Karim Drouiche

According to our database1, Karim Drouiche authored at least 18 papers between 1993 and 2023.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
On the Security of the Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

2021
An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things.
Wirel. Pers. Commun., 2021

An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography.
Multim. Tools Appl., 2021

An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment.
J. Inf. Secur. Appl., 2021

2018
A cooperative Bayesian and lower bound estimation in dynamic framed slotted ALOHA algorithm for RFID systems.
Int. J. Commun. Syst., 2018

A Secure RFID Authentication Scheme for Healthcare Environments Based on Digital Signature Algorithm.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018

2017
Security Analysis and Enhancement of the Most Recent RFID Authentication Protocol for Telecare Medicine Information System.
Wirel. Pers. Commun., 2017

A provably secure RFID authentication protocol based on elliptic curve signature with message recovery suitable for m-Health environments.
Trans. Emerg. Telecommun. Technol., 2017

2016
An ultralightweight RFID authentication protocol based on Feistel cipher structure.
Secur. Commun. Networks, 2016

Towards a complete chaotic map-based mobile RFID authentication protocol with efficient anticollision tag indexing.
Secur. Commun. Networks, 2016

Dual cooperative RFID-telecare medicine information system authentication protocol for healthcare environments.
Secur. Commun. Networks, 2016

2015
Pseudo-random sequence generator based on random selection of an elliptic curve.
Proceedings of the International Conference on Computer, 2015

2014
Security enhancement of the authenticated RFID security mechanism based on chaotic maps.
Secur. Commun. Networks, 2014

2012
RFID authentication protocols based on ECC encryption schemes.
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012

2001
A new efficient computational algorithm for bit reversal mapping.
IEEE Trans. Signal Process., 2001

1999
New filter banks and more regular wavelets.
IEEE Trans. Signal Process., 1999

Daubechies-Matzinger wavelets and Lorentz polynomials.
Adv. Comput. Math., 1999

1993
The Stromberg wavelet and the Franklin system.
IEEE Trans. Signal Process., 1993


  Loading...