Bassam Jamil Mohd

According to our database1, Bassam Jamil Mohd authored at least 29 papers between 2002 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher.
Sensors, 2019

2018
Analyzing Cyber-Physical Threats on Robotic Platforms.
Sensors, 2018

Security Vulnerabilities in Bluetooth Technology as Used in IoT.
J. Sensor and Actuator Networks, 2018

Hardware design and modeling of lightweight block ciphers for secure communications.
Future Generation Comp. Syst., 2018

Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques.
IEEE Access, 2018

2017
An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications.
IEEE Systems Journal, 2017

Extrinsic Calibration of Camera and 2D Laser Sensors without Overlap.
Sensors, 2017

2016
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks.
Sensors, 2016

Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation.
Security and Communication Networks, 2016

A comparative study of steganography designs based on multiple FPGA platforms.
IJESDF, 2016

2015
A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues.
J. Network and Computer Applications, 2015

Security Issues in WSNs with Cooperative Communication.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
MPLS technology in wireless networks.
Wireless Networks, 2014

An energy-efficient and security aware route selection protocol for wireless sensor networks.
Security and Communication Networks, 2014

QoS-Aware Health Monitoring System Using Cloud-Based WBANs.
J. Medical Systems, 2014

Analysis and Modeling of FPGA Implementations of Spatial Steganography Methods.
Journal of Circuits, Systems, and Computers, 2014

Software comprehension based on database relational algebra.
IJICT, 2014

Public-Key Authentication for Cloud-based WBANs.
Proceedings of the 9th International Conference on Body Area Networks, 2014

2013
Hierarchical steganography using novel optimum quantization technique.
Signal, Image and Video Processing, 2013

An Efficient Backup Technique for Database Systems Based on Threshold Sharing.
JCP, 2013

Wavelet-transform steganography: algorithm and hardware implementation.
IJESDF, 2013

2012
Low power Wallace multiplier design based on wide counters.
I. J. Circuit Theory and Applications, 2012

A novel approach to enhance distributed virtual memory.
Computers & Electrical Engineering, 2012

2011
Image Steganography Optimization Technique.
Proceedings of the Signal Processing and Information Technology, 2011

2009
A Power-Scalable Switch-Based Multi-processor FFT.
Proceedings of the 20th IEEE International Conference on Application-Specific Systems, 2009

2007
The Hazard-Free Superscalar Pipeline Fast Fourier Transform Architecture and Algorithm.
Proceedings of the VLSI-SoC: Advanced Topics on Systems on a Chip, 2007

The hazard-free superscalar pipeline fast fourier transform algorithm and architecture.
Proceedings of the IFIP VLSI-SoC 2007, 2007

Contention-free switch-based implementation of 1024-point Radix-2 Fourier Transform Engine.
Proceedings of the 25th International Conference on Computer Design, 2007

2002
Constructing reusable testbenches.
Proceedings of the Seventh IEEE International High-Level Design Validation and Test Workshop 2002, 2002


  Loading...