Hassan M. Elkamchouchi

According to our database1, Hassan M. Elkamchouchi authored at least 31 papers between 2007 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
New video encryption schemes based on chaotic maps.
IET Image Process., 2020

2019
ArMTFr: a new permutation-based image encryption scheme.
Int. J. Electron. Secur. Digit. Forensics, 2019

2018
An Improved Approach for Computer-Aided Diagnosis of Breast Cancer in Digital Mammography.
Proceedings of the 2018 IEEE International Symposium on Medical Measurements and Applications, 2018

2016
Analysis for NOMA-CoMP-JT global precoding matrix and IRC receiver for LTE-A.
Proceedings of the 13th IEEE International Conference on Networking, Sensing, and Control, 2016

Investigation and design of distributed subarray SIMO (DS-SIMO) microstrip antenna system with SPDT-T/R switch for consumer receiving diversity applications.
Proceedings of the IEEE International Conference on Consumer Electronics, 2016

Investigation and design of rectangular waveguide using composite right / left handed transmission line (CRLH-TL) structure for microwave and communication consumer applications.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

Robust doa estimation and data detection for mobile communication in multipath environment.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2015
Dynamic selection for CoMP-JT over correlated MIMO channel with open loop precoding and IRC receiver for LTE-A.
Proceedings of the 26th IEEE Annual International Symposium on Personal, 2015

Performance of joint transmission CoMP with global precoding matrix and IRC receiver for LTE-A.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

A secure geographical routing protocol for highly-dynamic aeronautical networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Multiband Microstrip Antenna Design Using Harmonics Embedded Array of Composite Right / Left Handed Transmission Line (CRLH-TL).
Proceedings of the IEEE International Conference on Ubiquitous Wireless Broadband, 2015

2014
Reduced complexity list sphere decoding for MIMO systems.
Digit. Signal Process., 2014

The Use of Two Authentication Factors to Enhance the Security of Mass Storage Devices.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

2013
Modelling and Simulation of Robust Navigation for Unmanned Air Systems (UASs) Based on Integration of Multiple Sensors Fusion Architecture.
Proceedings of the Seventh UKSim/AMSS European Modelling Symposium, 2013

2012
Mobile one-time passwords: two-factor authentication using mobile phones.
Secur. Commun. Networks, 2012

Censoring for Type-Based Multiple Access Scheme in Wireless Sensor Networks.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

Dimension-ordered MIMO list sphere decoding.
Proceedings of the 13th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2012

2011
A new proxy signcryption scheme using warrants.
Int. J. Intell. Eng. Informatics, 2011

Secure Instant Messaging Protocol for Centralized Communication Group.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Performance-optimized FPGA implementation for the flexible triangle search block-based motion estimation algorithm.
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011

2010
Computation-efficient FPGA implementation for flexible triangle search block-based motion estimation algorithm.
Proceedings of the 23rd Canadian Conference on Electrical and Computer Engineering, 2010

2009
Secure and Fast Hashing Algorithm with Multiple Security Levels.
J. Softw., 2009

A New Efficient Strong Proxy Signcryption Scheme Based on a Combination of Hard Problems.
Proceedings of the IEEE International Conference on Systems, 2009

A New Efficient Multiple Broadcasters Signcryption Scheme (MBSS) for Secure Distributed Networks.
Proceedings of the Fifth International Conference on Networking and Services, 2009

2008
A New Proxy Identity-Based Signcryption Scheme for Partial Delegation of Signing Rights.
IACR Cryptol. ePrint Arch., 2008

A New Blind Identity-Based Signature Scheme with Message Recovery.
IACR Cryptol. ePrint Arch., 2008

A deterministic approach for 2D-DOA estimation based on a V-shaped array and a virtual array concept.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

A New Blind Identity-Based Signature Scheme.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

A scalable trace and revoke scheme with security enhancements.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
A Deterministic Real-Time DOA-based Smart Antenna Processor.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Public Key Multi-Message Signcryption (PK-MMS) Scheme For Secure Communication Systems.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007


  Loading...