|
Search the dblp DataBase
Wael Adi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Mohamed Al-Ibrahim, Mehmet Savsar, Wael Adi
A Security Analysis for Label Switching Routers. [Citation Graph (0, 0)][DBLP] AICCSA, 2001, pp:526-530 [Conf]
- Wael Adi, Mondher Ben-Aoun, Nizar Kassab
Variable Redundancy Coding for Mobile Channels. [Citation Graph (0, 0)][DBLP] ISCC, 2001, pp:580-584 [Conf]
- Wael Adi, Rolf Ernst, Bassel Soudan, Abdulrahman Hanoun
VLSI Design Exchange with Intellectual Property Protection in FPGA Environment Using both Secret and Public-Key Cryptography. [Citation Graph (0, 0)][DBLP] ISVLSI, 2006, pp:24-32 [Conf]
- Wael Adi
Fast Burst Error-Correction Scheme with Fire Code. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1984, v:33, n:7, pp:613-618 [Journal]
Deploying FPGA self-configurable cell structure for micro crypto-functions. [Citation Graph (, )][DBLP]
Hardware architecture for trustable vehicular electronic control units. [Citation Graph (, )][DBLP]
Bio-Inspired Electronic-Mutation with genetic properties for Secured Identification. [Citation Graph (, )][DBLP]
Clone-Resistant DNA-Like Secured Dynamic Identity. [Citation Graph (, )][DBLP]
Autonomous Physical Secret Functions and Clone-Resistant Identification. [Citation Graph (, )][DBLP]
Mechatronic Security and Robot Authentication. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.001secs
|