IIUM Repository

Prof. Mohammad Umar Siddiqi

KULLIYYAH OF ENGINEERING

Profile Picture

Latest Additions

  1. Rafiq, Hashum M. and Siddiqi, Mohammad Umar (2015) Correlation immunity and resiliency of boolean functions from haar domain perspective. ARPN Journal of Engineering and Applied Sciences, 10 (22). pp. 17232-17238. ISSN 1819-6608
  2. Hakiem, Nashrul and Siddiqi, Mohammad Umar (2014) A cryptographic one-to-many reversible mapping and it's applications. In: 5th International Conference on Computer & Communication Engineering 2014 (ICCCE 2014) , 23rd - 25th September 2014, Kuala Lumpur. (Unpublished)
  3. Elshirkasi, Ahmed Mohamed and Siddiqi, Mohammad Umar and Habaebi, Mohamed Hadi (2014) Generalized discrete fourier transform based minimization of PAPR in OFDM systems. In: International Conference on Computer & Communication Engineering 2014, 23-25 Sept. 2014, Gombak, Kuala Lumpur.
  4. Qadir, Sana and Siddiqi, Mohammad Umar (2014) An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6. In: 2014 International Conference on Computer & Communication Engineering, 23-25 September, 2014, Kuala Lumpur, Malaysia.
  5. Qadir, Sana and Siddiqi, Mohammad Umar and Al-Khateeb, Khalid A. Saeed (2015) Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks. International Journal of Network Security, 17 (5). pp. 535-547. ISSN 1816-3548 (O), 1816-353X (P)
  6. Qadir, Sana and Siddiqi, Mohammad Umar and Al-Khateeb, Wajdi Fawzi Mohammed (2014) An investigation of the merkle signature scheme (MSS) for cryptographically generated address (CGA) signatures in mobile IPv6. International Journal of Network Security, 17 (3). pp. 311-321. ISSN 1816-3548 (O), 1816-353X (P)
  7. Hakiem, Nashrul and Siddiqi, Mohammad Umar and Jarot, Sigit Puspito W. and Priantoro, Akhmad Unggul (2014) Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation. Journal of Theoretical and Applied Information Technology. ISSN 1992-8645 (Print) 1817-3195 (Online) (In Press)
  8. Ali, Moaaz Elhag and Abdullah, Khaizuran and Siddiqi, Mohammad Umar and Ismail, Ahmad Fadzil (2013) Impulsive noise mitigation in Haar DWT based OFDM systems. In: 2013 IEEE 11th Malaysia International Conference on Communications, 26-28 November 2013, Kuala Lumpur, Malaysia.
  9. Tahir, Mohammad and Siddiqi, Mohammad Umar (2014) A hybrid scheme for wireless physical layer security based on encryption and channel pre-compensation. IETE Journal of Research Technical Review, 60 (4). pp. 1-9. ISSN 0256-4602 (P); 0974-5971 (O)
  10. Hakiem, Nashrul and Siddiqi, Mohammad Umar and Hashum , Mohamed Rafiq (2015) Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network. International Journal of Network Security, 17 (1). pp. 49-56. ISSN 1816-3548 (O), 1816-353X (P)
  11. Nashrul Hakiem, Nashrul Hakiem and Siddiqi, Mohammad Umar and Jarot, Sigit Puspito Wigati (2012) Collision probability of one-to-many reversible mapping for IPV6 address generation. In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Seri Pacific Hotel Kuala Lumpur.
  12. Rafiq, Hashum Mohamed and Siddiqi, Mohammad Umar (2012) Analysis and synthesis of cryptographic Boolean functions in Haar domain: Initial results. In: "International Conference on Computer and Communication Engineering (ICCCE 2012)", 3-5 July 2012, Seri Pacific Hotel Kuala Lumpur.
  13. Hakiem, Nashrul and Siddiqi, Muhammad Umar (2013) One-to-many reversible mapping for IPV6 address generation: Simulation software development. Journal of Theoretical and Applied Information Technology, 47 (3). pp. 893-901. ISSN 1992-8645 (Print) 1817-3195 (Online)
  14. Hakiem, Nashrul and Priantoro, Akhmad Unggul and Siddiqi, Mohammad Umar and Hasan, Talib Hashim (2012) Generation of IPv6 addresses based on one-to-many reversible mapping using AES. In: Recent Progress in Data Engineering and Internet Technology. Lecture Notes in Electrical Engineering, 2 (157). Springer-Verlag, Berlin Heidelberg, pp. 183-189. ISBN 978-3-642-28797-8
  15. Ramasamy, K. and Balamuralithara, B. and Siddiqi, Mohammad Umar (2009) Performance evaluation of proposed asymmetric turbo code in WCDMA HSDPA system. In: 5th IEEE GCC Conference and Exhibition 2009, 17-19 March 2009 , Kuwait City .
  16. Ramasamy, K. and Balamuralithara, B. and Siddiqi, Muhammad Umar (2009) Optimal power allocation for the proposed asymmetric turbo code for 3G systems. International Journal of Electronics and Communication (AEÜ) , 63. pp. 551-661. ISSN 1434-8411
  17. Qadir, Sana and Siddiqi, Mohammad Umar (2009) Performance evaluation of a secure Low Level Reader Protocol (LLRP) connection. International Journal of Computer Science and Network Security (IJCSNS), 9 (3). pp. 40-49. ISSN 1738-7906
  18. Qadir, Sana and Siddiqi, Mohammad Umar (2011) Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment. International Journal of Computer Science and Network Security (IJCSNS), 11 (2). pp. 24-31. ISSN 1738-7906
  19. Rajan, Sundar B. and Siddiqi, Mohammad Umar (1994) Transform domain characterization of cyclic codes over Zm. Applicable Algebra in Engineering, Communications and Computing, 5 (5). pp. 261-275. ISSN 0938-1279
  20. Udaya, Paramapalli and Siddiqi, Mohammad Umar (1996) Optimal biphase sequences with large linear complexity derived from sequences over Z4. IEEE Transactions on Information Theory, 42 (1). pp. 206-216. ISSN 0018-9448

Most Viewed Items

Item titleViews
1Performance evaluation of proposed asymmetric turbo code in WCDMA HSDPA system 1255
2One-to-many reversible mapping for IPV6 address generation: Simulation software development1229
3Impulsive noise mitigation in Haar DWT based OFDM systems1197
4Optimal power allocation for the proposed asymmetric turbo code for 3G systems1154
5Generation of IPv6 addresses based on one-to-many reversible mapping using AES1129
6Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment1099
7Haar transformation of linear boolean function1075
8Performance evaluation of a secure Low Level Reader Protocol (LLRP) connection989
9Collision probability of one-to-many reversible mapping for IPV6 address generation984
10Analysis and synthesis of cryptographic Boolean functions in Haar domain: Initial results904
11Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network773
12Transform domain characterization of cyclic codes over Zm770
13Optimal large linear complexity frequency hopping patterns derived from polynomial residue class rings761
14Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation 733
15Optimal biphase sequences with large linear complexity derived from sequences over Z4728
16Generalized discrete fourier transform based minimization of PAPR in OFDM systems688
17An investigation of the merkle signature scheme (MSS) for cryptographically generated address (CGA) signatures in mobile IPv6669
18A hybrid scheme for wireless physical layer security based on encryption and channel pre-compensation 663
19A framework for describing block cipher cryptanalysis657
20Correlation immunity and resiliency of boolean functions from haar domain perspective652
21An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6636
22A cryptographic one-to-many reversible mapping and it's applications629
23Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks617