Publications

Results 1-20 of 25 (Search time: 0.0 seconds).

Issue DateTitleAuthor(s)
12012STITCH-256: A dedicated cryptographic hash functionJamil, N. ; Mahmod, R. ; Z'aba, M.R. ; Udzir, N.I. ; Zukarnain, Z.A. 
22015Security issues of ad-hoc network of sensor node in disaster mitigation planSameon, S.S. ; Jamil, N. 
32015Security issues of ad-hoc network of sensor node in disaster mitigation planSameon, S.S. ; Jamil, N. 
42016S-box optimisation using heuristic methodsIsa, H. ; Jamil, N. ; Z'Aba, M.R. 
52013S-box construction from non-permutation power functionsIsa, H. ; Jamil, N. ; Z'aba, M.R. 
62010Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: Multi-key generationEl-Orany, F.A.A. ; Wahiddin, M.R.B. ; Mat-Nor, M.-A. ; Jamil, N. ; Bahari, I. 
72015Information security governance model to enhance zakat information management in Malaysian zakat institutionsSulaiman, H. ; Jamil, N. 
82015Information security governance model to enhance zakat information management in Malaysian zakat institutionsSulaiman, H. ; Jamil, N. 
92014Improved S-box construction from binomial power functionsIsa, H. ; Jamil, N. ; Z'aba, M.R. 
102015Implementation of PRINCE algorithm in FPGAAbbas, Y.A. ; Jidin, R. ; Jamil, N. ; Z'aba, M.R. ; Rusli, M.E. ; Tariq, B. 
112017Faster multicollisions attack on sponge constructionHammad, B.T. ; Jamil, N. ; Zaba, M.R. ; Rusli, M.E. ; Ahmed, I.T. 
122018Entity entity -based parameterization for distinguishing distributed denial of service from flash eventsMohamed, M.A. ; Jamil, N. ; Abidin, A.F. ; Din, M.M. ; Nik, W.N.S.W. ; Mamat, A.R. 
132018Entity entity -based parameterization for distinguishing distributed denial of service from flash eventsMohamed, M.A. ; Jamil, N. ; Abidin, A.F. ; Din, M.M. ; Nik, W.N.S.W. ; Mamat, A.R. 
142013Diffusion and statistical analysis of STITCH-256Jamil, N. ; Mahmod, R. ; Z'aba, M.R. ; Udzir, N.I. ; Zukarnain, Z.A. 
152016Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle DanceIsa, H. ; Jamil, N. ; Z’aba, M.R. 
162011Cellular automata based user authentication scheme using identity-bits commitment for Wireless Sensor NetworkJamil, N. ; Mahmood, R. 
172018Can convolution neural network (CNN) triumph in ear recognition of uniform illumination invariant?Jamil, N. ; Almisreb, A.A. ; Ariffin, S.M.Z.S.Z. ; Md Din, N. ; Hamzah, R. 
182018Can convolution neural network (CNN) triumph in ear recognition of uniform illumination invariant?Jamil, N. ; Almisreb, A.A. ; Ariffin, S.M.Z.S.Z. ; Md Din, N. ; Hamzah, R. 
192018Can convolution neural network (CNN) triumph in ear recognition of uniform illumination invariant?Jamil, N. ; Almisreb, A.A. ; Ariffin, S.M.Z.S.Z. ; Md Din, N. ; Hamzah, R. 
202018Can convolution neural network (CNN) triumph in ear recognition of uniform illumination invariant?Jamil, N. ; Almisreb, A.A. ; Ariffin, S.M.Z.S.Z. ; Md Din, N. ; Hamzah, R. 

Loading... 2 0 5 0 false
Norz.jpg picture
Credit Name
Norziana Jamil Dr.
Full Name
Jamil, N.
Email
Norziana@uniten.edu.my
 
Loading... 3 0 5 0 false