Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 24.

F. AMOUNAS, and EL HASSAN EL KINANI, and H. SADKI, (2014) A Novel Approach of Amazigh Text Steganography based Elliptic Curve. International Journal of Information and Network Security, vol 3, No 2, pp. 83-91, 2014.

F. AMOUNAS, and EL HASSAN EL KINANI, (2014) Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve. International Journal of Engineering Inventions, vol 3, Issue 11, pp. 8-16, 2014.

F. AMOUNAS, and EL HASSAN EL KINANI, (2013) Construction Efficiency of the Elliptic Curve Cryptosystem using Code Computing for Amazigh Alphabet. International Journal of Information and Network Security (IJINS), vol 2, No 1, pp. 43-53 (2013)..

F. AMOUNAS, and EL HASSAN EL KINANI, and H. SADKI, (2013) An Efficient Signcryption Scheme based on the Elliptic Curve Discrete Logarithm Problem. International Journal of Information and Network Security (IJINS), vol 2, No 3, pp. 253-259 (2013)..

F. AMOUNAS, and EL HASSAN EL KINANI, (2013) Encryption of Data using Elliptic Curve over Circulant Matrices. iInternational Journal of Electronics Communication and computer Engineering, vol 4, No 1, pp. 1502-1506 (2013)..

A. OUHADAN, and EL HASSAN EL KINANI, and AL-SOBHIE, (2013) Fitzhugh-Nagumo Equation and Homogeneous Balancing Riccati Method. Applied Mathematical Sciences, Vol. 7, no. 109, (2013), pp 541- 545.

A. OUHADAN, and EL HASSAN EL KINANI, and M. HAJAR, (2013) Lie Symmetries Analysis for SIR Model of Epidemiology. Applied Mathematical Sciences, Vol. 7, no. 92, (2013), pp. 4595-4604.

F. AMOUNAS, and EL HASSAN EL KINANI, and M. HAJAR, (2013) A Matrix Approach for Information Security Based ECC using Mealy Machine and Fibonacci Q-Matrix. International Journal of Engineering and Innovative Technology, vol 3, Issue 1, pp. 500-504 (2013).

M. AABIDI, and A. JAKIMI, and EL HASSAN EL KINANI, and M. EL KOUTBI, (2013) “A New Approach for Code Generation from UML State Machine“,. International Review on Computers and Software (IRECOS), vol. 8. no. 2, pp. 500-506, (2013)..

F. AMOUNAS, and EL HASSAN EL KINANI, and M. HAJAR, (2013) A Novel Approach for Enciphering Data based ECC using Catalan Numbers. International Journal of Information and Network Security (IJINS), vol 2, No 4, pp. 339-347 (2013)..

F. AMOUNAS, and EL HASSAN EL KINANI, (2013) A Novel Encryption Scheme of Amazigh Alphabet Based Elliptic Curve using Pauli Spin 1/2 Matrices. International Journal of Information and Network Security (IJINS), vol 2, No 2, pp. 190-196 (2013)..

M. AABIDI, and A. JAKIMI, and T. ALAOUI, and EL HASSAN EL KINANI, (2013) “An Object-Oriented Approach To Generate Java Code From Hierarchical-Concurrent and History States“,. International Journal of Information and Network Security (IJINS), vol2, no 6, pp. 429-440, December, (2013)..

F. AMOUNAS, and EL HASSAN EL KINANI, (2013) Proposed Developments of Blind Signature Scheme based on The Elliptic Curve Discrete Logarithm Problem. Computer Engineering and Applications Journal, vol 2, No 1, pp. 151-160 (2013)..

M. BENHAMOU, and EL HASSAN EL KINANI, and H. KAÏDI., (2013) Rigorous study of the unbinding transition of biomembranes and strings from morse potentials. Conference Papers in Mathematics,Volume 2013, (2013)..

F. AMOUNAS, and EL HASSAN EL KINANI, (2013) Secure Encryption Scheme of Amazigh Alphabet Based ECC Using Finite State Machine. Proceedings of the JNS3, IEEE Xplore, pp.1-4 (2013)..

F. AMOUNAS, and EL HASSAN EL KINANI, (2012) Cryptography with elliptic curve using tifinagh characters. Journal of Mathematics and System Science 2 (2012) 139-144, ISSN:2159-5291.

F. AMOUNAS, and EL HASSAN EL KINANI, (2012) Elliptic curve digital signature algorithm using boolean permutation based ECC. International Journal of Information and Network Security (IJINS), Vol.1, No.3, August 2012, pp. 216 -222..

MOULAY RCHID SIDI AMMI, and EL HASSAN EL KINANI, and DELFIM F. M. TORRES, (2012) Existence and uniqueness of solutions to functional integro-differential fractional equations. Electronic Journal of Differential Equations, Vol. 2012 (2012), No. 103, pp. 1–9..

F. AMOUNAS, and EL HASSAN EL KINANI, (2012) Fast mapping method based on matrix approach for elliptic curve cryptography. International Journal of Information and Network Security (IJINS), Vol.1, No.2, June 2012, pp. 54~59..

F. AMOUNAS, and EL HASSAN EL KINANI, (2012) An efficient elliptic curve cryptography protocol based on matrices. International Journal ofEngineering Inventions, Vol.1, Issue 9, november 2012, pp. 49-54..

AMOUNAS FATIMA, and EL HASSAN EL KINANI, (2012) An elliptic curve cryptography based on matrix scrambling method. Proceedings of the Network Security and Systems (JNS2), 2012 National Days of, 2nd National days of Network Security and Systems, 21-22 avril 2012, pp. 31-35 (IEEE).

F. AMOUNAS, and EL HASSAN EL KINANI, and CHALLALI, (2011) An Application of discrete Algorithms asymmetric Cryptography. International Mathematical Forum, Vol. 6, 2011, N°. 49, 2409 - 2418.

M. DOUAD, and EL HASSAN EL KINANI, (2011) Extended Weyl-Heisenberg Algebra, phase operator, unitary depolarizers and generalized Bell states. Physics Letters A Volume 375, Issue 25, 20 June 2011, Pages 2492–2497.

B. OUCHAO, and EL HASSAN EL KINANI, (2011) Statistical Analysis of Common qubits Between Alice and Bob in BB84 Protocol. Journal of Contemporary Engineering Sciences Vol. 4 (2011), no. 8, 363-370.

This list was generated on Fri Apr 19 19:18:21 2024 CEST.