Bassam Jamil Mohd
Orcid: 0000-0002-9805-1740
According to our database1,
Bassam Jamil Mohd
authored at least 40 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Intell. Serv. Robotics, July, 2024
2023
A Review on Blockchain and IoT Integration from Energy, Security and Hardware Perspectives.
Wirel. Pers. Commun., April, 2023
2022
Int. J. Electron. Secur. Digit. Forensics, 2022
2021
Run-Time Monitoring and Validation Using Reverse Function (RMVRF) for Hardware Trojans Detection.
IEEE Trans. Dependable Secur. Comput., 2021
Hardware Trojan detection for lightweight ciphers implemented on field-programmable gate arrays using the replay algorithm.
Int. J. Circuit Theory Appl., 2021
Performance evaluation of the SM4 cipher based on field-programmable gate array implementation.
IET Circuits Devices Syst., 2021
An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices.
Clust. Comput., 2021
2020
Erratum to "An Energy-Efficient and Security Aware Route Selection Protocol for Wireless Sensor Networks".
Secur. Commun. Networks, 2020
2019
Peer-to-Peer Netw. Appl., 2019
J. Sens. Actuator Networks, 2019
IET Circuits Devices Syst., 2019
2018
J. Sens. Actuator Networks, 2018
Future Gener. Comput. Syst., 2018
IEEE Access, 2018
2017
An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications.
IEEE Syst. J., 2017
2016
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks.
Sensors, 2016
Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation.
Secur. Commun. Networks, 2016
Int. J. Electron. Secur. Digit. Forensics, 2016
2015
A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues.
J. Netw. Comput. Appl., 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
An energy-efficient and security aware route selection protocol for wireless sensor networks.
Secur. Commun. Networks, 2014
J. Circuits Syst. Comput., 2014
Int. J. Inf. Commun. Technol., 2014
Proceedings of the 9th International Conference on Body Area Networks, 2014
2013
Signal Image Video Process., 2013
J. Comput., 2013
Int. J. Electron. Secur. Digit. Forensics, 2013
2012
Int. J. Circuit Theory Appl., 2012
2011
Proceedings of the Signal Processing and Information Technology, 2011
2009
Proceedings of the 20th IEEE International Conference on Application-Specific Systems, 2009
2007
The Hazard-Free Superscalar Pipeline Fast Fourier Transform Architecture and Algorithm.
Proceedings of the VLSI-SoC: Advanced Topics on Systems on a Chip, 2007
The hazard-free superscalar pipeline fast fourier transform algorithm and architecture.
Proceedings of the IFIP VLSI-SoC 2007, 2007
Contention-free switch-based implementation of 1024-point Radix-2 Fourier Transform Engine.
Proceedings of the 25th International Conference on Computer Design, 2007
2002
Proceedings of the Seventh IEEE International High-Level Design Validation and Test Workshop 2002, 2002