Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms., , and . J. Inf. Secur. Appl., (August 2023)A Deep Learning Scheme for Efficient Multimedia IoT Data Compression., , and . CoRR, (2021)An efficient and secure cipher scheme for MIMO-OFDM systems based on physical layer security., , and . Telecommun. Syst., 79 (1): 17-32 (2022)Design and realization of efficient & secure multi-homed systems based on random linear network coding., , , and . Comput. Networks, (2019)Overview of Digital Forensics and Anti-Forensics Techniques., , and . ISDFS, page 1-5. IEEE, (2020)A Single-Pass and One-Round Message Authentication Encryption for Limited IoT Devices., , , and . IEEE Internet Things J., 9 (18): 17885-17900 (2022)Efficient and secure multi-homed systems based on binary random linear network coding., , and . Comput. Electr. Eng., (2020)Physical layer security schemes for MIMO systems: an overview., , , and . Wirel. Networks, 26 (3): 2089-2111 (2020)Overview of Efficient Symmetric Cryptography: Dynamic vs Static Approaches., , and . ISDFS, page 1-6. IEEE, (2020)Machine Learning for Physical Layer Security: Limitations, Challenges and Recommendation., , , and . SITIS, page 53-60. IEEE, (2022)