GRANT(PI & MEMBERS)

15

PUBLICATIONS

32

INDEXED PUBLICATION

18

TOTAL STUDENTS

H-INDEXED (SCOPUS)

CITATIONS (SCOPUS)

Grant (PI)

NATIONAL GRANTS
1
UNIVERSITY FUND
1
TOTAL

Publications

INDEXED PUBLICATION
18
NON-INDEXED PUBLICATION
7
OTHERS PUBLICATION
7
TOTAL

Supervisions

DEGREE
0
MASTER
9
PHD
9
TOTAL

Legend : SPONSOR TYPE OF GRANT

Grant Name Year
SECURE AND INTELLIGENT AUTHENTICATION WATERMARKING SCHEME FOR DIGITAL MEDICAL IMAGES AT MALAYSIAN HOSPITALS
RUG OF UTM Tier 1
2016
New Access Control Mechanism Based on Palm Biometrics Authentication for Users Cardio Information
MINISTRY OF EDUCATION Transdiscplinary Research Grant Scheme
2016
MULTILAYER REVERSIBLE WATERMARKING IN MEDICAL IMAGES USING NON-UNDERFLOW DIFFERENCE EXPANSION
RUG OF UTM Tier 1
2015
Cryptography Technology For National Defense Industry
QUESTRANS SDN. BHD Business Entity
2015
Novel Computer Forensic Approach for Cloud Computing Environment
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2015
Trustworthiness Assessment Algorithm based on Temporal and Spatial Properties of Mobility Data in Ephemeral Network
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2015
COPYRIGHT PROTECTION OF DIGITAL CAMPUS
RUG OF UTM Flagship-Research Group
2014
DESIGN AND IMPLEMENTATION ENCRYPTED PATIENT DATA BY ELLIPTIC CURVE CRYPTOGRAPHY
RUG OF UTM Encouragement Grant
2014
HEALTH AWARE COMMUTING.
RUG OF UTM Flagship
2014
ONLINE ANOMALY DETECTION OF THE PRESENCE OF GANODERMA BONINENSE IN PALM OIL PLANTATION USING WIRELESS SENSOR
RUG OF UTM Tier 1
2014
Secure Integrated E-Health Infrastructure
RUG OF UTM Flagship
2014
Enhancement of Elliptic Curve Cryptography and Implementation on Android Mobile Platform
MINISTRY OF EDUCATION Exploratory Research Grant Scheme
2013
Hybridizing Rabin-Shamir Secret Sharing for Data Confidentiality and Integrity in Cloud Computing
MINISTRY OF EDUCATION Exploratory Research Grant Scheme
2013
IDENTITY DISINTEGRATION MECHANISM FOR CARDIOTHORACIC INFORMATION PRIVACY
RUG OF UTM Flagship
2013
A New Technique for Maximizing Key Space of Elliptic Curve Cryptography
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2013

