Ali A. Kanso

Orcid: 0000-0002-4366-841X

According to our database1, Ali A. Kanso authored at least 30 papers between 2003 and 2025.

Collaborative distances:

Timeline

2005
2010
2015
2020
2025
0
1
2
3
4
5
2
1
2
1
3
1
1
2
3
2
1
1
4
4
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
On the second-order Wiener ratios of iterated line graphs.
Comput. Appl. Math., February, 2025

Graphs having two main eigenvalues and arbitrarily many distinct vertex degrees.
Appl. Math. Comput., 2025

2022
On Hosoya's dormants and sprouts.
Appl. Math. Comput., 2022

2020
Efficient Image Encryption Scheme Based on 4-Dimensional Chaotic Maps.
Informatica, 2020

A Lossless Linear Algebraic Secret Image Sharing Scheme.
Informatica, 2020

2019
A novel efficient image encryption scheme based on chained skew tent maps.
Neural Comput. Appl., 2019

2018
A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation.
Multim. Tools Appl., 2018

A novel secret image sharing scheme using large primes.
Multim. Tools Appl., 2018

An efficient lossless secret sharing scheme for medical images.
J. Vis. Commun. Image Represent., 2018

2017
An efficient (t, n)-threshold secret image sharing scheme.
Multim. Tools Appl., 2017

2016
Open quipus with the same Wiener index as their quadratic line graph.
Appl. Math. Comput., 2016

2015
A variant of Baptista's encryption scheme.
Secur. Commun. Networks, 2015

An efficient and robust image encryption scheme for medical applications.
Commun. Nonlinear Sci. Numer. Simul., 2015

2014
An image encryption scheme based on irregularly decimated chaotic maps.
Signal Process. Image Commun., 2014

A blind chaos-based watermarking technique.
Secur. Commun. Networks, 2014

A robust chaotic algorithm for digital image steganography.
Commun. Nonlinear Sci. Numer. Simul., 2014

2013
A concurrent key exchange protocol based on commuting matrices.
Concurr. Comput. Pract. Exp., 2013

A fast and efficient chaos-based keyed hash function.
Commun. Nonlinear Sci. Numer. Simul., 2013

2012
Keyed hash function based on a chaotic map.
Inf. Sci., 2012

2011
Cryptosystems based on continued fractions.
Secur. Commun. Networks, 2011

2010
Cipher Systems Based on Controlled Exact Chaotic Maps.
Int. J. Bifurc. Chaos, 2010

Controlled Henon System and its Cryptographic Applications.
Int. J. Bifurc. Chaos, 2010

Modified self-shrinking generator.
Comput. Electr. Eng., 2010

Encryption System with Variable Number of Registers.
Comput. Electr. Eng., 2010

2009
Irregularly Decimated Chaotic Map(S) for Binary Digits Generations.
Int. J. Bifurc. Chaos, 2009

Search-Based Chaotic Pseudorandom Bit Generator.
Int. J. Bifurc. Chaos, 2009

Modified clock-controlled alternating step generators.
Comput. Commun., 2009

An efficient cryptosystem Delta for stream cipher applications.
Comput. Electr. Eng., 2009

2004
More Generalized Clock-Controlled Alternating Step Generator.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Clock-Controlled Shrinking Generator of Feedback Shift Registers.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003


  Loading...