Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Wael Adi
2010 – today
- 2013
[c20]Marc Fyrbiak, Christan Kison, Marc Jeske, Wael Adi: Combined HW-SW adaptive clone-resistant functions as physical security anchors. AHS 2013: 130-137- 2012
[c19]- 2011
[c18]- 2010
[j2]Rachid Benlamri, Wael Adi, Ali Al-Qayedi, Ali M. Dawood: Secure human face authentication for mobile e-government transactions. IJMC 8(1): 71-87 (2010)
[c17]
[c16]Wael Adi, Khaled Benkrid: Ultimate design security in self-reconfiguring non-volatile environments. AHS 2010: 230-234
[e1]Samir Kumar Bandyopadhyay, Wael Adi, Tai-Hoon Kim, Yang Xiao (Eds.): Information Security and Assurance - 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings. Communications in Computer and Information Science 76, Springer 2010, ISBN 978-3-642-13364-0
2000 – 2009
- 2009
[c15]
[c14]Wael Adi: Autonomous Physical Secret Functions and Clone-Resistant Identification. BLISS 2009: 83-88
[c13]Wael Adi, Noureddine Ouertani, Abdulrahman Hanoun, Bassel Soudan: Deploying FPGA self-configurable cell structure for micro crypto-functions. ISCC 2009: 348-354
[c12]Wael Adi, Nizar Kassab: Hardware architecture for trustable vehicular electronic control units. IWCMC 2009: 437-441- 2008
[c11]- 2007
[c10]Wael Adi, Bassel Soudan: Bio-Inspired Electronic-Mutation with genetic properties for Secured Identification. BLISS 2007: 133-136
[c9]- 2006
[c8]Abdulrahman Hanoun, Wael Adi, Friedrich Mayer-Lindenberg, Bassel Soudan: Fuzzy modular multiplication architecture and low complexity IPR-protection for FPGA technology. FPT 2006: 325-328
[c7]Wael Adi, Rolf Ernst, Bassel Soudan, Abdulrahman Hanoun: VLSI Design Exchange with Intellectual Property Protection in FPGA Environment Using both Secret and Public-Key Cryptography. ISVLSI 2006: 24-32- 2005
[c6]Bassel Soudan, Wael Adi, Abdulrahman Hanoun: Novel secret-key IPR protection in FPGA environment. SoCC 2005: 267-270
[c5]Wael Adi, Khaled E. A. Negm, Ali Mabrouk, H. Ghraieb: Authenticated Mobile Device Proxy Service. WEC (5) 2005: 114-119- 2004
[c4]Ali Al-Qayedi, Wael Adi, Ahmed Zahro, Ali Mabrouk: Combined Web/mobile authentication for secure Web access control. WCNC 2004: 677-681
[c3]Wael Adi, Ali Al-Qayedi, Abdulkarim Al Zarooni, Ali Mabrouk: Secured multi-identity mobile infrastructure and offline mobile-assisted micro-payment application. WCNC 2004: 879-882- 2001
[c2]Mohamed Al-Ibrahim, Mehmet Savsar, Wael Adi: A Security Analysis for Label Switching Routers. AICCSA 2001: 526-530
[c1]Wael Adi, Mondher Ben-Aoun, Nizar Kassab: Variable Redundancy Coding for Mobile Channels. ISCC 2001: 580-584
1980 – 1989
- 1984
[j1]Wael Adi: Fast Burst Error-Correction Scheme with Fire Code. IEEE Trans. Computers 33(7): 613-618 (1984)
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:19 CEST by the dblp team



