Personal information

Verified email domains

Information Security, Cryptography (PKC), Wireless/Mobile Security, Secure Energy systems.
China, Sweden, Denmark, Norway, Germany

Biography

Dr. Mohammed Ramadan earned his Ph.D. degree in 2016 from the University of Electronic Science and Technology of China (UESTC) in Chengdu, China, specializing in Information Security and Cryptography.

From 2017 to 2023, he held positions as a Researcher, Postdoc, Senior Researcher, and Assistant Professor at RISE - Research Institutes of Sweden in Stockholm, Sweden, IT University of Copenhagen (ITU) in Copenhagen, Denmark, UESTC, and Chengdu University of Information Technology (CUIT) in Chengdu, China.

He is currently employed as a Senior Researcher at Karlsruhe Institute of Technology (KIT) in Karlsruhe, Germany, where he focuses on cryptography for energy systems (SG, SS, DER).

His current research interests include Information/Cyber Security, Cryptography, Public-key Cryptography (PKC), Wireless/Mobile Security, and Secure Energy systems.

Activities

Works (33)

Verifiable Certificateless Signcryption Scheme for Smart Grids

2023 7th International Conference on System Reliability and Safety (ICSRS)
2023-11-22 | Conference paper
Contributors: Mohammed Ramadan; Ghada Elbez; Veit Hagenmeyer
Source: Self-asserted source
Mohammed Ramadan

Secure Equality Test Technique Using Identity-Based Signcryption for Telemedicine Systems

IEEE Internet of Things Journal
2023-09-15 | Journal article
Contributors: Mohammed Ramadan; Shahid Raza
Source: check_circle
Crossref

A Look-ahead Towards 6G Security (Abstract)

International Conference on Cyberworlds
2022 | Conference paper
Contributors: Ramadan, M.; Raza, S.
Source: check_circle
Web of Science Researcher Profile Sync

Broadband Jamming Suppression at Subarray Level for Frequency Diverse Array Antenna

International Conference on Signal-image Technology & Internet-based Systems, Sitis
2022 | Journal article
Contributors: Ramadan, Mohammed; Raza, Shahid
Source: check_circle
Web of Science Researcher Profile Sync

An adaptive filtering algorithm in pulse-Doppler radar for counteracting range-velocity jamming

International Journal of Electronics
2022-10-03 | Journal article
Contributors: Ahmed Abdalla; Mohammed Ramadan; Yongjian Liao; Shijie Zhou
Source: check_circle
Crossref

Equality test with an anonymous authorization in cloud computing

Wireless Networks
2021-02 | Journal article
Contributors: Hisham Abdalla; Hu Xiong; Abubaker Wahaballa; Mohammed Ramadan; Zhiguang Qin
Source: check_circle
Crossref

IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks

Mobile Networks and Applications
2020 | Journal article
EID:

2-s2.0-85065238936

Contributors: Ramadan, M.; Liao, Y.; Li, F.; Zhou, S.; Abdalla, H.
Source: Self-asserted source
Mohammed Ramadan via Scopus - Elsevier

Identity-based signature with server-aided verification scheme for 5g mobile systems

IEEE Access
2020 | Journal article
EID:

2-s2.0-85082531913

Contributors: Ramadan, M.; Liao, Y.; Li, F.; Zhou, S.
Source: Self-asserted source
Mohammed Ramadan via Scopus - Elsevier

Cryptanalysis of an Identity-Based Encryption Scheme With Equality Test and Improvement

IEEE Access
2019 | Journal article | Author
Contributors: Yongjian Liao; Yu Fan; Yukuan Liang; Yulu Liu; Mohammed Ramadan
Source: check_circle
Repository KITopen (Karlsruhe Institute of Technology)

Insecurity of an IBEET Scheme and an ABEET Scheme

IEEE Access
2019-02-21 | Journal article | Author
Contributors: Yongjian Liao; Hongjie Chen; Wen Huang; Mohammed Ramadan; Hongtao Pan; Shijie Zhou
Source: check_circle
Repository KITopen (Karlsruhe Institute of Technology)

Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test

IEEE Access
2018 | Journal article | Author
Contributors: Yongjian Liao; Hongjie Chen; Fagen Li; Shaoquan Jiang; Shijie Zhou; Mohammed Ramadan
Source: check_circle
Repository KITopen (Karlsruhe Institute of Technology)

