Search

Your search keyword '"Benssalah, Mustapha"' showing total 20 results

Search Constraints

Start Over You searched for: Author "Benssalah, Mustapha" Remove constraint Author: "Benssalah, Mustapha" Database Complementary Index Remove constraint Database: Complementary Index
20 results on '"Benssalah, Mustapha"'

Search Results

1. Improved tag estimation method for TDMA anticollision protocols using CA-CFAR technique.

2. An efficient FPGA‐based implementation of UWB radar system for through‐wall imaging.

3. A New Compressive Sensing Method for Speckle Reducing in Complex-Valued SAR Data.

4. Development of an IR-UWB Radar System for High-Resolution Through-Wall Imaging.

5. Real-time FPGA implementation of a secure chaos-based digital crypto-watermarking system in the DWT domain using co-design approach.

6. Simultaneous localization and mapping navigation of unmanned ground vehicle based on second-order smooth variable structure filter with improved technique to combat fading for advanced wireless communications.

7. An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things.

8. An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography.

9. A robust auto‐adaptive approach for serial acquisition of generalized multi‐carrier spread spectrum in multipath fading mobile channels.

10. Proportional adaptive algorithm to improve reception techniques and mitigate the multipath fading effect in sub‐6 GHz 5G applications.

11. An efficient and lightweight multi‐scroll chaos‐based hardware solution for protecting fingerprint biometric templates.

12. A cooperative Bayesian and lower bound estimation in dynamic framed slotted ALOHA algorithm for RFID systems.

13. A provably secure RFID authentication protocol based on elliptic curve signature with message recovery suitable for m-Health environments.

14. Security Analysis and Enhancement of the Most Recent RFID Authentication Protocol for Telecare Medicine Information System.

15. Towards a complete chaotic map-based mobile RFID authentication protocol with efficient anticollision tag indexing.

16. Dual cooperative RFID-telecare medicine information system authentication protocol for healthcare environments.

18. Security enhancement of the authenticated RFID security mechanism based on chaotic maps.

19. Design and implementation of passive UHF RFID system.

20. Efficient ECC implementation architecture suitable for RFID technology.

Catalog

Books, media, physical & digital resources