Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

More efficient key-hash based fingerprint remote authentication scheme using mobile device., , and . Computing, 96 (9): 793-816 (2014)A hybrid forecasting model for enrollments based on aggregated fuzzy time series and particle swarm optimization., , , , , , , and . Expert Syst. Appl., 38 (7): 8014-8023 (2011)Using Sorted Switching Median Filter to remove high-density impulse noises., , , , , , and . J. Visual Communication and Image Representation, 24 (7): 956-967 (2013)Mutual funds trading strategy based on particle swarm optimization., , , , , , , , and . Expert Syst. Appl., 38 (6): 7582-7602 (2011)Cryptanalysis of a key agreement protocol based on chaotic Hash., and . IJESDF, 5 (3/4): 172-177 (2013)Bio-chaotic Stream Cipher-Based Iris Image Encryption., , , and . CSE (2), page 739-744. IEEE Computer Society, (2009)Guest editorial for special issue on biometric systems and applications.. Telecommunication Systems, 47 (3-4): 183-184 (2011)On the Security of a RSA-based Certificateless Signature Scheme., , and . I. J. Network Security, 16 (1): 78-80 (2014)A hybrid particle swarm optimization algorithm for high-dimensional problems., , , and . Computers & Industrial Engineering, 61 (4): 1117-1122 (2011)Using Arabic CAPTCHA for Cyber Security., , , , and . FGIT-SecTech/DRBC, volume 122 of Communications in Computer and Information Science, page 8-17. Springer, (2010)