Naveed Ahmed

According to our database1, Naveed Ahmed authored at least 33 papers between 2007 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




A pressure-robust discretization of Oseen's equation using stabilization in the vorticity equation.
CoRR, 2020

RFI Localization in a Collaborative Navigation Environment.
Proceedings of the International Conference on Localization and GNSS (ICL-GNSS 2020), Tampere, Finland, June 2nd to 4th, 2020, 2020

Higher-order discontinuous Galerkin time discretizations the evolutionary Navier-Stokes equations.
CoRR, 2019

Money matters: exploring opportunities in digital donation to mosques in Pakistan.
Proceedings of the Tenth International Conference on Information and Communication Technologies and Development, 2019

Web Server Integrity Protection Using Blockchain.
Proceedings of the International Conference on Frontiers of Information Technology, 2019

Security Against Compromised Servers: Verifiable DB Queries.
Proceedings of the International Conference on Frontiers of Information Technology, 2019

On Really Locking-Free Mixed Finite Element Methods for the Transient Incompressible Stokes Equations.
SIAM J. Numer. Anal., 2018

Towards Pressure-Robust Mixed Methods for the Incompressible Navier-Stokes Equations.
Comput. Methods Appl. Math., 2018

A local projection stabilization/continuous Galerkin-Petrov method for incompressible flow problems.
Appl. Math. Comput., 2018

Accuracy and Performance Analysis of Time Coherent 3D Animation Reconstruction from RGB-D Video.
Proceedings of the Trends and Advances in Information Systems and Technologies, 2018

Enhanced Azimuth Resolution for Spaceborne Interrupted FMCW Sar Through Spectral Analysis.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

PVT-tolerant Current Reference Generation using different PTAT currents.
Microelectron. J., 2017

Multi-View RGB-D Video Analysis and Fusion for 360 Degrees Unified Motion Reconstruction.
J. Comput. Sci., 2017

ParMooN - A modernized program package based on mapped finite elements.
Comput. Math. Appl., 2017

Process and temperature invariant on-chip current reference circuit.
Proceedings of the First International Conference on Latest trends in Electrical Engineering and Computing Technologies, 2017

FLMF: Fractional least mean fourth algorithm for channel estimation in non-Gaussian environment.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

Numerical Study of SUPG and LPS Methods Combined with Higher Order Variational Time Discretization Schemes Applied to Time-Dependent Linear Convection-Diffusion-Reaction Equations.
J. Sci. Comput., 2016

A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs.
KSII Trans. Internet Inf. Syst., 2016

Wayfinding Behavior in India.
Proceedings of the Human-Computer Interaction - INTERACT 2015, 2015

Unified Skeletal Animation Reconstruction with Multiple Kinects.
Proceedings of the 35th Annual Conference of the European Association for Computer Graphics, 2014

Enabling Short Fragments for Uncoordinated Spread Spectrum Communication.
Proceedings of the Computer Security - ESORICS 2014, 2014

Error-rate-based fusion of biometric experts.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Efficient Deployment of Relay Stations in IEEE802.16m for Cost Effective Performance.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Structured intuition: a new methodology to analyse authentication protocols.
IJCCBS, 2012

A New Approach to Learning System in Cognitive Radio Based on Elman Networks.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

Post-Session Authentication.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

Towards Symbolic Encryption Schemes.
Proceedings of the Computer Security - ESORICS 2012, 2012

Finite element methods of an operator splitting applied to population balance equations.
J. Comput. Appl. Math., 2011

Private-key Symbolic Encryption.
IACR Cryptol. ePrint Arch., 2011

Adaptable Authentication Model: Exploring Security with Weaker Attacker Models.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

Demarcation of Security in Authentication Protocols.
Proceedings of the First SysSec Workshop 2011, 2011

A Mechanism for Identity Delegation at Authentication Level.
Proceedings of the Identity and Privacy in the Internet Age, 2009

On the MHD flow of a second grade fluid in a porous channel.
Comput. Math. Appl., 2007