Wael Adi

According to our database1, Wael Adi authored at least 58 papers between 1984 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Contemporary Physical Clone-Resistant Identity for IoTs and Emerging Technologies.
Cryptogr., 2021

SRAM-SUC: Ultra-Low Latency Robust Digital PUF.
CoRR, 2021

Clone-Resistant Secured Booting Based on Unknown Hashing Created in Self-Reconfigurable Platform.
Proceedings of the Applied Reconfigurable Computing. Architectures, Tools, and Applications, 2021

2020
Tamper and Clone-Resistant Authentication Scheme for Medical Image Systems.
Cryptogr., 2020

Low-Complexity Nonlinear Self-Inverse Permutation for Creating Physically Clone-Resistant Identities.
Cryptogr., 2020

Physical Security for Fleet Management Systems.
Cryptogr., 2020

2019
New Mathblocks-Based Feistel-Like Ciphers for Creating Clone-Resistant FPGA Devices.
Cryptogr., 2019

New Family of Stream Ciphers as Physically Clone-Resistant VLSI-Structures.
Cryptogr., 2019

Operator and Manufacturer Independent D2D Private Link for Future 5G Networks.
CoRR, 2019

Digitally Mutating NV-FPGAs into Physically Clone-Resistant Units.
CoRR, 2019

A New Low-Complexity Cipher Class for Clone-Resistant Identities.
Proceedings of the 42nd International Convention on Information and Communication Technology, 2019

Fair Exchange and Anonymous E-Commerce by Deploying Clone-Resistant Tokens.
Proceedings of the 42nd International Convention on Information and Communication Technology, 2019

Mini-Block-Based Cipher Class for Physically Clone-Resistant Devices.
Proceedings of the Eighth International Conference on Emerging Security Technologies, 2019

2018
Physical and Mechatronic Security, Technologies and Future Trends for Vehicular Environment.
CoRR, 2018

A Cipher Class Based on Golden S-Boxes for Creating Clone-Resistant Identities.
Proceedings of the Information and Operational Technology Security Systems, 2018

Clone-Resistant Entities for Vehicular Security.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018

Highly Secured Implantable Medical Devices.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018

Security and Complexity Bounds of SUC-Based Physical Identity.
Proceedings of the 2018 NASA/ESA Conference on Adaptive Hardware and Systems, 2018

New Concept for Physically-Secured E-Coins Circulations.
Proceedings of the 2018 NASA/ESA Conference on Adaptive Hardware and Systems, 2018

Clone-Resistant Joint-Identity Technique for Securing Fleet Management Systems.
Proceedings of the 2018 NASA/ESA Conference on Adaptive Hardware and Systems, 2018

2017
LS-ARP: A lightweight and secure ARP.
Proceedings of the Seventh International Conference on Emerging Security Technologies, 2017

Chaining trusted links by deploying secured physical identities.
Proceedings of the Seventh International Conference on Emerging Security Technologies, 2017

Random stream cipher as a PUF-like identity in FPGA environment.
Proceedings of the Seventh International Conference on Emerging Security Technologies, 2017

Clone-resistant vehicular RKE by deploying SUC.
Proceedings of the Seventh International Conference on Emerging Security Technologies, 2017

Using Ciphers for Failure-Recovery in ITS Systems.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2015
Combined Image Data Hiding Techniques in a Clone-Resistant SoC Environment.
Proceedings of the Sixth International Conference on Emerging Security Technologies, 2015

Fault Detection and Correction in Processing AES Encryption Algorithm.
Proceedings of the Sixth International Conference on Emerging Security Technologies, 2015

Improving System Reliability by Joint Usage of Hash Function Bits and Error Correction Coding.
Proceedings of the Sixth International Conference on Emerging Security Technologies, 2015

2014
Obscured Asymmetric Crypto-Functions for Secured Identification.
Proceedings of the Fifth International Conference on Emerging Security Technologies, 2014

2013
IP-core protection for a non-volatile Self-reconfiguring SoC environment.
Proceedings of the 21st IEEE/IFIP International Conference on VLSI and System-on-Chip, 2013

Unidirectional error correction by crypto functions.
Proceedings of the IEEE International Conference on Communications, 2013

Construction of Software-Based Digital Physical Clone Resistant Functions.
Proceedings of the Fourth International Conference on Emerging Security Technologies, 2013

Combined HW-SW adaptive clone-resistant functions as physical security anchors.
Proceedings of the 2013 NASA/ESA Conference on Adaptive Hardware and Systems, 2013

2012
Cocoon-PUF, a novel mechatronic secure element technology.
Proceedings of the 2012 NASA/ESA Conference on Adaptive Hardware and Systems, 2012

2011
Resilient security system by deploying dynamic crypto-architectures.
Proceedings of the 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2011

2010
Secure human face authentication for mobile e-government transactions.
Int. J. Mob. Commun., 2010

Ultimate design security in self-reconfiguring non-volatile environments.
Proceedings of the 2010 NASA/ESA Conference on Adaptive Hardware and Systems, 2010

Adaptive and evolvable hardware security architectures.
Proceedings of the 2010 NASA/ESA Conference on Adaptive Hardware and Systems, 2010

2009
Hardware architecture for trustable vehicular electronic control units.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

Deploying FPGA self-configurable cell structure for micro crypto-functions.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Autonomous Physical Secret Functions and Clone-Resistant Identification.
Proceedings of the 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, 2009

Mechatronic Security and Robot Authentication.
Proceedings of the 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, 2009

2008
Globally verifiable clone-resistant device identity with mutual authentication.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008

Clone-Resistant DNA-Like Secured Dynamic Identity.
Proceedings of the 2008 ECSIS Symposium on Bio-inspired, 2008

2007
Electronic mutation technology and secured identification.
Proceedings of the 9th International Symposium on Signal Processing and Its Applications, 2007

Bio-Inspired Electronic-Mutation with genetic properties for Secured Identification.
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007

2006
VLSI Design Exchange with Intellectual Property Protection in FPGA Environment Using both Secret and Public-Key Cryptography.
Proceedings of the 2006 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2006), 2006

Fuzzy modular multiplication architecture and low complexity IPR-protection for FPGA technology.
Proceedings of the 2006 IEEE International Conference on Field Programmable Technology, 2006

2005
Authenticated Mobile Device Proxy Service.
Proceedings of the Third World Enformatika Conference, 2005

Novel secret-key IPR protection in FPGA environment.
Proceedings of the Proceedings 2005 IEEE International SOC Conference, 2005

2004
Combined Web/mobile authentication for secure Web access control.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Secured multi-identity mobile infrastructure and offline mobile-assisted micro-payment application.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

2003
Secured wireless ad-hoc network administration scheme.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003

A protection mechanism for intellectual property rights (IPR) in FPGA design environment.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003

2001
Variable Redundancy Coding for Mobile Channels.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

A Security Analysis for Label Switching Routers.
Proceedings of the 2001 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2001), 2001

1985
Ein Harwaremonitor zur Messung der Busbelastung in einer Multiprozessoranordnung.
Proceedings of the Messung, 1985

1984
Fast Burst Error-Correction Scheme with Fire Code.
IEEE Trans. Computers, 1984


  Loading...