New 16 Bit Symmetric Key Quantum Encryption Algorithm Based On Dynamic Pauli Gates

5. Effect of chosen features on performance of privacy preserving image retrieval systems

6. An optimized general target channel sequence for prioritized cognitive radio networks

7. An Improvement to the Set Protocol Based on Signcryption

8. Two-Phase Image Encryption Scheme Based on FFCT and Fractals

9. An Optimized Hybrid Approach for Spectrum Handoff in Cognitive Radio Networks With Non-Identical Channels

10. Text Hiding in a Digital Cover Image using Two Dimensional Indexing based on Chaotic Maps

11. Data hiding in a digital cover image using chaotic maps and LSB technique

12. Optimal capacitor placement and sizing in radial electric power systems

13. An Efficient Off-Line E-Cash System based on Signcryption without Bilinear Pairings

14. An Improved Authentication Protocol for Mobile Communication based on Tripartite Signcryption

15. ArMTFr: a new permutation-based image encryption scheme

16. Avoiding Key Off-Set attack in a Pairing-Free Certificateless Key Agreement Protocol based on ECC

17. A heuristics-based solution to the continuous berth allocation and crane assignment problem

18. A Tripartite Signcryption Scheme with Applications to E-Commerce

19. A secure geographical routing protocol for highly-dynamic aeronautical networks

20. Dual cycle mode scheduling of internal transfer in container terminals using a Genetic Algorithm

21. New blind signcryption schemes with application to E-cash systems

22. Extension and application of El-Gamal encryption scheme

23. An efficient identity-based signeryption scheme without bilinear pairings

24. An Optimized, Authenticated Key Distribution Protocol for Optical Channels

25. MIDSCYK: An efficient provably secure multi-recipient identity-based signcryption scheme

26. Privacy protecting digital payment system using ID-based blind signatures with anonymity revocation trustees

27. A Scalable Trace and Revoke Scheme with Security Enhancements

28. A new blind identity-based signature scheme

29. A new multi-recipient tree-based signcryption scheme

30. Digital Rights Management system design and implementation issues

31. A new biometrics-based authentication protocol for smart card applications

32. A new proxy signcryption scheme using warrants

Catalog

Books, media, physical & digital resources