Search

Your search keyword '"El-Hajj, Mohammed"' showing total 28 results

Search Constraints

Start Over You searched for: Author "El-Hajj, Mohammed" Remove constraint Author: "El-Hajj, Mohammed"
28 results on '"El-Hajj, Mohammed"'

Search Results

4. Predictive Modeling of Customer Response to Marketing Campaigns.

5. Leveraging Digital Twins and Intrusion Detection Systems for Enhanced Security in IoT-Based Smart City Infrastructures.

6. ProtectingSmall and Medium Enterprises: A Specialized Cybersecurity Risk Assessment Framework and Tool.

7. Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0.

11. Evaluating the Efficiency of zk-SNARK, zk-STARK, and Bulletproof in Real-World Scenarios: A Benchmark Study.

20. A comparative analysis of the computation cost and energy consumption of relevant curves of ECC presented in literature

21. Performance analysis of Signcryption and Sign-then-Encrypt schemes for resource-constrained IoT devices

22. Comparative Analysis between the Fast and Basic Scalar Multiplication Used in Elliptic Curve Cryptography

Catalog

Books, media, physical & digital resources