Author of the publication

POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation.

, , and . CCS, page 1745-1747. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications., , and . J. Inf. Secur. Appl., (2017)LoRaWAN security survey: Issues, threats and possible mitigation techniques., , , , and . Internet Things, (2020)One round cipher algorithm for multimedia IoT devices., , , , , and . Multim. Tools Appl., 77 (14): 18383-18413 (2018)Simultaneous encryption and authentication of messages over GPUs., , and . Multim. Tools Appl., 83 (2): 4757-4789 (January 2024)A new efficient lightweight and secure image cipher scheme., , , , , and . Multim. Tools Appl., 77 (12): 15457-15484 (2018)Fault Diagnosis and Fault-Tolerant Control Strategy for the Aerosonde UAV., , and . IEEE Trans. Aerosp. Electron. Syst., 47 (3): 2119-2137 (2011)Securing JPEG-2000 images in constrained environments: a dynamic approach., , and . Multim. Syst., 24 (6): 669-694 (2018)A variant of Baptista's encryption scheme., , and . Secur. Commun. Networks, 8 (18): 3701-3712 (2015)A Revision of a New Chaos-Based Image Encryption System: Weaknesses and Limitations., , and . CoRR, (2017)Fault detection on non linear systems described by multiple linearized models., , and . ECC, page 1219-1225. IEEE, (1999)