Wael Adi
According to our database1,
Wael Adi
authored at least 58 papers
between 1984 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2021
Cryptogr., 2021
Clone-Resistant Secured Booting Based on Unknown Hashing Created in Self-Reconfigurable Platform.
Proceedings of the Applied Reconfigurable Computing. Architectures, Tools, and Applications, 2021
2020
Cryptogr., 2020
Low-Complexity Nonlinear Self-Inverse Permutation for Creating Physically Clone-Resistant Identities.
Cryptogr., 2020
2019
Cryptogr., 2019
Cryptogr., 2019
CoRR, 2019
Proceedings of the 42nd International Convention on Information and Communication Technology, 2019
Proceedings of the 42nd International Convention on Information and Communication Technology, 2019
Proceedings of the Eighth International Conference on Emerging Security Technologies, 2019
2018
Physical and Mechatronic Security, Technologies and Future Trends for Vehicular Environment.
CoRR, 2018
Proceedings of the Information and Operational Technology Security Systems, 2018
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018
Proceedings of the 2018 NASA/ESA Conference on Adaptive Hardware and Systems, 2018
Proceedings of the 2018 NASA/ESA Conference on Adaptive Hardware and Systems, 2018
Proceedings of the 2018 NASA/ESA Conference on Adaptive Hardware and Systems, 2018
2017
Proceedings of the Seventh International Conference on Emerging Security Technologies, 2017
Proceedings of the Seventh International Conference on Emerging Security Technologies, 2017
Proceedings of the Seventh International Conference on Emerging Security Technologies, 2017
Proceedings of the Seventh International Conference on Emerging Security Technologies, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2015
Proceedings of the Sixth International Conference on Emerging Security Technologies, 2015
Proceedings of the Sixth International Conference on Emerging Security Technologies, 2015
Improving System Reliability by Joint Usage of Hash Function Bits and Error Correction Coding.
Proceedings of the Sixth International Conference on Emerging Security Technologies, 2015
2014
Proceedings of the Fifth International Conference on Emerging Security Technologies, 2014
2013
Proceedings of the 21st IEEE/IFIP International Conference on VLSI and System-on-Chip, 2013
Proceedings of the IEEE International Conference on Communications, 2013
Proceedings of the Fourth International Conference on Emerging Security Technologies, 2013
Proceedings of the 2013 NASA/ESA Conference on Adaptive Hardware and Systems, 2013
2012
Proceedings of the 2012 NASA/ESA Conference on Adaptive Hardware and Systems, 2012
2011
Proceedings of the 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2011
2010
Int. J. Mob. Commun., 2010
Proceedings of the 2010 NASA/ESA Conference on Adaptive Hardware and Systems, 2010
Proceedings of the 2010 NASA/ESA Conference on Adaptive Hardware and Systems, 2010
2009
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009
Proceedings of the 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, 2009
Proceedings of the 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, 2009
2008
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008
Proceedings of the 2008 ECSIS Symposium on Bio-inspired, 2008
2007
Proceedings of the 9th International Symposium on Signal Processing and Its Applications, 2007
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007
2006
VLSI Design Exchange with Intellectual Property Protection in FPGA Environment Using both Secret and Public-Key Cryptography.
Proceedings of the 2006 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2006), 2006
Fuzzy modular multiplication architecture and low complexity IPR-protection for FPGA technology.
Proceedings of the 2006 IEEE International Conference on Field Programmable Technology, 2006
2005
Authenticated Mobile Device Proxy Service.
Proceedings of the Third World Enformatika Conference, 2005
Proceedings of the Proceedings 2005 IEEE International SOC Conference, 2005
2004
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004
Secured multi-identity mobile infrastructure and offline mobile-assisted micro-payment application.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004
2003
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003
A protection mechanism for intellectual property rights (IPR) in FPGA design environment.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003
2001
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001
Proceedings of the 2001 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2001), 2001
1985
Proceedings of the Messung, 1985
1984