Combined web/mobile authentication for secure web access control A Al-Qayedi, W Adi, A Zahro, A Mabrouk 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No …, 2004 | 40 | 2004 |
Method for coding or decoding and device for coding or decoding J Laumen, W Adi US Patent 6,396,423, 2002 | 36 | 2002 |
Clone-resistant DNA-like secured dynamic identity W Adi 2008 Bio-inspired, Learning and Intelligent Systems for Security, 148-153, 2008 | 35 | 2008 |
Genius Learning Strategy, Petunjuk praktis untuk menerapkan Accelerated Learning WG Adi, G Gunawan Jakarta: Gramedia Pustaka, 2004 | 32 | 2004 |
Secured multi-identity mobile infrastructure and offline mobile-assisted micro-payment application W Adi, A Al-Qayedi, AA Zarooni, A Mabrouk 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No …, 2004 | 31 | 2004 |
VLSI design exchange with intellectual property protection in FPGA environment using both secret and public-key cryptography W Adi, R Ernst, B Soudan, A Hanoun IEEE computer society annual symposium on emerging VLSI technologies and …, 2006 | 27 | 2006 |
Operator and manufacturer independent D2D private link for future 5G networks A Mars, A Abadleh, W Adi IEEE INFOCOM 2019-IEEE conference on computer communications workshops …, 2019 | 24 | 2019 |
Highly secured implantable medical devices E Hamadaqa, A Abadleh, A Mars, W Adi 2018 International Conference on Innovations in Information Technology (IIT …, 2018 | 24 | 2018 |
Bio-inspired electronic-mutation with genetic properties for secured identification W Adi, B Soudan 2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for …, 2007 | 23 | 2007 |
Self reconfiguring vlsi architectures for unknown secret physical functions based crypto security systems W Adi, K Benkrid US Patent App. 12/829,549, 2012 | 22 | 2012 |
Accelerometer-based joint user-device clone-resistant identity S Mulhem, A Abadleh, W Adi 2018 Second World Conference on Smart Trends in Systems, Security and …, 2018 | 19 | 2018 |
Combined HW-SW adaptive clone-resistant functions as physical security anchors M Fyrbiak, C Kison, M Jeske, W Adi 2013 NASA/ESA Conference on Adaptive Hardware and Systems (AHS-2013), 130-137, 2013 | 18 | 2013 |
Deploying FPGA self-configurable cell structure for micro crypto-functions W Adi, N Ouertani, A Hanoun, B Soudan 2009 IEEE Symposium on Computers and Communications, 348-354, 2009 | 18 | 2009 |
Mechatronic security and robot authentication W Adi 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security …, 2009 | 17 | 2009 |
Random stream cipher as a PUF-like identity in FPGA environment A Mars, W Adi, S Mulhem, E Hamadaqa 2017 Seventh International Conference on Emerging Security Technologies (EST …, 2017 | 16 | 2017 |
Generic identification protocols by deploying secret unknown ciphers (SUCs) W Adi, A Mars, S Mulhem 2017 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW …, 2017 | 15 | 2017 |
Secured remote sensing by deploying clone-resistant Secret Unknown Ciphers W Adi, S Mulhem, A Mars 2017 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW …, 2017 | 14 | 2017 |
Autonomous physical secret functions and clone-resistant identification W Adi 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security …, 2009 | 14 | 2009 |
Physical and mechatronic security, technologies and future trends for vehicular environment W Adi, A Mars arXiv preprint arXiv:1805.07570, 2018 | 13 | 2018 |
Wallet based E-cash system for secured multi-hop cash exchange H Kreft, W Adi 2008 3rd International Conference on Information and Communication …, 2008 | 13 | 2008 |