Human authentication using fingeriris algorithm based on statistical approach AB Elmadani Networked Digital Technologies: Second International Conference, NDT 2010 …, 2010 | 5 | 2010 |
Digital signature forming and keys protection based on person's characteristics AB Elmadani 2012 International Conference on Information Technology and e-Services, 1-6, 2012 | 4 | 2012 |
Trusted Document Signing based on use of biometric (Face) keys AB Elmadani International Journal of Cyber-Security and Digital Forensics 4 (1), 289-296, 2012 | 3 | 2012 |
Offline Signature Verification Based on Image Processing and Hu Moment AI Abughfa, AB Elmadani Int. J. Sc. Res. in Network Security and Communication 4 (Issue-5), 1-7, 2016 | 2 | 2016 |
Multiple layers security in protecting Arabic sensitive information using stenography and cryptographic algorithms AB Elmadani 2013 Second International Conference on Informatics & Applications (ICIA), 19-23, 2013 | 2 | 2013 |
Smart Card and Secure Coprocessor Enhance Internet Security AB Elmadani, V Prakash, AR Ramli Suranaree Journal of Science and Technology 9 (2), 2002 | 2 | 2002 |
Computer as an aid to the farmer for right decision in keeping fruit trees and others in the farming area south Libya AB Elmadani Proceedings of international conference on software engineering and new …, 2014 | 1 | 2014 |
Document Signing based on anti spoofing biometric (Face) keys AB Elmadani Proceedings of The International Conference on Computing, Networking and …, 2012 | 1 | 2012 |
Matching fingerface based on area under the highest peaks curve AB Elmadani, AR Ramli International Conference on Computer and Communication Engineering (ICCCE'10 …, 2010 | 1 | 2010 |
Secure remote control of offices and stocks based on use of camera and image process AIA Ahmed B. Elmadani Journal of Pure & Applied Sciences www.Suj.sebhau.edu.ly 1 (1), 2018 | | 2018 |
Secure remote control of offices and stocks based on use of CCTV and image process AB Elmadani, AI Abughfa Journal of Pure & Applied Sciences 17 (1), 2018 | | 2018 |
PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE AB Elmadani Computer Science 2 (1), 2017 | | 2017 |
Fingerprint matching based on area under the highest peaks curve AB Elmadani, BM Ali, V Prakash, A Jantan, K Jumari 9th Asia-Pacific Conference on Communications (IEEE Cat. No. 03EX732) 2, 536-540, 2003 | | 2003 |
Secure Access to Authorized Resources Based on Fingerprint Authentication AB Elmadani Universiti Putra Malaysia, 2003 | | 2003 |
www.Suj.sebhau.edu.ly www.Suj.sebhau.edu.ly, 0 | | |
APCC2003 Author's Index M Abaii, AF Abas, AF Mohamed, MM Abd-Elrazzak, MK Abdullah, ... | | |
FINGERPRINT SMART CARDS AS ALTERNATIVE FOR ATM AUTHENTICATION AB Elmadani, V Prakash, BM Ali | | |
Com mu n ica t ion Electron ics I AZ bin Sha’ameri, AB Elmadani, BM Ah, V Prakash, A Jantan, K Jumari, ... | | |
AVL Tree an efficient retrieval engine in Classified Fingerprint Database AB Elmadani image 9, 10, 0 | | |