default search action
Mohammed Ramadan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Mohammed Salah, Abdulla Ayyad, Mohammed Ramadan, Yusra Abdulrahman, Dewald Swart, Abdelqader Abusafieh, Lakmal D. Seneviratne, Yahya H. Zweiri:
High speed neuromorphic vision-based inspection of countersinks in automated manufacturing processes. J. Intell. Manuf. 35(7): 3067-3081 (2024) - 2023
- [j11]Mohammed Ramadan, Shahid Raza:
Secure Equality Test Technique Using Identity-Based Signcryption for Telemedicine Systems. IEEE Internet Things J. 10(18): 16594-16604 (2023) - [c5]Mohammed Ramadan, Ghada Elbez, Veit Hagenmeyer:
Verifiable Certificateless Signcryption Scheme for Smart Grids. ICSRS 2023: 181-189 - [i2]Mohammed Salah, Abdulla Ayyad, Mohammed Ramadan, Yusra Abdulrahman, Dewald Swart, Abdelqader Abusafieh, Lakmal D. Seneviratne, Yahya H. Zweiri:
High Speed Neuromorphic Vision-Based Inspection of Countersinks in Automated Manufacturing Processes. CoRR abs/2304.04108 (2023) - 2022
- [c4]Mohammed Ramadan, Shahid Raza:
A Look-ahead Towards 6G Security (Abstract). CW 2022: 259-260 - [c3]Mohammed Ramadan, Shahid Raza:
Broadband Jamming Suppression at Subarray Level for Frequency Diverse Array Antenna. SITIS 2022: 231-237 - 2021
- [j10]Hisham Abdalla, Hu Xiong, Abubaker Wahaballa, Mohammed Ramadan, Zhiguang Qin:
Equality test with an anonymous authorization in cloud computing. Wirel. Networks 27(2): 1063-1076 (2021) - 2020
- [j9]Mohammed Ramadan, Yongjian Liao, Fagen Li, Shijie Zhou:
Identity-Based Signature With Server-Aided Verification Scheme for 5G Mobile Systems. IEEE Access 8: 51810-51820 (2020) - [j8]Mohammed Ramadan, Yongjian Liao, Fagen Li, Shijie Zhou, Hisham Abdalla:
IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks. Mob. Networks Appl. 25(1): 223-233 (2020)
2010 – 2019
- 2019
- [j7]Yongjian Liao, Hongjie Chen, Wen Huang, Mohammed Ramadan, Hongtao Pan, Shijie Zhou:
Insecurity of an IBEET Scheme and an ABEET Scheme. IEEE Access 7: 25087-25094 (2019) - [j6]Yongjian Liao, Yu Fan, Yukuan Liang, Yulu Liu, Mohammed Ramadan:
Cryptanalysis of an Identity-Based Encryption Scheme With Equality Test and Improvement. IEEE Access 7: 75067-75072 (2019) - 2018
- [j5]Yongjian Liao, Hongjie Chen, Fagen Li, Shaoquan Jiang, Shijie Zhou, Mohammed Ramadan:
Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test. IEEE Access 6: 10189-10196 (2018) - [c2]Mohammed Ramadan, Vladica Sark, Jesús Gutiérrez Terán, Eckhard Grass:
NLOS Identification for Indoor Localization using Random Forest Algorithm. WSA 2018: 1-5 - 2017
- [j4]Hisham Abdalla, Hu Xiong, Abubaker Wahaballa, Ahmed Abdalla Ali, Mohammed Ramadan, Zhiguang Qin:
Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme. Int. J. Netw. Secur. 19(1): 27-38 (2017) - 2016
- [j3]Mohammed Ramadan, Fagen Li, Chunxiang Xu, Abdeldime Mohamed, Hisham Abdalla, Ahmed Abdalla Ali:
User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System. Int. J. Netw. Secur. 18(4): 769-781 (2016) - [j2]Mohammed Ramadan, Guo-hong Du, Fagen Li, Chunxiang Xu:
A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems. Symmetry 8(9): 85 (2016) - 2015
- [j1]Ahmed Abdalla Ali, Yuan Zhao, Mohammed Ramadan, Bin Tang:
An Improved Radar ECCM Method Based on Orthogonal Pulse Block and Parallel Matching Filter. J. Commun. 10(8): 610-614 (2015) - [c1]Gerhard Wunder, Peter Jung, Mohammed Ramadan:
Compressive Random Access Using a Common Overloaded Control Channel. GLOBECOM Workshops 2015: 1-6 - [i1]Gerhard Wunder, Peter Jung, Mohammed Ramadan:
Compressive Random Access Using A Common Overloaded Control Channel. CoRR abs/1504.05318 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint