Web
Education
Viewing 1-6 of 6 total results
A Secured Smart Card Using a Pseudorandom Affine ... - CORE
A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES . By Ehab Mahmoud Mohamed, Yasien Mahmoud and Hiroshi Furukawa. ... so an adversary can’t forge the scheme.The proposed LIRKES needs a strong pseudorandom permutation (PRP) as itsbasic building block, so we introduce a new symmetric-key block ...
List of Open Access publications for International Journal ...
A Secured Smart Card using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES : Ehab Mahmoud Mohamed, Yasien Mahmoud, Hiroshi Furukawa : Pages - 9 - 22 | Revised - 25-02-2010 | Published - 26-03-2010 : Full Text Available (187.85KB) MORE INFORMATION
Assiut University Members CV|Dr Yassin Mahmoud Yassin Hassan,
Hasan, and Hiroshi Furukawa, Novel Remotely Keyed Encryption Schemes for Smart Card Applications,” In Proc. of the IEEE International Conference on Communications – ICC 2011: Communication and Information System Security Symposium , Kyoto, Japan, 2011: 6 - Ammar. M. Hassan, Ayoub Al-Hamadi, Yassin M. Y. Hasan, Mohamed A. A. Wahab, Axel ...
Papers and Patents - FURUKAWA Lab
Takaya Hino, Osamu Muta, and Hiroshi Furukawa, ``Performance Evaluation of OQAM Based OFDM Systems Using an ACLR and EVM Restricted Peak Amplitude Cancellation Scheme,'' IEEE International Conference on Communication Systems 2014, Nov. 2014.
研究業績 - 古川研究室 / 九...
Hiroaki Togashi, "Wireless Backhaul-based Sensor Network and its Applications," 5th Asian Workshop on Smart Sensor System (AWSSS 2017), Jeju. Korea, Mar. 2017. Hiroaki Togashi, Ryuta Abe, Junpei Shimamura and Hiroshi Furukawa, "Network-based pedestrian tracking system utilizing densely placed wireless access points," The 11th International ...
كلية الهندسة, ج...
A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES " Ehab M. Mohamed, Yassin. M. Y. Hasan, and Hiroshi Furukawa " CSC International Journal of Computer Science and Security, vol.4, No.1, pp.9-22, 2010
1
0
A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES " Ehab M. Mohamed, Yassin. M. Y. Hasan, and Hiroshi Furukawa " CSC International Journal of Computer Science and Security, vol.4, No.1, pp.9-22, 2010
1
0
http://www.aun.edu.eg/faculty_engineering/arabic/dept_elec/researches.php?page=93&Dept_Code=0202
www.aun.edu.eg/faculty_engineering/arabic/dept_elec/researches.php?page=9...
<span class="highlight">A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES</span> &quot; Ehab M. Mohamed, Yassin. M. Y. Hasan, and Hiroshi Furukawa &quot; CSC International Journal of Computer Science and Security, vol.4, No.1, pp.9-22, 2010
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.