Mostafa Belkasmi

Orcid: 0000-0002-2790-0784

According to our database1, Mostafa Belkasmi authored at least 77 papers between 1991 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Mixed RF/FSO SWIPT-Based OSLMD Coded AF Cooperative Communication System: Performance Analysis.
IEEE Trans. Green Commun. Netw., March, 2023

A Systematic Literature Review on Authentication and Threat Challenges on RFID Based NFC Applications.
Future Internet, 2023

Mixed Coded RF/FSO EH-Based Communication System Subject to Multiuser Interference and Residual Hardware Impairments.
IEEE Access, 2023

Performance Analysis of Polar Codes Over Fox's H-Fading Channels With RHI and IQI Impairments.
IEEE Access, 2023

Performance Analysis of Coded CSOC-Assisted Energy Harvesting AF Dual-hop RF/FSO System.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023

ABEP Analysis of Coded and Uncoded Mixed RF/FSO Communication System SWIPT-based.
Proceedings of the International Conference on Information Networking, 2023

Construction of New Finite Geometry Non-Binary LDPC Codes With Reduced Alphabets.
Proceedings of the 6th International Conference on Advanced Communication Technologies and Networking, 2023

2022
A New Iterative Threshold Decoding Algorithm for non-binary OSMLD Codes.
Proceedings of the 5th International Conference on Advanced Communication Technologies and Networking, 2022

2020
A Scalable Group Authentication Scheme Based on Combinatorial Designs with Fault Tolerance for the Internet of Things.
SN Comput. Sci., 2020

Gradient-descent decoding of one-step majority-logic decodable codes.
Phys. Commun., 2020

A New Electronic Voting System Based on Elliptic Curve in a Cloud Computing Environment.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

2019
Bitcoin Security with Post Quantum Cryptography.
Proceedings of the Networked Systems - 7th International Conference, 2019

Error Probability Analysis for Dual-Hop Mixed RF-FSO System using CSOC Codes with MLGD Decoding.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

A Threshold Decoding Algorithm for Non-binary OSMLD Codes.
Proceedings of the Advanced Communication Systems and Information Security, 2019

An Efficient Semi-Algebraic Decoding Algorithm for Golay Code.
Proceedings of the Advanced Communication Systems and Information Security, 2019

Iterative Decoding of GSCB Codes Based on RS Codes Using Adapted Scaling Factors.
Proceedings of the Advanced Communication Systems and Information Security, 2019

2018
An Efficient and Secure Forward Error Correcting Scheme for DNA Data Storage.
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, 2018

A novel detector based on the compact genetic algorithm for MIMO systems.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2018

Construction and decoding of OSMLD codes derived from unital and oval designs.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2018

Bit error probability analysis for majority logic decoding of CSOC codes over fading channels.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2018

New efficient decoding algorithm of the (17, 9, 5) quadratic residue code.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2018

2017
Constructing accurate and robust HMM/GMM models for an Arabic speech recognition system.
Int. J. Speech Technol., 2017

One-step majority-logic decodable codes derived from oval designs.
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2017

New hard decision decoder of LDPC codes using single Bit Flipping algorithm.
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2017

Group Authentication with Fault Tolerance for Internet of Things.
Proceedings of the Ubiquitous Networking - Third International Symposium, 2017

An accurate HSMM-based system for Arabic phonemes recognition.
Proceedings of the Ninth International Conference on Advanced Computational Intelligence, 2017

A Closed Form Expression for the Bit Error Probability for Majority Logic Decoding of CSOC Codes over \varGamma \varGamma Γ Γ Channels.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2017

2016
Iterative Soft Permutation Decoding of Product Codes.
Comput. Inf. Sci., 2016

A novel mutual authentication scheme for low-cost RFID systems.
Proceedings of the 2016 International Conference on Wireless Networks and Mobile Communications, 2016

A saddle-point based approach for semi-analytical performance evaluation of a digital communication system.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Hybrid Encryption Approach Using Dynamic Key Generation and Symmetric Key Algorithm for RFID Systems.
Proceedings of the Networked Systems - 4th International Conference, 2016

Non-binary Euclidean Geometry codes: Majority Logic Decoding.
Proceedings of the International Conference on Advanced Communication Systems and Information Security, 2016

Non-binary cyclic majority-logic decodable codes: An algebraic construction by using Genetic Algorithms.
Proceedings of the International Conference on Advanced Communication Systems and Information Security, 2016

Construction and iterative threshold decoding for low rates Quasi-Cyclic One Step Majority logic decodable codes.
Proceedings of the International Conference on Advanced Communication Systems and Information Security, 2016

Authentication protocol conforming to EPC class-1 Gen-2 standard.
Proceedings of the International Conference on Advanced Communication Systems and Information Security, 2016

