1
0
0
News
Netzwerk-Profile
LinkedIn: Muhammad Reza Z'aba's Postlinkedin.com
Dr. Norziana Jamil and I engaged in an online discussion with Peter Schwabe, a distinguished faculty member at the Max Planck Institute for Security and…
LinkedIn: Norziana Jamil - Admin Assistan - Malaysia Marine & Heavy ...
Sehen Sie sich das Profil von Norziana Jamil auf LinkedIn an, dem weltweit größten beruflichen Netzwerk. 3 Jobs sind im Profil von Norziana Jamil aufgelistet.
LinkedIn: Norziana Jamil - 讲师- 马来西亚国能大学(布城分校| 领英 - LinkedIn
上领英,在全球领先职业社交平台查看Norziana Jamil的职业档案。Norziana的职业档案列出了1 个职位。查看Norziana的完整档案,结识职场人脉和查看相似公司的 ...
Private Homepages
About the Journal | Resources Environment and Information...
www.syncsci.com
Dr. Norziana Jamil, Department of System & Networking, Universiti Tenaga Nasional, Malaysia. Dr. Milos Jovanovic, Robotics laboratory, Mihailo Pupin ...
Editorial Team | Resources Environment and Information ...www.syncsci.com › REIE › about
www.syncsci.com
Dr. Norziana Jamil, Department of System & Networking, Universiti Tenaga Nasional, Malaysia. Dr. Milos Jovanovic, Mihailo Pupin Institute, RObotics laboratory ...
Projekte
Lightweight Cryptography | CSRC
csrc.nist.gov
The following table lists the Round 1 Candidates of the lightweight crypto standardization process. The success of the NIST Lightweight Crypto Standardization...
Bücher
Knowledge Technology: Third Knowledge Technology Week, KTW 2011,...
books.google.de
... Yusof Norziana Jamil PhD Symposium Chairs Mohammad Reza Beik Zadeh ...
Informatics Engineering and Information Science: International...
books.google.de
This 4-Volume-Set, CCIS CCIS 0254, constitutes the refereed proceedings of the International Conference on Informatics Engineering and Information...
Advances in Cyber Security: Second International Conference, ACeS...
books.google.de
This book presents refereed proceedings of the Second International Conference on Advances in Cyber Security, ACeS 2020, held in Penang, Malaysia, in September...
Informatics Engineering and Information Science: ...books.google.dk › books
books.google.dk
Norziana Jamil, Ramlan Mahmood, Muhammad Reza Zába, Zuriati Ahmad Zukamaen, and Nur Izura Udzir Digital Images Encryption in Frequency Domain ...
Dokumente zum Namen
[ ] Quantum key distribution in terms of the...
arxiv.org
Authors:Faisal A. A. El-Orany, Wahiddin M. R. B., Mustafa Afanddi Mat Nor, Norziana Jamil, Iskandar Bahari. (Submitted on 28 Jul (v1), last revised 31 Jul ...
Search | arXiv e-print repository
arxiv.org
Authors: Faisal A. A. El-Orany, Wahiddin M. R. B., Mustafa Afanddi Mat Nor, Norziana Jamil, Iskandar Bahari. Abstract: In this paper, we develop a quantum key ...
Communications in Computer and Information Science
fdokumen.site
Communications in Computer and Information Science pdfAziza Mamadolimova MIMOS Berhad, Malaysia Norziana Jamil Universiti ...
TPAL: A Protocol for Node Authentication in IoT | Journal of Computer...
thescipub.com
TPAL: A Protocol for Node Authentication in IoT. Mohamad Faiz Razali, Mohd Ezanee Rusli, Norziana Jamil and Salman Yussof. DOI : jcssp
Wissenschaftliche Veröffentlichungen
An Improved Indoor Location Technique Using Combination of dblpdblp.dagstuhl.de › rec › journals › jcm › AzizJD19
dblp.dagstuhl.de
persistent URL: https://dblp.org/rec/journals/jcm/AzizJD19. Nik Fariz Nik Ahmad Aziz, Norziana Jamil, Marina Md. Din: An Improved Indoor Location Technique ...
Security Issues of Ad-Hoc Network of Sensor Node in Disaster Miti...:...
www.ingentaconnect.com
Sera Syarmila Sameon∗ and Norziana Jamil. College of Information Technology, Universiti Tenaga Nasional, Kajang, SelangorMalaysia.
Veröffentlichungen allgemein
An Observation of Cryptographic Properties of 256 One-Dimensional...
link.springer.com
The robustness of a cryptographic system substantially depends on its underlying elements. Boolean functions are the most frequently used elements in various...
T. Xie and D. Feng, “Construct MD5 Collisions Using Just a Single...
www.oalib.com
T. Xie and D. Feng, “Construct MD5 Collisions Using Just a Single Block of Message,” http://eprint.iacr.org pdf
N. Jamil, R. Mahmod, M. Zaba, N. Udzir and Z. Zukarnain, “STITCH-256:...
www.oalib.com
N. Jamil, R. Mahmod, M. Zaba, N. Udzir and Z. Zukarnain, “STITCH-256: A Dedicated Cryptographic Hash Function,” Journal of Applied Sciences, Vol. 12, 2012, pp....
Feistel, H. (1973) Cryptography and Computer Privacy. Scientific ...
www.oalib.com
TITLE: I-PRESENT<sup>TM</sup>: An Involutive Lightweight Block Cipher; AUTHORS: Muhammad Reza Z'aba, Norziana Jamil, ...
