Loading... 2 0 20 0 false
Roz.jpg picture
Credit Name
Rozita Ismail
Full Name
Ismail, R.
Email
Irozita@uniten.edu.my
 
Loading... 3 0 20 0 false

Publications

Results 1-16 of 16 (Search time: 0.0 seconds).

Issue DateTitleAuthor(s)
12014Preserving privacy for mobile ad-hoc network emergency services via heterogeneous access control modelBakar, A.A. ; El-Talib, E.-M.H. ; Ismail, R. 
22015Interface design for young dyslexics: A survey on visual representationIsmail, R. ; Jaafar, A. 
32015Interface design for dyslexia: Teachers’ perception on text presentationIsmail, R. ; Jaafar, A. 
42011Interactive screen-based design for dyslexic childrenIsmail, R. ; Jaafar, A. 
52014Important features in text presentation for children with dyslexiaIsmail, R. ; Jaafar, A. 
62009Forming trust in mobile ad -hoc networkAbu Bakar, A. ; Ismail, R. ; Jais, J. ; Abdul Manan, J.-L. 
72008Congestion avoidance: Network based schemes solutionShaii, A.Q. ; Ismail, R. ; Jais, J. ; Manan, J. 
82016Ascertaining trust of information transmitted during a disasterYusoff, Y. ; Bakar, A.A. ; Aziz, N. ; Ismail, R. ; Ramli, R. 
92015An authentication mechanism for heterogeneous access control model in MANET emergency rescue missionEl Talib, E.H. ; Bakar, A.A. ; Ismail, R. 
102010Adopting hadith verification techniques in to digital evidence authenticationYusoff, Y. ; Ismail, R. ; Hassan, Z. 
112007A survey of trust and reputation systems for online service provisionJøsang, A. ; Ismail, R. ; Boyd, C. 
122003A security architecture for reputation systemsIsmail, R. ; Boyd, C. ; Josang, A. ; Russell, S. 
132009A routing protocol based on trusted and shortest path selection for mobile ad hoc networkJassim, H.Sh. ; Yussof, S. ; Kiong, T.S. ; Koh, S.P. ; Ismail, R. 
142009A review on extended role based access control (E-RBAC) model in pervasive computing environmentBakar, A.A. ; Ismail, R. ; Jais, J. ; Manan, J.-L.A. 
152014A modified dipole Quasi-Yagi antenna to increase directivity and gain for WLAN applicationHock, G.T. ; Hock, G.C. ; Ghafil, S.F. ; Chakrabarty, C. ; Ismail, R. 
162015A Hybrid Architecture for Database Intrusion PreventerAlbakoush, Y.A. ; Ismail, R. ; Bakar, A.A.