Ali-Pacha Adda

Orcid: 0000-0003-1828-9562

According to our database1, Ali-Pacha Adda authored at least 26 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A new image compression-encryption scheme based on compressive sensing & classical AES algorithm.
Multim. Tools Appl., November, 2023

A new fast image compression-encryption scheme based on compressive sensing and parallel blocks.
J. Supercomput., May, 2023

A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes.
Inf. Secur. J. A Glob. Perspect., March, 2023

2022
A secure hash function based on sponge construction and chaos-maps.
Int. J. Comput. Sci. Eng., 2022

McEliece cryptosystem based on Plotkin construction with QC-MDPC and QC-LDPC codes.
CoRR, 2022

Enhancing QoS in Privacy Based Vehicular Communication.
Ad Hoc Sens. Wirel. Networks, 2022

2021
RPL rank based-attack mitigation scheme in IoT environment.
Int. J. Commun. Syst., 2021

Proposition of new secure data communication technique based on Huffman coding, chaos and LSB.
Int. J. Biom., 2021

Generalized Iterative Dichotomy PAPR Reduction Method for Multicarrier Waveforms.
IEEE Access, 2021

A New and Efficient Scheme for Improving the Digitized Chaotic Systems From Dynamical Degradation.
IEEE Access, 2021

Hardware Implementation of IDP and LINC Methods Using Real Power Amplifiers.
Proceedings of the International Conference on Software, 2021

Hyperspectral Data Preprocessing of the Northwestern Algeria Region.
Proceedings of the Networking, Intelligent Systems and Security, 2021

A New Image Scrambling Technique Only With A Specific Permutation.
Proceedings of the 2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP), 2021

Impact of Silent Periods on Pseudonym Schemes.
Proceedings of the 18th International Multi-Conference on Systems, Signals & Devices, 2021

2020
Data security based on homographic function.
Pattern Recognit. Lett., 2020

Security Against Rank Attack in RPL Protocol.
IEEE Netw., 2020

A new chaotic encrypted image based on the trigonometric circle.
Inf. Secur. J. A Glob. Perspect., 2020

New chaotic cryptosystem for the image encryption.
Int. J. Inf. Comput. Secur., 2020

New method for identification of persons using geometry foot outline.
Int. J. Biom., 2020

Energy efficiency comparison of Outphasing and IDP techniques with non-linear power amplifiers.
Proceedings of the 3rd International Conference on Advanced Communication Technologies and Networking, 2020

2019
Proposition of a dynamic steganography system based on the chaos properties and image registration for distributing an encryption key.
Int. J. Inf. Priv. Secur. Integr., 2019

Iterative Dichotomy PAPR Reduction Method for Multicarrier Waveforms.
IEEE Commun. Lett., 2019

PAPR reduction of BF-OFDM waveform using DFT-Spread technique.
Proceedings of the 16th International Symposium on Wireless Communication Systems, 2019

2017
Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication.
J. Inf. Process. Syst., 2017

2009
Sécurité des Données en se basant sur le Chiffre de Hill.
Proceedings of the 2nd Conférence Internationale sur l'Informatique et ses Applications (CIIA'09), 2009

Chaos Crypto-Système basé sur l'Attracteur de Hénon-Lozi.
Proceedings of the 2nd Conférence Internationale sur l'Informatique et ses Applications (CIIA'09), 2009


  Loading...