Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Salah Eldin S. E. Abdulrahman"'
Autor:
Walid El-Shafai, Samia M. Abd-Alhalem, El-Sayed M. El-Rabaie, Naglaa F. Soliman, N. Ismaiel, Fathi E. Abd El-Samie, Salah Eldin S. E. Abdulrahman, Abeer D. Algarni
Publikováno v:
Computers, Materials & Continua. 71:1613-1623
Autor:
Walid El-Shafai, N. Ismaiel, Samia M. Abd-Alhalem, Fathi E. Abd El-Samie, Abeer D. Algarni, El-Sayed M. El-Rabaie, Naglaa F. Soliman, Salah Eldin S. E. Abdulrahman
Publikováno v:
Computers, Materials & Continua. 70:5907-5927
Autor:
Naglaa. F. Soliman, Samia M. Abd Alhalem, Walid El-Shafai, Salah Eldin S. E. Abdulrahman, N. Ismaiel, El-Sayed M. El-Rabaie, Abeer D. Algarni, Fatimah Algarni, Fathi E. Abd El-Samie
Publikováno v:
Intelligent Automation & Soft Computing. 33:103-116
Autor:
Nabil A. Ismail, El-Sayed M. El-Rabaie, Naglaa F. Soliman, Salah Eldin S. E. Abdulrahman, Samia M. Abd –Alhalem, Fathi E. Abd El-Samie
Publikováno v:
Menoufia Journal of Electronic Engineering Research. 30:41-51
Deep learning (DL) methods have beenachieving amazing results in solving a variety ofproblems in many different fields especially in the areaof big data. With the advances of the big data era inbioinformatics, applying DL techniques, the DNAsequences
Publikováno v:
Menoufia Journal of Electronic Engineering Research. 29:106-118
An Elliptic Curve Crypto-Processor (ECCP) is a favorite public-key cryptosystem due to its small key size and its high security arithmetic unit. It is applied in constrained devices which often run on batteries and have limited processing, storage ca
Publikováno v:
Menoufia Journal of Electronic Engineering Research. 28:387-394
Security in embedded systems are presented in this work based on Elliptic Curve crypto-processor (ECCP). Comparison with state-of-the-art algorithms that have been used to implement ECCP are also presented. It proves that Montgomery ladder algorithm
Publikováno v:
Journal of Physics: Conference Series. 1447:012046
An Elliptic Curve Crypto-Processor (ECCP) is a favourite public-key cryptosystem. It is used for embedded systems due to its small key size and its high security arithmetic unit. It is applied in constrained devices which often run on batteries and h
Autor:
Ali, Hesham A.1,2 h_arafat_ali@mans.edu.eg, Osama, Rana1, Mohamed, Raneem1, Mahmoud, Esraa1, Abd-Alhalem, Samia M.1, Takieldeen, Ali E.1
Publikováno v:
Delta University Scientific Journal. Sep2023, Vol. 6 Issue 2, p277-286. 10p.
Publikováno v:
Journal of Physics: Conference Series; 2020, Vol. 1447 Issue 1, p1-1, 1p