Author of the publication

On the Hardware Implementation Performance, of Face Recognition Techniques, for Digital Forensics.

, , and . SSCC, volume 1208 of Communications in Computer and Information Science, page 272-285. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Open Mobile Alliance (OMA) Security Layer: Architecture, Implementation and Performance Evaluation of the Integrity Unit., , , and . New Gener. Comput., 23 (1): 77-100 (2004)Cryptographic technologies and protocol standards for Internet of Things., , and . Internet Things, (2021)Access Control in Networks Hierarchy: Implementation of Key Management Protocol., and . Int. J. Netw. Secur., 1 (2): 103-109 (2005)Comparison of the Hardware Implementation of Stream Ciphers., , , , and . Int. Arab J. Inf. Technol., 2 (4): 267-274 (2005)Networking Data Integrity: High Speed Architectures and Hardware Implementations., , and . Int. Arab J. Inf. Technol., (2003)C(I)SO, And Now What? How to Successfully Build Security by Design, by Oberlaender, M. S.CreateSpace Independent Publishing Platform, 2013, 102p., $36.99. ISBN 1480237418.. Inf. Secur. J. A Glob. Perspect., 22 (4): 203 (2013)Side Channel Assessment Platforms and Tools for Ubiquitous Systems., , and . Security of Ubiquitous Computing Systems, Springer International Publishing, (2021)Network on Privacy-Aware Audio-and Video-Based Applications for Active and Assisted Living: GoodBrother Project., , and . DSD, page 748-753. IEEE, (2022)A low power fault secure timer implementation based on the Gray encoding scheme., , , and . ICECS, page 537-540. IEEE, (2002)BLAKE HASH Function Family on FPGA: From the Fastest to the Smallest., and . ISVLSI, page 139-142. IEEE Computer Society, (2010)