Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Nur Hafiza Zakaria"'
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 5, Pp 101550- (2023)
Lightweight block ciphers have become a standard for security protections on IoT devices. Advanced technology is required to secure the data, thus encryption is the method that can provide information security. From previous studies, comparisons of l
Externí odkaz:
https://doaj.org/article/1ce5efee610242059c28f5c256ade9b2
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Publikováno v:
IEEE Access, Vol 8, Pp 198646-198658 (2020)
The Internet of Things (IoT) is a broad range of applications enabled by the connection of devices such as sensors, actuators, and monitors accessible through the Internet. Massive IoT device connectivity and vast data transmission have made the info
Externí odkaz:
https://doaj.org/article/5a4129c234a24582815f4718d52d6194
Publikováno v:
Symmetry, Vol 14, Iss 10, p 2042 (2022)
Data transmissions between smartphone users require security solutions to protect communications. Hence, encryption is an important tool that must be associated with smartphones to keep the user’s data safe. One proven solution to enhance the secur
Externí odkaz:
https://doaj.org/article/7c802118bd3548c09ab10ada70c3a4b0
Publikováno v:
Journal of Information System and Technology Management. 6:10-16
The development of block ciphers has resulted in a number of cryptographic algorithms such as AES, aria, blowfish256, desl, and 3d-aes. AES is one of the best cryptographic algorithms that can be used to protect electronic data. However, the principa
Autor:
Azuan Ahmad, Wan Shafiuddin Zainudin, Mohd Nazri Kama, Norbik Bashah Idris, Madihah Mohd Saudi, Nur Hafiza Zakaria
Publikováno v:
International Journal of Communication Networks and Information Security (IJCNIS). 10
The term Cloud computing is not new anymore in computing technology. This form of computing technology previously considered only as marketing term, but today Cloud computing not only provides innovative improvements in resource utilisation but it al
Publikováno v:
2022 International Conference on Innovations in Science, Engineering and Technology (ICISET).
Publikováno v:
Communications in Computer and Information Science ISBN: 9789813368347
ACeS
ACeS
Key schedule algorithm is one of the core elements that significantly affect the security of an encryption algorithm. While its importance is undeniable, the key schedule algorithm has not been given comprehensive attention compared to the encryption
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::50b86dfdacf39b5da48e2084ebd49097
https://doi.org/10.1007/978-981-33-6835-4_13
https://doi.org/10.1007/978-981-33-6835-4_13
Autor:
Ammar Othman, Nur Hafiza Zakaria
Publikováno v:
IICAIET
This paper proposes the wireless monitoring system of energy meter using Blynk application via smartphone. In addition, the used of battery as backup power supply and over consumption of energy notification as an optional features embedded in this sy