Majority logic coding schemes performance over FSO channels.
Proceedings of the International Conference on Advanced Communication Systems and Information Security, 2016

A novel efficient ultralightweight authentication algorithm for RFID systems.
Proceedings of the International Conference on Advanced Communication Systems and Information Security, 2016

New decoder for linear block codes.
Proceedings of the International Conference on Advanced Communication Systems and Information Security, 2016

An efficient soft decision decoding algorithm using cyclic permutations and compact genetic algorithm.
Proceedings of the International Conference on Advanced Communication Systems and Information Security, 2016

A reduced complexity decoder using compact genetic algorithm for linear block codes.
Proceedings of the International Conference on Advanced Communication Systems and Information Security, 2016

Many-to-one matching game towards secure virtual machines migration in cloud computing.
Proceedings of the International Conference on Advanced Communication Systems and Information Security, 2016

2015
A dynamic study with side channel against An Identification Based Encryption.
Int. J. Commun. Networks Inf. Secur., 2015

A semi-analytical performance prediction of a digital communication system using Fourier transform inversion.
EURASIP J. Wirel. Commun. Netw., 2015

Discovery of good double and triple circulant codes using multiple impulse method.
CoRR, 2015

Construction of cyclic one-step majority-logic decodable codes using genetic algorithms.
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2015

A variant of HB protocols based on permutation for low-cost RFID.
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2015

UWB outdoor channel characterization and modeling based on measurements.
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2015

Soft-decision decoding by a compact genetic algorithm using higher selection pressure.
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2015

Applying Encryption Algorithm for Data Security in Cloud Storage.
Proceedings of the Advances in Ubiquitous Networking, 2015

Compact Genetic Algorithms with larger tournament size for soft-decision decoding.
Proceedings of the 15th International Conference on Intelligent Systems Design and Applications, 2015

An efficient algorithm for data security in Cloud storage.
Proceedings of the 15th International Conference on Intelligent Systems Design and Applications, 2015

Degeneration simulated annealing algorithm for combinatorial optimization problems.
Proceedings of the 15th International Conference on Intelligent Systems Design and Applications, 2015

The filtered combination of the weighted edit distance and the Jaro-Winkler distance to improve spellchecking Arabic texts.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

An electronic voting system based on homomorphic encryption and prime numbers.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

2014
Fast performance prediction method for QPSK modulation.
Proceedings of the Fourth International Conference on Communications and Networking, 2014

Efficient vertical handover scheme on IMS network and cost analysis.
Proceedings of the Third IEEE International Colloquium in Information Science and Technology, 2014

2013
On the conventional public key in identification-based encryption: the case of RSA.
Int. J. Inf. Comput. Secur., 2013

Decoding of Block Codes by using Genetic Algorithms and Permutations Set.
Int. J. Commun. Networks Inf. Secur., 2013

On the Computing of the Minimum Distance of Linear Block Codes by Heuristic Methods
CoRR, 2013

Genetic algorithms for finding the weight enumerator of binary linear block codes
CoRR, 2013

Generalized parallel concatenated block codes based on BCH and RS codes, construction and Iterative decoding
CoRR, 2013

Performance prediction of a coded digital communication system using cross-validation.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

Improvement of QoS in IMS network using network coding.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013

2012
Efficient Dual Domain Decoding of Linear Block Codes Using Genetic Algorithms.
J. Electr. Comput. Eng., 2012

Cyptanalysis CDHP , BDHP and Tate pairing under certain conditions The Tate pairing is less secure than Weil.
IACR Cryptol. ePrint Arch., 2012

In the point of view security, An efficient scheme in IBE with random oracle.
IACR Cryptol. ePrint Arch., 2012

New results for Shannon capacity over generalized multipath fading channels with MRC diversity.
EURASIP J. Wirel. Commun. Netw., 2012

A Method to determine Partial Weight Enumerator for Linear Block Codes
CoRR, 2012

An Efficient Soft Decoder of Block Codes Based on Compact Genetic Algorithm
CoRR, 2012

Iterative decoding of Generalized Parallel Concatenated Block codes using cyclic permutations
CoRR, 2012

An efficient classification in IBE Provide with an improvement of BB2 to an efficient Commutative Blinding scheme
CoRR, 2012

Evaluation of hybrid geo-location based on UMTS and GPS technologies.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

A new genetic decoding of Linear Block Codes.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

An efficient method to find the minimum distance of linear block codes.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

Spatial Correlation Characterization for UWB Indoor Channel Based on Measurements.
Proceedings of the Image and Signal Processing - 5th International Conference, 2012

2011
Identification Based Encryption with RSA-OAEP. Using SEM and Without.
IACR Cryptol. ePrint Arch., 2011

1991
An Algebraic Construction of Generalized Beenker's Codes.
Proceedings of the Applied Algebra, 1991


  Loading...