Bassam Jamil Mohd
According to our database1, Bassam Jamil Mohd authored at least 29 papers between 2002 and 2019.
Legend:Book In proceedings Article PhD thesis Other
FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher.
Analyzing Cyber-Physical Threats on Robotic Platforms.
Security Vulnerabilities in Bluetooth Technology as Used in IoT.
J. Sensor and Actuator Networks, 2018
Hardware design and modeling of lightweight block ciphers for secure communications.
Future Generation Comp. Syst., 2018
Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques.
IEEE Access, 2018
An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications.
IEEE Systems Journal, 2017
Extrinsic Calibration of Camera and 2D Laser Sensors without Overlap.
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks.
Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation.
Security and Communication Networks, 2016
A comparative study of steganography designs based on multiple FPGA platforms.
A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues.
J. Network and Computer Applications, 2015
Security Issues in WSNs with Cooperative Communication.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
MPLS technology in wireless networks.
Wireless Networks, 2014
An energy-efficient and security aware route selection protocol for wireless sensor networks.
Security and Communication Networks, 2014
QoS-Aware Health Monitoring System Using Cloud-Based WBANs.
J. Medical Systems, 2014
Analysis and Modeling of FPGA Implementations of Spatial Steganography Methods.
Journal of Circuits, Systems, and Computers, 2014
Software comprehension based on database relational algebra.
Public-Key Authentication for Cloud-based WBANs.
Proceedings of the 9th International Conference on Body Area Networks, 2014
Hierarchical steganography using novel optimum quantization technique.
Signal, Image and Video Processing, 2013
An Efficient Backup Technique for Database Systems Based on Threshold Sharing.
Wavelet-transform steganography: algorithm and hardware implementation.
Low power Wallace multiplier design based on wide counters.
I. J. Circuit Theory and Applications, 2012
A novel approach to enhance distributed virtual memory.
Computers & Electrical Engineering, 2012
Image Steganography Optimization Technique.
Proceedings of the Signal Processing and Information Technology, 2011
A Power-Scalable Switch-Based Multi-processor FFT.
Proceedings of the 20th IEEE International Conference on Application-Specific Systems, 2009
The Hazard-Free Superscalar Pipeline Fast Fourier Transform Architecture and Algorithm.
Proceedings of the VLSI-SoC: Advanced Topics on Systems on a Chip, 2007
The hazard-free superscalar pipeline fast fourier transform algorithm and architecture.
Proceedings of the IFIP VLSI-SoC 2007, 2007
Contention-free switch-based implementation of 1024-point Radix-2 Fourier Transform Engine.
Proceedings of the 25th International Conference on Computer Design, 2007
Constructing reusable testbenches.
Proceedings of the Seventh IEEE International High-Level Design Validation and Test Workshop 2002, 2002