Mohammad Umar Siddiqi

Orcid: 0000-0001-5938-9389

Affiliations:
  • International Islamic University Malaysia, Faculty of Engineering, Kuala Lumpur, Malaysia
  • Multimedia University, Faculty of Engineering, Cyberjaya, Malaysia (former)
  • Indian Institute of Technology Kanpur, India (PhD 1976)


According to our database1, Mohammad Umar Siddiqi authored at least 33 papers between 1992 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Energy Harvesting Network With Wireless Distributed Computing.
IEEE Syst. J., 2019

2015
Analysing and Improving Performance and Security of Cryptographically Generated Address Algorithm for Mobile IPv6 Networks.
Int. J. Netw. Secur., 2015

Simulation Study of a Many-to-One Mapping for IPv6 Address Owner Identification in an Enterprise Local Area Network.
Int. J. Netw. Secur., 2015

2008
Multiple error detection and correction based on redundant residue number systems.
IEEE Trans. Commun., 2008

2007
Performance of JPEG Image Transmission Using Proposed Asymmetric Turbo Code.
EURASIP J. Adv. Signal Process., 2007

2006
A Framework for Describing Block Cipher Cryptanalysis.
IEEE Trans. Computers, 2006

Performance comparison of convolutional and block turbo codes.
IEICE Electron. Express, 2006

Key Management for Secure Multicast over IPv6 Wireless Networks.
EURASIP J. Wirel. Commun. Netw., 2006

ESKD: An Efficient and Scalable Key Distribution Scheme for Secure Group Communication.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

2005
Cryptanalysis of PASS II and MiniPass.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Related-Mode Attacks on Block Cipher Modes of Operation.
Proceedings of the Computational Science and Its Applications, 2005

Geometrically-based space-time deterministic mutipath fading channel model with application to spatial correlation verification of multi-antenna systems.
Proceedings of the 13th European Signal Processing Conference, 2005

Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

2004
Multiresolution Motion Estimation for Low-Rate Video Frame Interpolation.
EURASIP J. Adv. Signal Process., 2004

Implementation of a Time-Out Based Locking Algorithm for Mobile Transactions in XML Databases.
Proceedings of the iiWAS'2004, 2004

Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Computational complexity and implementation aspects of the incremental hash function.
IEEE Trans. Consumer Electron., 2003

Low rate video frame interpolation - challenges and solution.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

2001
Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining.
Proceedings of the Progress in Cryptology, 2001

2000
Generalized GMW Quadriphase Sequences Satisfying the Welch Bound with Equality.
Appl. Algebra Eng. Commun. Comput., 2000

1998
Optimal Large Linear Complexity Frequency Hopping Patterns Derived from Polynomial Residue Class Rings.
IEEE Trans. Inf. Theory, 1998

On Blahut's Decoding Algorithms for Two-Dimensional BCH Codes.
IEEE Trans. Inf. Theory, 1998

Optimal and Suboptimal Quadriphase Sequences Derived from Maximal Length Sequences over Z<sub>4</sub>.
Appl. Algebra Eng. Commun. Comput., 1998

1997
MAP estimation of finite gray-scale digital images corrupted by supremum/infimum noise.
IEEE Trans. Image Process., 1997

1996
Optimal biphase sequences with large linear complexity derived from sequences over Z<sub>4</sub>.
IEEE Trans. Inf. Theory, 1996

A simplified algorithm for approximate separable decomposition of morphological templates.
Pattern Recognit., 1996

Discrete Random Functions: Modeling and Analysis Using Mathematical Morphology.
Proceedings of the 3th International Symposium on Mathematical Morphology and its Applications to Image and Signal Processing, 1996

Statistical optimization of gray-scale morphological filters.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996

On MAP optimality of gray-scale morphological filters.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996

1995
Multivariate polynomial products over modular rings using residue arithmetic.
IEEE Trans. Signal Process., 1995

1994
A generalized DFT for Abelian codes over Z<sub>m</sub>.
IEEE Trans. Inf. Theory, 1994

Transform Domain Characterization of Cyclic Codes over Z<sub>m</sub>.
Appl. Algebra Eng. Commun. Comput., 1994

1992
Transform domain characterization of Abelian codes.
IEEE Trans. Inf. Theory, 1992


  Loading...