Browsing by Author Jamil, N.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 26  next >
Issue DateTitleAuthor(s)
2010A user authentication scheme based on identity-bits commitment for wireless sensor networksJamil, N. ; Sameon, S.S. ; Mahmood, R. 
2010A user authentication scheme based on identity-bits commitment for wireless sensor networksJamil, N. ; Sameon, S.S. ; Mahmood, R. 
2011An observation of cryptographic properties of 256 one-dimensional cellular automata rulesJamil, N. ; Mahmood, R. ; Zába, M.R. ; Zukamaen, Z.A. ; Udzir, N.I. 
2011Cellular automata based user authentication scheme using identity-bits commitment for Wireless Sensor NetworkJamil, N. ; Mahmood, R. 
2016Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle DanceIsa, H. ; Jamil, N. ; Z’aba, M.R. 
2013Diffusion and statistical analysis of STITCH-256Jamil, N. ; Mahmod, R. ; Z'aba, M.R. ; Udzir, N.I. ; Zukarnain, Z.A. 
2017Faster multicollisions attack on sponge constructionHammad, B.T. ; Jamil, N. ; Zaba, M.R. ; Rusli, M.E. ; Ahmed, I.T. 
2017Faster multicollisions attack on sponge constructionHammad, B.T. ; Jamil, N. ; Zaba, M.R. ; Rusli, M.E. ; Ahmed, I.T. 
2017Implementation of lightweight cryptographic primitivesHammad, B.T. ; Jamil, N. ; Rusli, M.E. ; Z’Aba, M.R. ; Ahmed, I.T. 
2017Implementation of lightweight cryptographic primitivesHammad, B.T. ; Jamil, N. ; Rusli, M.E. ; Z’Aba, M.R. ; Ahmed, I.T. 
2017Implementation of lightweight cryptographic primitivesHammad, B.T. ; Jamil, N. ; Rusli, M.E. ; Z’Aba, M.R. ; Ahmed, I.T. 
2017Implementation of lightweight cryptographic primitivesHammad, B.T. ; Jamil, N. ; Rusli, M.E. ; Z’Aba, M.R. ; Ahmed, I.T. 
2015Implementation of PRINCE algorithm in FPGAAbbas, Y.A. ; Jidin, R. ; Jamil, N. ; Z'aba, M.R. ; Rusli, M.E. ; Tariq, B. 
2016An Improved Indoor Positioning Algorithm Based on RSSI-Trilateration Technique for Internet of Things (IOT)Rusli, M.E. ; Ali, M. ; Jamil, N. ; Din, M.M. 
2014Improved S-box construction from binomial power functionsIsa, H. ; Jamil, N. ; Z'aba, M.R. 
2015Information security governance model to enhance zakat information management in Malaysian zakat institutionsSulaiman, H. ; Jamil, N. 
2015Information security governance model to enhance zakat information management in Malaysian zakat institutionsSulaiman, H. ; Jamil, N. 
2016Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGAAbbas, Y.A. ; Jidin, R. ; Jamil, N. ; Z'aba, M.R. 
2015PRINCE IP-core on Field Programmable Gate Arrays (FPGA)Abbas, Y.A. ; Jidin, R. ; Jamil, N. ; Z'aba, M.R. ; Rusli, M.E. 
2010Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: Multi-key generationEl-Orany, F.A.A. ; Wahiddin, M.R.B. ; Mat-Nor, M.-A. ; Jamil, N. ; Bahari, I.