Nassar Ikram

According to our database1, Nassar Ikram authored at least 17 papers between 2007 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Enhancing Dependability in Big Data Analytics Enterprise Pipelines.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Performance Comparison of State of Art NoSql Technologies Using Apache Spark.
Proceedings of the Intelligent Systems and Applications, 2018

2016
A high performance ST-Box based unified AES encryption/decryption architecture on FPGA.
Microprocess. Microsystems, 2016

2013
Chaos based key expansion function for block ciphers.
Multim. Tools Appl., 2013

Elliptic curve cryptography based mutual authentication scheme for session initiation protocol.
Multim. Tools Appl., 2013

MAYHAM - A New Hash Function.
Int. J. Netw. Secur., 2013

Secure automotive telematics system (SATS).
Proceedings of the Eighth International Conference on Digital Information Management (ICDIM 2013), 2013

2012
Cryptanalysis of a Non-interactive Deniable Authentication Protocol Based on Factoring.
Int. J. Netw. Secur., 2012

2011
Direct Exponent and Scalar Multiplication Classes of an MDS Matrix.
IACR Cryptol. ePrint Arch., 2011

2010
Resource efficient implementation of T-Boxes in AES on Virtex-5 FPGA.
Inf. Process. Lett., 2010

MPLS Unleashed: Remedy Using IPSEC over MPLS VPN.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Evading Virus Detection Using Code Obfuscation.
Proceedings of the Future Generation Information Technology, 2010

2008
An Efficient Reconfigurable SOS Montgomery Multiplier in GF (P) usign FPGA DSP Slices.
Proceedings of the SECRYPT 2008, 2008

2007
Memory Efficient Implementation of AES S-Boxes on FPGA.
J. Circuits Syst. Comput., 2007

An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture.
Int. J. Netw. Secur., 2007

A Look-Up-Table Implementation of AES.
Proceedings of the International Conference on High Performance Computing, 2007

An Efficient Software Implementation of AES-CCM for IEEE 802.11i Wireless St.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007


  Loading...