Showing results 1 to 9 of 50
next >
Issue Date | Title | Author(s) |
2018 | A novel secret key generation based on image link | Sulaiman, A.H. ; Al-Shaikhli, I.F.T. ; Wahiddin, M.R. ; Houri, S. ; Jamil, N. ; Ismail, A.F. |
2011 | An observation of cryptographic properties of 256 one-dimensional cellular automata rules | Jamil, N. ; Mahmood, R. ; Zába, M.R. ; Zukamaen, Z.A. ; Udzir, N.I. |
2018 | Can convolution neural network (CNN) triumph in ear recognition of uniform illumination invariant? | Jamil, N. ; Almisreb, A.A. ; Ariffin, S.M.Z.S.Z. ; Md Din, N. ; Hamzah, R. |
2011 | Cellular automata based user authentication scheme using identity-bits commitment for Wireless Sensor Network | Jamil, N. ; Mahmood, R. |
2016 | Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle Dance | Isa, H. ; Jamil, N. ; Z’aba, M.R. |
2013 | Diffusion and statistical analysis of STITCH-256 | Jamil, N. ; Mahmod, R. ; Z'aba, M.R. ; Udzir, N.I. ; Zukarnain, Z.A. |
2018 | Entity entity -based parameterization for distinguishing distributed denial of service from flash events | Mohamed, M.A. ; Jamil, N. ; Abidin, A.F. ; Din, M.M. ; Nik, W.N.S.W. ; Mamat, A.R. |
2017 | Faster multicollisions attack on sponge construction | Hammad, B.T. ; Jamil, N. ; Zaba, M.R. ; Rusli, M.E. ; Ahmed, I.T. |
2017 | Implementation of lightweight cryptographic primitives | Hammad, B.T. ; Jamil, N. ; Rusli, M.E. ; Z’Aba, M.R. ; Ahmed, I.T. |