Author of the publication

On the Hardware Implementation Performance, of Face Recognition Techniques, for Digital Forensics.

, , and . SSCC, volume 1208 of Communications in Computer and Information Science, page 272-285. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptographic technologies and protocol standards for Internet of Things., , and . Internet Things, (2021)Access Control in Networks Hierarchy: Implementation of Key Management Protocol., and . Int. J. Netw. Secur., 1 (2): 103-109 (2005)C(I)SO, And Now What? How to Successfully Build Security by Design, by Oberlaender, M. S.CreateSpace Independent Publishing Platform, 2013, 102p., $36.99. ISBN 1480237418.. Inf. Secur. J. A Glob. Perspect., 22 (4): 203 (2013)Open Mobile Alliance (OMA) Security Layer: Architecture, Implementation and Performance Evaluation of the Integrity Unit., , , and . New Gener. Comput., 23 (1): 77-100 (2004)Comparison of the Hardware Implementation of Stream Ciphers., , , , and . Int. Arab J. Inf. Technol., 2 (4): 267-274 (2005)Networking Data Integrity: High Speed Architectures and Hardware Implementations., , and . Int. Arab J. Inf. Technol., (2003)Network on Privacy-Aware Audio-and Video-Based Applications for Active and Assisted Living: GoodBrother Project., , and . DSD, page 748-753. IEEE, (2022)A low power fault secure timer implementation based on the Gray encoding scheme., , , and . ICECS, page 537-540. IEEE, (2002)Secure and Efficient RNS Software Implementation for Elliptic Curve Cryptography., , and . EuroS&P Workshops, page 86-93. IEEE, (2017)Side Channel Assessment Platforms and Tools for Ubiquitous Systems., , and . Security of Ubiquitous Computing Systems, Springer International Publishing, (2021)