Urmăriți
Mohammad Umar Siddiqi
Mohammad Umar Siddiqi
Professor, Faculty of Engineering, International Islamic University Malaysia
Adresă de e-mail confirmată pe iium.edu.my
Titlu
Citat de
Citat de
Anul
Multiple error detection and correction based on redundant residue number systems
VT Goh, MU Siddiqi
IEEE Transactions on Communications 56 (3), 325-330, 2008
1532008
Optimal large linear complexity frequency hopping patterns derived from polynomial residue class rings
P Udaya, MU Siddiqi
IEEE Transactions on Information Theory 44 (4), 1492-1503, 1998
1391998
Optimal biphase sequences with large linear complexity derived from sequences over Z/sub 4
P Udaya, MU Siddiqi
IEEE Transactions on Information Theory 42 (1), 206-216, 1996
621996
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
BM Goi, RCW Phan, Y Yang, F Bao, RH Deng, MU Siddiqi
Applied Cryptography and Network Security: Second International Conference …, 2004
582004
Optimal and Suboptimal Quadriphase Sequences Derived from Maximal Length Sequences over Z _ {{\bf 4}}
P Udaya, MU Siddiqi
Applicable Algebra in Engineering, Communication and Computing 9 (2), 161-191, 1998
531998
Transform domain characterization of cyclic codes overZ m
BS Rajan, MU Siddiqi
Applicable Algebra in Engineering, Communication and Computing 5, 261-275, 1994
381994
Transform domain characterization of abelian codes
BS Rajan, MU Siddiqi
IEEE transactions on information theory 38 (6), 1817-1821, 1992
361992
A generalized DFT for Abelian codes over Z/sub m
BS Rajan, MU Siddiqi
IEEE transactions on information theory 40 (6), 2082-2090, 1994
321994
Generalised impossible differentials of advanced encryption standard
RCW Phan, MU Siddiqi
Electronics Letters 37 (14), 1, 2001
292001
Cryptographically generated addresses (CGAs): A survey and an analysis of performance for use in mobile environment
S Qadir, MU Siddiqi
IJCSNS Int. J. Comput. Sci. Netw. Secur 11 (2), 24-31, 2011
282011
Generalized GMW quadriphase sequences satisfying the Welch bound with equality
P Udaya, MU Siddiqi
Applicable Algebra in Engineering, Communication and Computing 10 (3), 203-225, 2000
282000
Intelligent keystroke pressure-based typing biometrics authentication system using radial basis function network
A Sulong, MU Siddiqi
2009 5th International Colloquium on Signal Processing & Its Applications …, 2009
252009
A framework for describing block cipher cryptanalysis
RCW Phan, MU Siddiqi
IEEE Transactions on Computers 55 (11), 1402-1409, 2006
222006
Incremental hash function based on pair chaining & modular arithmetic combining
G Bok-Min, MU Siddiqi, C Hean-Teik
Progress in Cryptology—INDOCRYPT 2001: Second International Conference on …, 2001
222001
Large Linear Complexity Sequences Over Z/sub 4/For Quadriphase Modulated Communication Systems Having Good Correlation Properties
P Udaya, MU Siddiqi
Proceedings. 1991 IEEE International Symposium on Information Theory, 386-386, 1991
211991
Wireless physical layer security using encryption and channel pre-compensation
M Tahir, SPW Jarot, MU Siddiqi
2010 International Conference on Computer Applications and Industrial …, 2010
192010
A new class of asymmetric turbo code for 3G systems
K Ramasamy, MU Siddiqi
AEU-International Journal of Electronics and Communications 60 (6), 447-458, 2006
172006
Wireless physical layer security using channel state information
M Tahir, SPW Jarot, MU Siddiqi
International Conference on Computer and Communication Engineering (ICCCE'10 …, 2010
152010
Computational complexity and implementation aspects of the incremental hash function
BM Goi, MU Siddiqi, HT Chuah
IEEE Transactions on Consumer Electronics 49 (4), 1249-1255, 2003
142003
Haar transformation of linear boolean function
HM Rafiq, MU Siddiqi
2009 International Conference on Signal Processing Systems, 802-805, 2009
132009
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20