Mohammad Umar Siddiqi
Orcid: 0000-0001-5938-9389Affiliations:
- International Islamic University Malaysia, Faculty of Engineering, Kuala Lumpur, Malaysia
- Multimedia University, Faculty of Engineering, Cyberjaya, Malaysia (former)
- Indian Institute of Technology Kanpur, India (PhD 1976)
According to our database1,
Mohammad Umar Siddiqi
authored at least 33 papers
between 1992 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2019
2015
Analysing and Improving Performance and Security of Cryptographically Generated Address Algorithm for Mobile IPv6 Networks.
Int. J. Netw. Secur., 2015
Simulation Study of a Many-to-One Mapping for IPv6 Address Owner Identification in an Enterprise Local Area Network.
Int. J. Netw. Secur., 2015
2008
IEEE Trans. Commun., 2008
2007
EURASIP J. Adv. Signal Process., 2007
2006
IEICE Electron. Express, 2006
EURASIP J. Wirel. Commun. Netw., 2006
ESKD: An Efficient and Scalable Key Distribution Scheme for Secure Group Communication.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006
2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Computational Science and Its Applications, 2005
Geometrically-based space-time deterministic mutipath fading channel model with application to spatial correlation verification of multi-antenna systems.
Proceedings of the 13th European Signal Processing Conference, 2005
Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
2004
EURASIP J. Adv. Signal Process., 2004
Implementation of a Time-Out Based Locking Algorithm for Mobile Transactions in XML Databases.
Proceedings of the iiWAS'2004, 2004
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity.
Proceedings of the Applied Cryptography and Network Security, 2004
2003
Computational complexity and implementation aspects of the incremental hash function.
IEEE Trans. Consumer Electron., 2003
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003
2001
Proceedings of the Progress in Cryptology, 2001
2000
Appl. Algebra Eng. Commun. Comput., 2000
1998
Optimal Large Linear Complexity Frequency Hopping Patterns Derived from Polynomial Residue Class Rings.
IEEE Trans. Inf. Theory, 1998
IEEE Trans. Inf. Theory, 1998
Optimal and Suboptimal Quadriphase Sequences Derived from Maximal Length Sequences over Z<sub>4</sub>.
Appl. Algebra Eng. Commun. Comput., 1998
1997
MAP estimation of finite gray-scale digital images corrupted by supremum/infimum noise.
IEEE Trans. Image Process., 1997
1996
Optimal biphase sequences with large linear complexity derived from sequences over Z<sub>4</sub>.
IEEE Trans. Inf. Theory, 1996
A simplified algorithm for approximate separable decomposition of morphological templates.
Pattern Recognit., 1996
Proceedings of the 3th International Symposium on Mathematical Morphology and its Applications to Image and Signal Processing, 1996
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996
1995
IEEE Trans. Signal Process., 1995
1994
IEEE Trans. Inf. Theory, 1994
Appl. Algebra Eng. Commun. Comput., 1994
1992