Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Abdul Alif Zakaria"'
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 5, Pp 101550- (2023)
Lightweight block ciphers have become a standard for security protections on IoT devices. Advanced technology is required to secure the data, thus encryption is the method that can provide information security. From previous studies, comparisons of l
Externí odkaz:
https://doaj.org/article/1ce5efee610242059c28f5c256ade9b2
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Publikováno v:
IEEE Access, Vol 8, Pp 198646-198658 (2020)
The Internet of Things (IoT) is a broad range of applications enabled by the connection of devices such as sensors, actuators, and monitors accessible through the Internet. Massive IoT device connectivity and vast data transmission have made the info
Externí odkaz:
https://doaj.org/article/5a4129c234a24582815f4718d52d6194
Publikováno v:
Symmetry, Vol 14, Iss 10, p 2042 (2022)
Data transmissions between smartphone users require security solutions to protect communications. Hence, encryption is an important tool that must be associated with smartphones to keep the user’s data safe. One proven solution to enhance the secur
Externí odkaz:
https://doaj.org/article/7c802118bd3548c09ab10ada70c3a4b0
Publikováno v:
International Journal of Machine Learning and Computing. 10:568-575
Autor:
Abdul Alif Zakaria, Mehdi Hussain, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Idris, Norli Anida Abdullah, Ki-Hyun Jung
Publikováno v:
Applied Sciences, Vol 8, Iss 11, p 2199 (2018)
Steganography is the art and practice of communication using hidden messages. The least significant bits (LSB) based method is the well-known type of steganography in the spatial domain. Usually, achieving the larger embedding capacity in LSB-based m
Externí odkaz:
https://doaj.org/article/97d7d5a210f344d58c0e2a65e4ba7e63
Publikováno v:
Communications in Computer and Information Science ISBN: 9789813368347
ACeS
ACeS
Key schedule algorithm is one of the core elements that significantly affect the security of an encryption algorithm. While its importance is undeniable, the key schedule algorithm has not been given comprehensive attention compared to the encryption
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::50b86dfdacf39b5da48e2084ebd49097
https://doi.org/10.1007/978-981-33-6835-4_13
https://doi.org/10.1007/978-981-33-6835-4_13
Autor:
Ki-Hyun Jung, Mohd Yamani Idna Idris, Norli Anida Abdullah, Ainuddin Wahid Abdul Wahab, Abdul Alif Zakaria, Mehdi Hussain
Publikováno v:
Applied Sciences, Vol 8, Iss 11, p 2199 (2018)
Applied Sciences
Volume 8
Issue 11
Applied Sciences
Volume 8
Issue 11
Steganography is the art and practice of communication using hidden messages. The least significant bits (LSB) based method is the well-known type of steganography in the spatial domain. Usually, achieving the larger embedding capacity in LSB-based m
Autor:
Zakaria, Abdul Alif1,2 (AUTHOR) alif@cybersecurity.my, Ab Halim, Azni Haslizan1,3 (AUTHOR) alif@cybersecurity.my, Ridzuan, Farida1,3 (AUTHOR), Zakaria, Nur Hafiza1,3 (AUTHOR), Daud, Maslina2 (AUTHOR)
Publikováno v:
Symmetry (20738994). Oct2022, Vol. 14 Issue 10, pN.PAG-N.PAG. 25p.
Autor:
Zakaria, Abdul Alif, Hussain, Mehdi, Wahab, Ainuddin Wahid Abdul, Idris, Mohd Yamani Idna, Abdullah, Norli Anida, Jung, Ki-Hyun
Publikováno v:
Applied Sciences (2076-3417); Nov2018, Vol. 8 Issue 11, p2199, 19p
This book presents refereed proceedings of the Second International Conference on Advances in Cyber Security, ACeS 2020, held in Penang, Malaysia, in September 2020. Due to the COVID-19 pandemic the conference was held online. The 46 full papers an