default search action
Mohammad Umar Siddiqi
Person information
- affiliation: International Islamic University Malaysia, Faculty of Engineering, Kuala Lumpur, Malaysia
- affiliation (former): Multimedia University, Faculty of Engineering, Cyberjaya, Malaysia
- affiliation (PhD 1976): Indian Institute of Technology Kanpur, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j21]Mohammed Alfaqawi, Mohamed Hadi Habaebi, Md. Rafiqul Islam, Mohammad Umar Siddiqi:
Energy Harvesting Network With Wireless Distributed Computing. IEEE Syst. J. 13(3): 2605-2616 (2019) - 2015
- [j20]Nashrul Hakiem, Mohammad Umar Siddiqi, Hashum Mohamed Rafiq:
Simulation Study of a Many-to-One Mapping for IPv6 Address Owner Identification in an Enterprise Local Area Network. Int. J. Netw. Secur. 17(1): 49-56 (2015) - [j19]Sana Qadir, Mohammad Umar Siddiqi, Wajdi F. M. Al-Khateeb:
Analysing and Improving Performance and Security of Cryptographically Generated Address Algorithm for Mobile IPv6 Networks. Int. J. Netw. Secur. 17(5): 535-547 (2015)
2000 – 2009
- 2008
- [j18]Vik Tor Goh, Mohammad Umar Siddiqi:
Multiple error detection and correction based on redundant residue number systems. IEEE Trans. Commun. 56(3): 325-330 (2008) - 2007
- [j17]K. Ramasamy, Mohammad Umar Siddiqi, Mohamad Yusoff Alias:
Performance of JPEG Image Transmission Using Proposed Asymmetric Turbo Code. EURASIP J. Adv. Signal Process. 2007 (2007) - 2006
- [j16]Win Aye, Mohammad Umar Siddiqi:
Key Management for Secure Multicast over IPv6 Wireless Networks. EURASIP J. Wirel. Commun. Netw. 2006 (2006) - [j15]K. Ramasamy, Mohammad Umar Siddiqi, Mohamad Yusoff Alias, A. Arunagiri:
Performance comparison of convolutional and block turbo codes. IEICE Electron. Express 3(13): 322-327 (2006) - [j14]Raphael C.-W. Phan, Mohammad Umar Siddiqi:
A Framework for Describing Block Cipher Cryptanalysis. IEEE Trans. Computers 55(11): 1402-1409 (2006) - [c12]Win Aye, Mohammad Umar Siddiqi:
ESKD: An Efficient and Scalable Key Distribution Scheme for Secure Group Communication. ICN/ICONS/MCL 2006: 75 - 2005
- [c11]Bok-Min Goi, Raphael Chung-Wei Phan, M. U. Siddiqi:
Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004. EUC Workshops 2005: 936-944 - [c10]Arastoo Rostami-Ravarai, Borhanuddin Mohd Ali, S. S. Jamuar, M. U. Siddiqi:
Geometrically-based space-time deterministic mutipath fading channel model with application to spatial correlation verification of multi-antenna systems. EUSIPCO 2005: 1-4 - [c9]Raphael Chung-Wei Phan, Mohammad Umar Siddiqi:
Related-Mode Attacks on Block Cipher Modes of Operation. ICCSA (3) 2005: 661-671 - [c8]Bok-Min Goi, Jintai Ding, Mohammad Umar Siddiqi:
Cryptanalysis of PASS II and MiniPass. ICICS 2005: 159-168 - 2004
- [j13]Hezerul Abdul Karim, Michel Bister, Mohammad Umar Siddiqi:
Multiresolution Motion Estimation for Low-Rate Video Frame Interpolation. EURASIP J. Adv. Signal Process. 2004(11): 1708-1720 (2004) - [c7]Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi:
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. ACNS 2004: 369-382 - [c6]G. Radhamani, Mohammad Umar Siddiqi:
Implementation of a Time-Out Based Locking Algorithm for Mobile Transactions in XML Databases. iiWAS 2004 - 2003
- [j12]Bok-Min Goi, M. U. Siddiqi, Hean-Teik Chuah:
Computational complexity and implementation aspects of the incremental hash function. IEEE Trans. Consumer Electron. 49(4): 1249-1255 (2003) - [c5]Hezerul Abdul Karim, Michel Bister, Mohammad Umar Siddiqi:
Low rate video frame interpolation - challenges and solution. ICASSP (3) 2003: 117-120 - 2001
- [c4]Bok-Min Goi, M. U. Siddiqi, Hean-Teik Chuah:
Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining. INDOCRYPT 2001: 50-61 - 2000
- [j11]Parampalli Udaya, M. U. Siddiqi:
Generalized GMW Quadriphase Sequences Satisfying the Welch Bound with Equality. Appl. Algebra Eng. Commun. Comput. 10(3): 203-225 (2000)
1990 – 1999
- 1998
- [j10]Parampalli Udaya, M. U. Siddiqi:
Optimal and Suboptimal Quadriphase Sequences Derived from Maximal Length Sequences over Z4. Appl. Algebra Eng. Commun. Comput. 9(2): 161-191 (1998) - [j9]H. S. Madhusudhana, M. U. Siddiqi:
On Blahut's Decoding Algorithms for Two-Dimensional BCH Codes. IEEE Trans. Inf. Theory 44(1): 358-367 (1998) - [j8]Parampalli Udaya, M. U. Siddiqi:
Optimal Large Linear Complexity Frequency Hopping Patterns Derived from Polynomial Residue Class Rings. IEEE Trans. Inf. Theory 44(4): 1492-1503 (1998) - 1997
- [j7]Balvinder Singh, Mohammad Umar Siddiqi:
MAP estimation of finite gray-scale digital images corrupted by supremum/infimum noise. IEEE Trans. Image Process. 6(8): 1077-1088 (1997) - 1996
- [j6]Balvinder Singh, M. U. Siddiqi:
A simplified algorithm for approximate separable decomposition of morphological templates. Pattern Recognit. 29(9): 1519-1522 (1996) - [j5]Parampalli Udaya, M. U. Siddiqi:
Optimal biphase sequences with large linear complexity derived from sequences over Z4. IEEE Trans. Inf. Theory 42(1): 206-216 (1996) - [c3]Balvinder Singh, M. U. Siddiqi:
On MAP optimality of gray-scale morphological filters. ICIP (3) 1996: 29-32 - [c2]Balvinder Singh, M. U. Siddiqi:
Statistical optimization of gray-scale morphological filters. ICIP (3) 1996: 33-36 - [c1]Balvinder Singh, M. U. Siddiqi:
Discrete Random Functions: Modeling and Analysis Using Mathematical Morphology. ISMM 1996: 65-72 - 1995
- [j4]Balvinder Singh, Mohammad Umar Siddiqi:
Multivariate polynomial products over modular rings using residue arithmetic. IEEE Trans. Signal Process. 43(5): 1310-1312 (1995) - 1994
- [j3]B. Sundar Rajan, M. U. Siddiqi:
Transform Domain Characterization of Cyclic Codes over Zm. Appl. Algebra Eng. Commun. Comput. 5: 261-275 (1994) - [j2]B. Sundar Rajan, M. U. Siddiqi:
A generalized DFT for Abelian codes over Zm. IEEE Trans. Inf. Theory 40(6): 2082-2090 (1994) - 1992
- [j1]B. Sundar Rajan, M. U. Siddiqi:
Transform domain characterization of Abelian codes. IEEE Trans. Inf. Theory 38(6): 1817-1821 (1992)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint