default search action
Wael Adi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j8]Emad Hamadaqa, Saleh Mulhem, Wael Adi, Mladen Berekovic:
Contemporary Physical Clone-Resistant Identity for IoTs and Emerging Technologies. Cryptogr. 5(4): 32 (2021) - 2020
- [j7]Emad Hamadaqa, Ayoub Mars, Wael Adi:
Physical Security for Fleet Management Systems. Cryptogr. 4(1): 1 (2020) - [j6]Saleh Mulhem, Ayoub Mars, Wael Adi:
Low-Complexity Nonlinear Self-Inverse Permutation for Creating Physically Clone-Resistant Identities. Cryptogr. 4(1): 6 (2020) - [j5]Mayssa Tayachi, Saleh Mulhem, Wael Adi, Laurent Nana, Anca Pascu, Faouzi Benzarti:
Tamper and Clone-Resistant Authentication Scheme for Medical Image Systems. Cryptogr. 4(3): 19 (2020) - 2019
- [j4]Ayoub Mars, Wael Adi:
New Family of Stream Ciphers as Physically Clone-Resistant VLSI-Structures. Cryptogr. 3(2): 11 (2019) - [j3]Saleh Mulhem, Wael Adi:
New Mathblocks-Based Feistel-Like Ciphers for Creating Clone-Resistant FPGA Devices. Cryptogr. 3(4): 28 (2019) - 2010
- [j2]Rachid Benlamri, Wael Adi, Ali Al-Qayedi, Ali M. Dawood:
Secure human face authentication for mobile e-government transactions. Int. J. Mob. Commun. 8(1): 71-87 (2010) - 1984
- [j1]Wael Adi:
Fast Burst Error-Correction Scheme with Fire Code. IEEE Trans. Computers 33(7): 613-618 (1984)
Conference and Workshop Papers
- 2021
- [c46]Randa Zarrouk, Saleh Mulhem, Wael Adi, Mladen Berekovic:
Clone-Resistant Secured Booting Based on Unknown Hashing Created in Self-Reconfigurable Platform. ARC 2021: 203-217 - 2019
- [c45]Saleh Mulhem, Mouadh Ayache, Wael Adi:
Mini-Block-Based Cipher Class for Physically Clone-Resistant Devices. EST 2019: 1-6 - [c44]Saleh Mulhem, Maen Mohammad, Wael Adi:
A New Low-Complexity Cipher Class for Clone-Resistant Identities. MIPRO 2019: 971-976 - [c43]Ayoub Mars, Wael Adi:
Fair Exchange and Anonymous E-Commerce by Deploying Clone-Resistant Tokens. MIPRO 2019: 1226-1231 - 2018
- [c42]Saleh Mulhem, Randa Zarrouk, Wael Adi:
Security and Complexity Bounds of SUC-Based Physical Identity. AHS 2018: 317-322 - [c41]Emad Hamadaqa, Saleh Mulhem, Ayoub Mars, Wael Adi:
Clone-Resistant Joint-Identity Technique for Securing Fleet Management Systems. AHS 2018: 327-332 - [c40]Ayoub Mars, Wael Adi:
New Concept for Physically-Secured E-Coins Circulations. AHS 2018: 333-338 - [c39]Emad Hamadaqa, Ahmad Abadleh, Ayoub Mars, Wael Adi:
Highly Secured Implantable Medical Devices. IIT 2018: 7-12 - [c38]Ayoub Mars, Wael Adi:
Clone-Resistant Entities for Vehicular Security. IIT 2018: 18-23 - [c37]Saleh Mulhem, Ayoub Mars, Wael Adi:
A Cipher Class Based on Golden S-Boxes for Creating Clone-Resistant Identities. IOSec@RAID 2018: 3-14 - 2017
- [c36]Mustafa Ayoob, Wael Adi, Vassilis Prevelakis:
Using Ciphers for Failure-Recovery in ITS Systems. ARES 2017: 98:1-98:7 - [c35]Vassilis Prevelakis, Wael Adi:
LS-ARP: A lightweight and secure ARP. EST 2017: 204-208 - [c34]Ayoub Mars, Wael Adi, Saleh Mulhem, Emad Hamadaqa:
Random stream cipher as a PUF-like identity in FPGA environment. EST 2017: 209-214 - [c33]Saleh Mulhem, Wael Adi, Ayoub Mars, Vassilis Prevelakis:
Chaining trusted links by deploying secured physical identities. EST 2017: 215-220 - [c32]Emad Hamadaqa, Ayoub Mars, Wael Adi, Saleh Mulhem:
Clone-resistant vehicular RKE by deploying SUC. EST 2017: 221-225 - 2015
- [c31]Mustafa Ayoob Basil, Wael Adi:
Improving System Reliability by Joint Usage of Hash Function Bits and Error Correction Coding. EST 2015: 1-6 - [c30]Mustafa Ayoob Basil, Wael Adi:
Fault Detection and Correction in Processing AES Encryption Algorithm. EST 2015: 7-12 - [c29]Marwa Saidi, Oussama Benrhouma, Wael Adi, Safya Belghith:
Combined Image Data Hiding Techniques in a Clone-Resistant SoC Environment. EST 2015: 24-29 - 2014
- [c28]Wael Adi, Shaza Zeitouni:
Obscured Asymmetric Crypto-Functions for Secured Identification. EST 2014: 71-76 - 2013
- [c27]Marc Fyrbiak, Christian Kison, Marc Jeske, Wael Adi:
Combined HW-SW adaptive clone-resistant functions as physical security anchors. AHS 2013: 130-137 - [c26]Marc Fyrbiak, Christian Kison, Wael Adi:
Construction of Software-Based Digital Physical Clone Resistant Functions. EST 2013: 109-112 - [c25]Mustafa Ayoob Basil, Wael Adi:
Unidirectional error correction by crypto functions. ICC Workshops 2013: 712-716 - [c24]Wael Adi, Shaza Zeitouni, X. Huang, Marc Fyrbiak, Christian Kison, Marc Jeske, Z. Alnahhas:
IP-core protection for a non-volatile Self-reconfiguring SoC environment. VLSI-SoC 2013: 252-255 - 2012
- [c23]Heinz Kreft, Wael Adi:
Cocoon-PUF, a novel mechatronic secure element technology. AHS 2012: 227-232 - 2011
- [c22]Wael Adi:
Resilient security system by deploying dynamic crypto-architectures. ICUMT 2011: 1-5 - 2010
- [c21]Wael Adi, Khaled Benkrid:
Adaptive and evolvable hardware security architectures. AHS 2010: 194-198 - [c20]Wael Adi, Khaled Benkrid:
Ultimate design security in self-reconfiguring non-volatile environments. AHS 2010: 230-234 - 2009
- [c19]Wael Adi:
Mechatronic Security and Robot Authentication. BLISS 2009: 77-82 - [c18]Wael Adi:
Autonomous Physical Secret Functions and Clone-Resistant Identification. BLISS 2009: 83-88 - [c17]Wael Adi, Noureddine Ouertani, Abdulrahman Hanoun, Bassel Soudan:
Deploying FPGA self-configurable cell structure for micro crypto-functions. ISCC 2009: 348-354 - [c16]Wael Adi, Nizar Kassab:
Hardware architecture for trustable vehicular electronic control units. IWCMC 2009: 437-441 - 2008
- [c15]Wael Adi:
Clone-Resistant DNA-Like Secured Dynamic Identity. BLISS 2008: 148-153 - [c14]Wael Adi, Bassel Soudan:
Globally verifiable clone-resistant device identity with mutual authentication. ICECS 2008: 222-225 - 2007
- [c13]Wael Adi, Bassel Soudan:
Bio-Inspired Electronic-Mutation with genetic properties for Secured Identification. BLISS 2007: 133-136 - [c12]Wael Adi, Bassel Soudan:
