Bassam Jamil Mohd

According to our database1, Bassam Jamil Mohd authored at least 29 papers between 2002 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher.
Sensors, 2019

Analyzing Cyber-Physical Threats on Robotic Platforms.
Sensors, 2018

Security Vulnerabilities in Bluetooth Technology as Used in IoT.
J. Sensor and Actuator Networks, 2018

Hardware design and modeling of lightweight block ciphers for secure communications.
Future Generation Comp. Syst., 2018

Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques.
IEEE Access, 2018

An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications.
IEEE Systems Journal, 2017

Extrinsic Calibration of Camera and 2D Laser Sensors without Overlap.
Sensors, 2017

Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks.
Sensors, 2016

Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation.
Security and Communication Networks, 2016

A comparative study of steganography designs based on multiple FPGA platforms.
IJESDF, 2016

A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues.
J. Network and Computer Applications, 2015

Security Issues in WSNs with Cooperative Communication.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

MPLS technology in wireless networks.
Wireless Networks, 2014

An energy-efficient and security aware route selection protocol for wireless sensor networks.
Security and Communication Networks, 2014

QoS-Aware Health Monitoring System Using Cloud-Based WBANs.
J. Medical Systems, 2014

Analysis and Modeling of FPGA Implementations of Spatial Steganography Methods.
Journal of Circuits, Systems, and Computers, 2014

Software comprehension based on database relational algebra.
IJICT, 2014

Public-Key Authentication for Cloud-based WBANs.
Proceedings of the 9th International Conference on Body Area Networks, 2014

Hierarchical steganography using novel optimum quantization technique.
Signal, Image and Video Processing, 2013

An Efficient Backup Technique for Database Systems Based on Threshold Sharing.
JCP, 2013

Wavelet-transform steganography: algorithm and hardware implementation.
IJESDF, 2013

Low power Wallace multiplier design based on wide counters.
I. J. Circuit Theory and Applications, 2012

A novel approach to enhance distributed virtual memory.
Computers & Electrical Engineering, 2012

Image Steganography Optimization Technique.
Proceedings of the Signal Processing and Information Technology, 2011

A Power-Scalable Switch-Based Multi-processor FFT.
Proceedings of the 20th IEEE International Conference on Application-Specific Systems, 2009

The Hazard-Free Superscalar Pipeline Fast Fourier Transform Architecture and Algorithm.
Proceedings of the VLSI-SoC: Advanced Topics on Systems on a Chip, 2007

The hazard-free superscalar pipeline fast fourier transform algorithm and architecture.
Proceedings of the IFIP VLSI-SoC 2007, 2007

Contention-free switch-based implementation of 1024-point Radix-2 Fourier Transform Engine.
Proceedings of the 25th International Conference on Computer Design, 2007

Constructing reusable testbenches.
Proceedings of the Seventh IEEE International High-Level Design Validation and Test Workshop 2002, 2002