Artikel & Meinungen
Construction of Cryptographically Strong S-Boxes Inspired by Bee...
researchr.org
Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle Dance. Herman Isa, Norziana Jamil, Muhammad Reza Z'aba. Construction of ...
Sonstiges
Norziana Jamil | LinkedIn
www.linkedin.com
View Norziana Jamil's professional profile on LinkedIn. LinkedIn is the world's largest business network, helping professionals like Norziana Jamil discover ...
Norziana Jamil - Google Scholar
scholar.google.com
Universiti Tenaga Nasional - Cited by 733 - Cryptography - cyber-physical security - Internet of things - data analytics and digital...
Publications - Muhammad Reza Z'aba
sites.google.com
Contains information regarding my work and stuffs related to information security with emphasis on cryptography.
Yasir Amer Abbas - Google Acadêmico
scholar.google.com.uy
University of Diyala - Citado por 52 - Computer Architecture - Computer Engineering - Embedded System Design - FPGA - Lightweight Cryptography
RESEARCH GROUP 2 Information Strategy Research Group (InfoSReG)...
slideplayer.com
Members: Yunus Yusoff – Deputy Head Dr Salman Yussof Dr. Asmidar Abu Bakar Azimah Abdul Ghapar Dr. Norziana Jamil Dr Mohd Zaliman Mohd Yusoff (Associate …
Norziana Jamil
www.infona.pl
Search results for: Norziana Jamil ... Norziana Jamil, Ramlan Mahmood · IEEE 3rd International Conference on Communication Software and Networks ...
Yasir Amer Abbas - Google Scholar
scholar.google.co.uk
Reusable Data-Path Architecture for Encryption-then-Authentication on FPGA. MRZ Yasir Amer Abbas, Razali Jidin, Norziana Jamil. International Review on ...
Norziana Jamil | Universiti Tenaga Nasional - Academia.edu
uniten.academia.edu
Academia.edu is a place to share and follow research.
Journal of Information Security - ISSN:
journaldatabase.info
Academic Journals Database is a universal index of periodical literature covering basic research from all fields of knowledge, and is particularly strong in...
(PDF) Implementation of PRINCE Algorithm in FPGA | Yasir A Abass,...
www.academia.edu
Implementation of PRINCE Algorithm in FPGA. Norziana Jamil · Yasir A Abass. Muhammad Z'Aba. Razali Jidin. Mohd E Rusli · Baraa H Tareq. Norziana Jamil.
(PDF) STITCH-256: A Dedicated Cryptographic Hash Function ...www.academia.edu › STITCH_256_A_Dedicated_C...
www.academia.edu
STITCH-256: A Dedicated Cryptographic Hash Function. Journal of Applied Sciences, Norziana Jamil. Download PDF. Download Full PDF Package. This paper.
A New Cryptographic Hash Function Based on Cellular Automata Norziana...
studylib.net
Free essays, homework help, flashcards, research papers, book reports, term papers, history, science, politics
Compromising the Data Integrity of an Electrical Power Grid SCADA ...www.springerprofessional.de › compromising-the-data-integrity-of-an-elec...
www.springerprofessional.de
Autoren: Qais Saif Qassim, Norziana Jamil, Maslina Daud, Norhamadi Ja'affar, Wan Azlan Wan Kamarulzaman, Mohammed Najah Mahdi. Verlag: Springer Singapore.
Assoc. Prof. Dr. Nur Izura Udzir BCS (UPM), MSc. (UPM), PhD (York) -...
technodocbox.com
Norziana Jamil, A Collision Resistant Cryptographic Hash Function Based on Cellular Automata Rules (2013) 14. Meghdad Mirabi Nooshabadi, XML Querying ...
From the Editor s Desk: - PDF Free Download
educationdocbox.com
International Journal of Computer Science Issues, 9(2), pp Norziana Jamil, Ramlan Mahmod, Muhammad Reza Z aba, Nur Izura Udzir, & Zuraiti Ahmad ...
Forecasting number of vulnerabilities using long short-term neural ...ijece.iaescore.com › IJECE › article › view
ijece.iaescore.com
... using long short-term neural memory network. Mohammad Shamsul Hoque, Norziana Jamil, Nowshad Amin, Azril Azam Abdul Rahim, Razali B. Jidin ...
Construction of Cryptographically Strong S-Boxes Inspired by Bee...
www.infona.pl
In this paper, we explore a heuristic method called the bee waggle dance to construct cryptographically strong S-boxes. The S-boxes exhibit good...
Cryptology ePrint Archive: Report A NEW DEDICATED...
eprint.iacr.org
Norziana Jamil and Ramlan Mahmood and Muhammad Reza Z'aba and Nur Izura Udzir and Zuriati Ahmad Zukarnaen. Abstract: Recent ...
IJSIA Vol. 11, No. 8, – NADIA
nadiapub.com
Double Length Sponge Construction DLP-Sponge, Baraa Tareq Hammad, Norziana Jamil, Mohd Ezanee Rusli and Muhammad Reza Zaba (pp ).
Malware threat analysis techniques and approaches for IoT...
beei.org
Malware threat analysis techniques and approaches for IoT applications: a review
Verwandte Suchanfragen zu Norziana Jamil
Ahmad Aziz Taha Ahmed Lightweight Block | Milos Jovanovic Ismail Taha |
Personen Vorname "Norziana" (1) Name "Jamil" (263) |
sortiert nach Relevanz / Datum