Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Siti Dhalila Mohd Satar"'
Publikováno v:
Future Internet, Vol 13, Iss 11, p 279 (2021)
Managing and controlling access to the tremendous data in Cloud storage is very challenging. Due to various entities engaged in the Cloud environment, there is a high possibility of data tampering. Cloud encryption is being employed to control data a
Externí odkaz:
https://doaj.org/article/072655bf294540c586ac32985d2d5ded
Publikováno v:
Future Internet, Vol 13, Iss 279, p 279 (2021)
Future Internet
Volume 13
Issue 11
Future Internet
Volume 13
Issue 11
Managing and controlling access to the tremendous data in Cloud storage is very challenging. Due to various entities engaged in the Cloud environment, there is a high possibility of data tampering. Cloud encryption is being employed to control data a
Publikováno v:
International Journal of Advanced Computer Science and Applications. 12
Autor:
Siti Dhalila Mohd Satar, Nazirah Abd Hamid, Nurul Afnan Mahadi, Mumtazimah Mohamad, Fatimah Ghazali, Roslinda Muda
Publikováno v:
Advanced Science Letters. 23:5050-5053
Autor:
Azilawati Rozaimee, Siti Dhalila Mohd Satar, Jamaluddin Hashim, Nazirah Abd Hamid, Wan Ismail Wan Abdullah, Wan Malini Wan Isa, Normala Rahim
Publikováno v:
Advanced Science Letters. 23:4149-4152
Autor:
Wan Ismail Wan Abdullah, Azilawati Rozaimee, Normala Rahim, Wan Malini Wan Isa, Siti Dhalila Mohd Satar, Jamaluddin Hashim, Nazirah Abd Hamid
Publikováno v:
Advanced Science Letters. 22:2918-2921
Publikováno v:
International Journal of Multimedia and Ubiquitous Engineering. 10:195-202
The objective of this study is to propose a new model for hiding text in an image. The proposed model use logical connective in propositional logic to calculate a new binary number of secret message. This model can produce a low computational complex
Autor:
Siti Dhalila Mohd Satar, Azilawati Rozaimee, Normala Rahim, Wan Malini Wan Isa, Nazirah Abd Hamid
Publikováno v:
The International journal of Multimedia & Its Applications. 5:17-27
Publikováno v:
International Journal of Engineering & Technology. 7:102
In the cloud computing, security is one of the biggest obstacles that hamper the widespread adoption of cloud. Several business and research organization are reluctant in completely trusting the cloud computing to shift digital assets to the third-pa
Autor:
Wan Ismail Wan Abdullah, Siti Dhalila Mohd Satar, Normala Rahim, Wan Malini Wan Isa, Azilawati Rozaimee, Nazirah Abd Hamid, Jamaluddin Hashim
Publikováno v:
Jurnal Teknologi. 77
With the emergence of the learning materials volume, the developer has to face many challenges to develop an effective and efficient application to support the learning process. The objective of this study is to evaluate usability of Virtual Umrah ap