Integrating the functional encryption and proxy re-cryptography to secure DRM scheme

International Journal of Network Security
2017 | Journal article
EID:

2-s2.0-85014105205

Contributors: Abdalla, H.; Hu, X.; Wahaballa, A.; Abdalla, A.; Ramadan, M.; Zhiguang, Q.
Source: Self-asserted source
Mohammed Ramadan via Scopus - Elsevier

Overview of frequency diverse array in radar ECCM applications

Proceedings - 2017 International Conference on Communication, Control, Computing and Electronics Engineering, ICCCCEE 2017
2017 | Conference paper
EID:

2-s2.0-85016627330

Contributors: Abdalla, A.; Abdalla, H.; Ramadan, M.; Mohamed, S.; Bin, T.
Source: Self-asserted source
Mohammed Ramadan via Scopus - Elsevier

Overview of Frequency Diverse Array in Radar ECCM Applications

International Conference on Communication, Control, Computing and Electronics Engineering (ICCCCEE)
2017 | Conference paper
Contributors: Abdalla, Ahmed; Abdalla, Hisham; Ramadan, Mohammed; Mohamed, Suhad; Bin, Tang
Source: check_circle
Web of Science Researcher Profile Sync

Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme

International journal of network security
2017-01 | Journal article | Author
Contributors: Abdalla Hisham; Abubaker Wahaballa; Ahmed Abdalla; Mohammed Ramadan; Qin Zhiguang; Hu Xiong
Source: check_circle
Repository KITopen (Karlsruhe Institute of Technology)

A survey of public key infrastructure-based security for mobile communication systems

Symmetry
2016 | Journal article
EID:

2-s2.0-84990050531

Contributors: Ramadan, M.; Du, G.; Li, F.; Xu, C.
Source: Self-asserted source
Mohammed Ramadan via Scopus - Elsevier

An efficient and secure certificateless public key watermarking scheme based on 1VD-DWT

Proceedings of 2016 IEEE International Conference on Cloud Computing and Big Data Analysis, ICCCBDA 2016
2016 | Conference paper
EID:

2-s2.0-84983356901

Contributors: Wahballa, O.; Abdalla, A.; Hamdnaalla, K.; Ramadan, M.; Xu, C.
Source: Self-asserted source
Mohammed Ramadan via Scopus - Elsevier

An Efficient and Secure Certificateless Public Key Watermarking Scheme Based on SVD-DWT

PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA)
2016 | Journal article
Contributors: Wahballa, Osman; Abdalla, Ahmed; Hamdnaalla, Khalid; Ramadan, Mohammed; Xu, Chunxiang
Source: check_circle
Web of Science Researcher Profile Sync

An efficient end-to-end mutual authentication scheme for 2G-GSM system

Proceedings of 2016 IEEE International Conference on Big Data Analysis, ICBDA 2016
2016 | Conference paper
EID:

2-s2.0-84981316078

Contributors: Ramadan, M.; Li, F.; Xu, C.X.; Abdalla, A.; Abdalla, H.
Source: Self-asserted source
Mohammed Ramadan via Scopus - Elsevier

An Efficient End-to-End Mutual Authentication Scheme for 2G-GSM System

Proceedings of IEEE International Conference on Big Data Analysis
2016 | Journal article
Contributors: Ramadan, Mohammed; Li, Fagen; Xu, Chun Xiang; Abdalla, Ahmed; Abdalla, Hisham
Source: check_circle
Web of Science Researcher Profile Sync

Digital Rights Management - Current Status and Future Trends

Proceedings - 2016 3rd International Conference on Information Science and Control Engineering, ICISCE 2016
2016 | Conference paper
EID:

2-s2.0-85000956366

Contributors: Abdalla, H.; Hu, X.; Wahaballa, A.; Abdalla, A.; Ramadan, M.; Zhiguang, Q.
Source: Self-asserted source
Mohammed Ramadan via Scopus - Elsevier

EEE-GSM: End-to-end encryption scheme over GSM system

International Journal of Security and its Applications
2016 | Journal article
EID:

2-s2.0-84981320697

Contributors: Ramadan, M.; Du, G.; Li, F.; Xu, C.X.
Source: Self-asserted source
Mohammed Ramadan via Scopus - Elsevier

Efficient functional encryption and proxy re-cryptography for secure public cloud data sharing

Proceedings of 2016 IEEE International Conference of Online Analysis and Computing Science, ICOACS 2016
2016 | Conference paper
EID:

2-s2.0-84989159369

Contributors: Abdallai, H.; Hu, X.; Wahaballa, A.; Eltayieb, N.; Ramadan, M.; Zhiguang, Q.
Source: Self-asserted source
Mohammed Ramadan via Scopus - Elsevier

Sources Localization via Multi-Dimesional Scaling Based On Subspace Method

IEEE Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)
2016 | Conference paper
Contributors: Ahmed, Hesham Ibrahim; Qun, Wan; Ramadan, M.; Ding Xue-Ke; Zhou Zhi-Ping
Source: check_circle
Web of Science Researcher Profile Sync

User-to-user mutual authentication and key agreement scheme for LTE cellular system

International Journal of Network Security
2016 | Journal article
EID:

2-s2.0-84953450009

Contributors: Ramadan, M.; Li, F.; Xu, C.X.; Mohamed, A.; Abdalla, H.; Abdalla, A.
Source: Self-asserted source
Mohammed Ramadan via Scopus - Elsevier

User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System

International journal of network security
2016-07 | Journal article | Author
Contributors: Mohammed Ramadan; Fagen Li; ChunXiang Xu; Abdeldime Mohamed; Hisham Abdalla; Ahmed Abdalla
Source: check_circle
Repository KITopen (Karlsruhe Institute of Technology)

A taxonomy of secure electronic English auction protocols

International Journal of Computers and Applications
2015 | Journal article
EID:

2-s2.0-85015293950

Contributors: Wahaballa, A.; Qin, Z.; Xiong, H.; Qin, Z.; Ramadan, M.
Source: Self-asserted source
Mohammed Ramadan via Scopus - Elsevier

An improved radar ECCM method based on orthogonal pulse block and parallel matching filter

Journal of Communications
2015 | Journal article
EID:

2-s2.0-84940387595

Contributors: Abdalla, A.; Yuan, Z.; Ramadan, M.; Bin, T.
Source: Self-asserted source
Mohammed Ramadan via Scopus - Elsevier

Authentication and key agreement scheme for CDMA cellular system

Proceedings of 2015 IEEE International Conference on Communication Software and Networks, ICCSN 2015
2015 | Conference paper
EID:

2-s2.0-84983161473

Contributors: Ramadan, M.; Li, F.; Xu, C.X.; Oteng, K.; Ibrahim, H.
Source: Self-asserted source
Mohammed Ramadan via Scopus - Elsevier

End-to-End Encryption for GSM Cellular Standard Using CL-PKC

INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS)
2015 | Journal article
Contributors: Ramadan, Mohammed; Li, Fa-Gen; Xu, Chun-Xiang; Wahaballa, Abubaker
Source: check_circle
Web of Science Researcher Profile Sync

A Study of a various Acoustic Beamforming Techniques Using a Microphone Array

Journal of Communications Technology, Electronics and Computer Science (JCTECS)
2015-10-22 | Journal article | Author
Contributors: Ahmed Abdalla; Suhad Mohammed; Abdelazeim Abdalla; Tang Bin; Mohammed Ramadan; He Peiyu
Source: check_circle
Repository KITopen (Karlsruhe Institute of Technology)

Multiple-Layered Securities Using Steganography and Cryptography

International Journal of Computers and Applications
2014 | Journal article | Author
Contributors: Abubaker Wahaballa; Osman Wahballa; Fagen Li; Mohammed Ramadan; Zhiguang Qin
Source: check_circle
Repository KITopen (Karlsruhe Institute of Technology)

Simple and efficient algorithm for automatic modulation recognition for analogue and digital signals

Lecture Notes in Electrical Engineering
2014 | Book
EID:

2-s2.0-84897047218

Contributors: Dahap, B.I.; Hongshu, L.; Ramadan, M.
Source: Self-asserted source
Mohammed Ramadan via Scopus - Elsevier

Peer review (1 review for 1 publication/grant)

Review activity for IEEE internet of things journal. (1)