Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Moesfa Soeheila Mohamad"'
Autor:
Mohamud Ahmed Jimale, Muhammad Reza Z'aba, Miss Laiha Binti Mat Kiah, Mohd Yamani Idna Idris, Norziana Jamil, Moesfa Soeheila Mohamad, Mohd Saufy Rohmad
Publikováno v:
IEEE Access, Vol 10, Pp 14739-14766 (2022)
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research h
Externí odkaz:
https://doaj.org/article/538616fd19fd45fa9f9a74388974a766
Autor:
Mohamud Ahmed Jimale, Muhammad Reza Z'aba, Miss Laiha Binti Mat Kiah, Mohd Yamani Idna Idris, Norziana Jamil, Moesfa Soeheila Mohamad, Mohd Saufy Rohmad
Publikováno v:
IEEE Access, Vol 10, Pp 50819-50838 (2022)
Since its birth in 2000, authenticated encryption (AE) has been a hot research topic, and many new features have been proposed to boost its security or performance. The Block cipher was the dominant primitive in constructing AE schemes, followed by s
Externí odkaz:
https://doaj.org/article/e725c638c5524658865953402490d6f7
Autor:
Geong Sen Poh, Vishnu Monn Baskaran, Ji-Jian Chin, Moesfa Soeheila Mohamad, Kay Win Lee, Dharmadharshni Maniam, Muhammad Reza Z’aba
Publikováno v:
Algorithms, Vol 10, Iss 2, p 52 (2017)
Cloud storage services allow users to efficiently outsource their documents anytime and anywhere. Such convenience, however, leads to privacy concerns. While storage providers may not read users’ documents, attackers may possibly gain access by exp
Externí odkaz:
https://doaj.org/article/126b08d1070b443f8f03530d074f7758
Publikováno v:
International Journal of Intelligent Computing Research. 10:1014-1021
Publikováno v:
2020 8th International Conference on Information Technology and Multimedia (ICIMU).
We developed the Trust Engine as a component of an adaptive multi-factor authentication system. The Proof-of-concept was tested and found to meet all functional requirements, but it does not meet the scalability requirement. It is crucial to make the
Autor:
Ji-Jian Chin, Moesfa Soeheila Mohamad
Publikováno v:
Provable and Practical Security ISBN: 9783030625757
ProvSec
ProvSec
This work presents a new experiment defining indistinguishability for searchable symmetric encryption to include security against published practical attacks. The proposed experiment allows the adversaries to use their prior knowledge about the store
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4bd60cc5d9a50ffc090fb7e95636fa5b
https://doi.org/10.1007/978-3-030-62576-4_10
https://doi.org/10.1007/978-3-030-62576-4_10
Publikováno v:
Cryptography and Communications. 10:139-158
Searchable Symmetric Encryption (SSE) allows a user to store encrypted documents on server(s) and later efficiently searches these documents in a private manner. So far most existing works have focused on a single storage server. Therefore in this pa
Publikováno v:
ACM Computing Surveys. 50:1-37
Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query encrypted data without the risk of data leakage. Despite the widespread interest, existing surveys do not examine in detail how SSE’s underlying structures are des
Publikováno v:
PST
One of the considerations for the security of searchable symmetric encryption is leakage, defined as the amount of information regarding stored data known to the adversary. Recently, some papers showed that information extracted from leakages, combin
Autor:
Kay Win Lee, Moesfa Soeheila Mohamad, Vishnu Monn Baskaran, Muhammad Reza Z'aba, Ji-Jian Chin, Geong Sen Poh, Dharmadharshni Maniam
Publikováno v:
Algorithms; Volume 10; Issue 2; Pages: 52
Algorithms, Vol 10, Iss 2, p 52 (2017)
Algorithms, Vol 10, Iss 2, p 52 (2017)
Cloud storage services allow users to efficiently outsource their documents anytime and anywhere. Such convenience, however, leads to privacy concerns. While storage providers may not read users’ documents, attackers may possibly gain access by exp