Follow
Amr Talaat Abdel-Hamid
Title
Cited by
Cited by
Year
A survey on IP watermarking techniques
AT Abdel-Hamid, S Tahar, EM Aboulhamid
Design Automation for Embedded Systems 9, 211-227, 2004
1162004
A robust FSM watermarking scheme for IP protection of sequential circuit design
A Cui, CH Chang, S Tahar, AT Abdel-Hamid
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2011
1152011
IP watermarking techniques: Survey and comparison
AT Abdel-Hamid, S Tahar, EM Aboulhamid
The 3rd IEEE International Workshop on System-on-Chip for Real-Time …, 2003
842003
A public-key watermarking technique for IP designs
AT Abdel-Hamid, S Tahar, EM Aboulhamid
Design, Automation and Test in Europe, 330-335, 2005
712005
Automatic severity classification of diabetic retinopathy based on densenet and convolutional block attention module
MM Farag, M Fouad, AT Abdel-Hamid
IEEE Access 10, 38299-38308, 2022
692022
A tool converting finite state machine to VHDL
AT Abdel-Hamid, M Zaki, S Tahar
Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat …, 2004
362004
FPGA implementation of dynamically reconfigurable IoT security module using algorithm hopping
S Soliman, MA Jaela, AM Abotaleb, Y Hassan, MA Abdelghany, ...
Integration 68, 108-121, 2019
292019
Verifying a synthesized implementation of IEEE-754 floating-point exponential function using HOL
B Akbarpour, AT Abdel-Hamid, S Tahar, J Harrison
The Computer Journal 53 (4), 465-488, 2010
262010
Finite state machine IP watermarking: A tutorial
AT Abdel-Hamid, S Tahar, EM Aboulhamid
First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06), 457-464, 2006
252006
Fragile IP watermarking techniques
AT Abdel-Hamid, S Tahar
2008 NASA/ESA Conference on Adaptive Hardware and Systems, 513-519, 2008
222008
A comprehensive taxonomy and analysis of IEEE 802.15. 4 attacks
YM Amin, AT Abdel-Hamid
Journal of Electrical and Computer Engineering 2016, 2016
212016
Formal analysis of the handover schemes in mobile WiMAX networks
AM Taha, AT Abdel-Hamid, S Tahar
2009 IFIP international conference on wireless and optical communications …, 2009
202009
Formal verification of IEEE 802.16 security sublayer using Scyther tool
AM Taha, AT Abdel-Hamid, S Tahar
2009 International Conference on Network and Service Security, 1-5, 2009
182009
A foldable textile-based broadband archimedean spiral rectenna for RF energy harvesting
RM El Khosht, MA El Feshawy, MA El Shorbagy, MN Farag, AE El Said, ...
2016 16th Mediterranean Microwave Symposium (MMS), 1-4, 2016
172016
On detecting IoT power signature anomalies using hidden Markov model (HMM)
MA Fouad, AT Abdel-Hamid
2019 31st International Conference on Microelectronics (ICM), 108-112, 2019
132019
Classification and analysis of IEEE 802.15. 4 PHY layer attacks
YM Amin, AT Abdel-Hamid
2016 International Conference on Selected Topics in Mobile & Wireless …, 2016
132016
Classification and analysis of IEEE 802.15. 4 MAC layer attacks
YM Amin, AT Abdel-Hamid
2015 11th International Conference on Innovations in Information Technology …, 2015
132015
A tool for automatic watermarking of IP designs
AT Abdel-Hamid, S Tahar, EM Aboulhamid
The 2nd Annual IEEE Northeast Workshop on Circuits and Systems, 2004. NEWCAS …, 2004
102004
Applications of smart-contracts: anonymous decentralized insurances with IoT sensors
O Mahmoud, H Kopp, AT Abdelhamid, F Kargl
2018 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2018
92018
A Simulation Model of IEEE 802.15. 4 GTS Mechanism and GTS Attacks in OMNeT++/MiXiM+ NETA.
YM Amin, AT Abdel-Hamid
Comput. Inf. Sci. 11 (1), 78-89, 2018
82018
The system can't perform the operation now. Try again later.
Articles 1–20