Two‐Phase Image Encryption Scheme Based on FFCT and Fractals M Mikhail, Y Abouelseoud, G ElKobrosy Security and Communication Networks 2017 (1), 7367518, 2017 | 27 | 2017 |
Extension and application of El-Gamal encryption scheme M Mikhail, Y Abouelseoud, G Elkobrosy 2014 World Congress on Computer Applications and Information Systems (WCCAIS …, 2014 | 21 | 2014 |
Cartesian parallel manipulator modeling, control and simulation A Elkady, G Elkobrosy, S Hanna, T Sobh Parallel Manipulators, towards New Applications, 2008 | 16 | 2008 |
Optimal placement and settings of FACTS devices for reactive power compensation using a Firefly algorithm A El-Sherif, G Elkobrosy, Y Abouelseoud, Y Helmy 2019 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 1-5, 2019 | 15 | 2019 |
A fast recognition system for isolated printed characters using center of gravity and principal axis AM Shaffie, GA Elkobrosy Applied Mathematics 4 (9), 1313, 2013 | 6 | 2013 |
New authenticated key agreement protocols M Nabil, Y Abouelseoud, G Elkobrosy, A Abdelrazek Proceedings of the International MultiConference of Engineers and Computer …, 2013 | 5 | 2013 |
Certificate-based authenticated key agreement protocols M Nabil, Y Abouelseoud, G Elkobrosy, A Abdelrazek 2013 International Conference on Computer Applications Technology (ICCAT), 1-7, 2013 | 4 | 2013 |
Text Hiding in a Digital Cover Image using Two Dimensional Indexing based on Chaotic Maps M Mikhail, Y Abouelseoud, G Elkobrosy International Journal of Computer Applications 975, 8887, 2016 | 1 | 2016 |
On the modeling and control of the Cartesian parallel manipulator AY Elkady, SN Hanna, GA Elkobrosy Advances in Computer and Information Sciences and Engineering, 90-96, 2008 | 1 | 2008 |
Year of Publication: 2016 OB Michael, YM Missah | | 2016 |
New Key Agreement Protocols Providing Explicit Authentication M Nabil, Y Abouelseoud, G Elkobrosy, A Abdelrazek | | 2013 |
Optimization of Slider CranN Mechanism Using Design of Experiments and Multi-Linear Regression G ElNobrosy, AM AbdelrazeN, BM Elsouhily, ME Khidr | | |
Tripartite & Multi-Receiver and E-voting encryption schemes based on El-Gamal M Mikhail, Y Abouelseoud, G Elkobrosy | | |