1. The Simplicity of Developing Chaotic Regime Cryptography. In Proceedings of the Second International Conference on Computer and ICCEE '09 Proceedings;F.Ahmad;Electrical Engineering,2009
2. Security evaluation of biometric keys
3. Password Authentication Based on Fractal Coding Scheme.;N.Al-Saidi;Journal of Applied Mathematics,2012
4. Ambalakat, P. (2005). Security of Biometric Authentication Systems. In Proceedings of 21st Computer Science Seminar. Academic Press.
5. Quantum cryptography based on Bell’s theorem