Electronic mutation technology and secured identification. ISSPA 2007: 1-4 - 2006
- [c11]Abdulrahman Hanoun, Wael Adi, Friedrich Mayer-Lindenberg, Bassel Soudan:
Fuzzy modular multiplication architecture and low complexity IPR-protection for FPGA technology. FPT 2006: 325-328 - [c10]Wael Adi, Rolf Ernst, Bassel Soudan, Abdulrahman Hanoun:
VLSI Design Exchange with Intellectual Property Protection in FPGA Environment Using both Secret and Public-Key Cryptography. ISVLSI 2006: 24-32 - 2005
- [c9]Bassel Soudan, Wael Adi, Abdulrahman Hanoun:
Novel secret-key IPR protection in FPGA environment. SoCC 2005: 267-270 - [c8]Wael Adi, Khaled E. A. Negm, Ali Mabrouk, Heykel Ghraieb:
Authenticated Mobile Device Proxy Service. WEC (5) 2005: 114-119 - 2004
- [c7]Ali Al-Qayedi, Wael Adi, Ahmed Zahro, Ali Mabrouk:
Combined Web/mobile authentication for secure Web access control. WCNC 2004: 677-681 - [c6]Wael Adi, Ali Al-Qayedi, Abdulkarim Al Zarooni, Ali Mabrouk:
Secured multi-identity mobile infrastructure and offline mobile-assisted micro-payment application. WCNC 2004: 879-882 - 2003
- [c5]Wael Adi, Bassel Soudan, Nizar Kassab:
A protection mechanism for intellectual property rights (IPR) in FPGA design environment. ICECS 2003: 92-95 - [c4]Khaled E. A. Negm, Wael Adi, Ali Mabrouk, Heykel Ghraieb:
Secured wireless ad-hoc network administration scheme. ICECS 2003: 1034-1037 - 2001
- [c3]Mohamed Al-Ibrahim, Mehmet Savsar, Wael Adi:
A Security Analysis for Label Switching Routers. AICCSA 2001: 526-530 - [c2]Wael Adi, Mondher Ben-Aoun, Nizar Kassab:
Variable Redundancy Coding for Mobile Channels. ISCC 2001: 580-584 - 1985
- [c1]Peter Mertinatsch, Wael Adi, Hans Christoph Zeidler:
Ein Harwaremonitor zur Messung der Busbelastung in einer Multiprozessoranordnung. MMB 1985: 82-98
Editorship
- 2010
- [e1]Samir Kumar Bandyopadhyay, Wael Adi, Tai-Hoon Kim, Yang Xiao:
Information Security and Assurance - 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings. Communications in Computer and Information Science 76, Springer 2010, ISBN 978-3-642-13364-0 [contents]
Informal and Other Publications
- 2021
- [i5]Ayoub Mars, Hussam Ghandour, Wael Adi:
SRAM-SUC: Ultra-Low Latency Robust Digital PUF. CoRR abs/2106.07105 (2021) - 2019
- [i4]Ayoub Mars, Wael Adi:
New Family of Stream Ciphers as Physically Clone-Resistant VLSI-Structures. CoRR abs/1901.05795 (2019) - [i3]Ayoub Mars, Wael Adi:
Digitally Mutating NV-FPGAs into Physically Clone-Resistant Units. CoRR abs/1908.03898 (2019) - [i2]Ayoub Mars, Ahmad Abadleh, Wael Adi:
Operator and Manufacturer Independent D2D Private Link for Future 5G Networks. CoRR abs/1911.00303 (2019) - 2018
- [i1]Wael Adi, Ayoub Mars:
Physical and Mechatronic Security, Technologies and Future Trends for Vehicular Environment. CoRR abs/1805.07570 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint