JEA K-128: A novel Encryption Algorithm Using VHDL
|
Written by Jamal Bani Salameh |
Hits: 4242
|
Impact of Varying the Minimum Value of Contention Window (CWmin) of the IEEE 802.11 MAC Protocol o
|
Written by M. Saraireh |
Hits: 3749
|
Development and Evaluation of a Fuzzy Inference Engine System to Incorporate Quality of Service
|
Written by M. Saraireh |
Hits: 2498
|
Crypto Key Generation using Contour Graph Algorithm
|
Written by M.S. Al-Tarawneh, L.C.Khor, W.L.Woo and S.S Dlay |
Hits: 2435
|
Crypto Key Generation using Slicing Window Algorithm
|
Written by M.S. ALTARAWNEH, L.C.KHOR, W.L.WOO and S.S DLAY |
Hits: 2931
|
OBJECTIVE FINGERPRINT IMAGE QUALITY ASSESSMENT USING GABOR SPECTRUM APPROACH
|
Written by M. S. ALTARAWNEH, W.L.WOO, and S.S DLAY, |
Hits: 2615
|
A Hybrid Method for Fingerprint Image Validity and Quality Computation
|
Written by M.S. ALTARAWNEH, W.L. WOO, and S.S. DLAY |
Hits: 2334
|
Biometric Key Capsulation Technique Based on Fingerprint Vault: Analysis and attack
|
Written by M.S. ALTARAWNEH, W.L. WOO, and S.S. DLAY |
Hits: 3102
|
Fuzzy Vault Crypto Biometric Key Based on Fingerprint Vector Features
|
Written by M.S. ALTARAWNEH, W.L. WOO, and S.S. DLAY |
Hits: 2676
|
A NON Reference Fingerprint Image Validity via Statistical Weight Calculation
|
Written by M. S. Al-Tarawneh, L. C. Khor, W. L. Woo, and S. S. Dlay |
Hits: 3964
|