Legend : PUBLICATION CATEGORY TYPE OF AUTHORS

Publication Name Year
Identification Of Influential Parameters For Ntru Decryption Failure And Recommendation Of Extended Parameter Selection Criteria For Elimination Of Decryption Failure
IAENG INTERNATIONAL JOURNAL OF COMPUTER SCIENCE
Publication In Scopus CO-AUTHOR
2017
A Comprehensive Literature Review Of Asymmetric Key Cryptography Algorithms For Establishment Of The Existing Gap
2015 9TH MALAYSIAN SOFTWARE ENGINEERING CONFERENCE, MYSEC 2015
Publication In Scopus UTM FIRST AUTHOR
2016
Survey On Method Of Encryption In Cloud Computing
COMPUTER & NETWORKING PART II
Book Chapter CO-AUTHOR
2016
Cryptanalysis And Improvement Of A Robust Smart Card Secured Authentication Scheme On Sip Using Elliptic Curve Cryptography
MULTIMEDIA TOOLS AND APPLICATIONS
Publication In Scopus UTM FIRST AUTHOR
2016
Wireless Sensor Network Performance Analysis And Effect Of Blackhole And Sinkhole Attacks
JURNAL TEKNOLOGI
Publication In Scopus UTM FIRST AUTHOR
2016
Lightweight Symmetric Encryption Algorithm In Big Data
INTERNATIONAL JOURNAL OF ADVANCES IN SOFT COMPUTING AND ITS APPLICATIONS
Publication In Scopus CORRESPONDING AUTHOR
2015
Authentication In Mobile Cloud Computing
SECURITY IN COMPUTING & NETWORKING PART I
Book Chapter CO-AUTHOR
2015
Survey On Method Of Encryption In Cloud Computing
SECURITY IN COMPUTING & NETWORKING PART II
Book Chapter CO-AUTHOR
2015
Ec Encryption Cbc Method Of Operation
SECURITY IN COMPUTING AND NETWORKING - PART I
Book Chapter CO-AUTHOR
2015
A Survey Of Wireless Sensor Network Security And Routing Techniques
RESEARCH JOURNAL OF APPLIED SCIENCES, ENGINEERING AND TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2015
Selection Of Soil Features For Detection Of Ganoderma Using Rough Set Theory
4TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, WICT 2014
Publication In Scopus CO-AUTHOR
2015
Jpeg Image Encryption With Elliptic Curve Cryptography
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014
Publication In Scopus CO-AUTHOR
2015
Security In Wireless Sensor Network: Approaches And Issues
TELKOMNIKA INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2015
Survey On Method Of Encryption In Cloud Computing
SECURITY IN COMPUTING AND NETWORK
Book Chapter UTM FIRST AUTHOR
2015
Malicious Node Detection Through Trust Aware Routing In Wireless Sensor Networks
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2015
Authentication Methods In Cloud Computing: A Survey
RESEARCH JOURNAL OF APPLIED SCIENCES, ENGINEERING AND TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2015
Authentication Method Through Keystrokes Measurement Of Mobile Users In Cloud Environment
INTERNATIONAL JOURNAL OF ADVANCES IN SOFT COMPUTING AND ITS APPLICATIONS
Publication In Scopus UTM FIRST AUTHOR
2014
Prime Order Elliptic Curve Generation Methods: A Review
INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, ISDA
Publication In Scopus CO-AUTHOR
2014
An Https Approach To Resist Man In The Middle Attack In Secure Sms Using Ecc And Rsa
INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, ISDA
Publication In Scopus UTM FIRST AUTHOR
2014
Secure Search Over Encrypted Data In Cloud Computing
PROCEEDINGS - 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES, ACSAT 2013
Publication In Scopus CORRESPONDING AUTHOR
2014
Biometric Encryption To Enhance Confidentiality In Cloud Computing
2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST)
Publication In Scopus CO-AUTHOR
2014
Security Issues And Attacks In Wireless Sensor Network
WORLD APPLIED SCIENCES JOURNAL
Publication In Scopus UTM FIRST AUTHOR
2014
Printed Document Integrity Verification Using Barcode
JURNAL TEKNOLOGI (SCIENCES AND ENGINEERING)
Publication In Scopus UTM FIRST AUTHOR
2014
Keystroke Dynamic Authentication In Mobile Cloud Computing
INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2014
Statistical Analysis Of S-Box In Rijndael-Aes Algorithm And Formulation Of An Enhanced S-Box
Journal of Information Assurance and Security
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2014
Insight Into The Operation Of Ntru And A Comparative Study Of Ntru, Rsa And Ecc Public Key Cryptosystems
2014 8TH MALAYSIAN SOFTWARE ENGINEERING CONFERENCE (MySEC)
Conference Paper UTM FIRST AUTHOR
2014
Selection Of Soil Features For Detection Of Ganoderma Using Rough Set Theory
THIRD WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES
Conference Paper CO-AUTHOR
2014
Performance Evaluation Of Routing Protocol On Aodv And Dsr Under Wormhole Attack
International Journal of Computer network and Communication Security
Journal Article Non Citation-Indexed CO-AUTHOR
2013
Studding And Analyzing Wireless Networks Access Points
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2013
Agent-Based Approach For Modeling Evacuee Uncertainty Behavior Using Game Theory Model
LIFE SCIENCE JOURNAL
Publication In Scopus CO-AUTHOR
2013
Serious Security Weakness In Rsa Cryptosystem
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ISSUES
Journal Article Non Citation-Indexed CORRESPONDING AUTHOR
2012
An Efficient Stream Cipher Algorithm For Data Encryption
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ISSUES
Journal Article Non Citation-Indexed CORRESPONDING AUTHOR
2011

Legend : IP CATEGORY IP LEVEL

Intellectual Property Name Grant Register No. IP Level IP Category
STREAM CIPHER GENERATOR MY-167527-A NATIONAL PATENT
A METHOD FOR DESIGNING NONLINEAR BOOLEAN FUNCTIONS OF A CRYPTOGRAPHIC SYSTEM MY-180906-A NATIONAL PATENT

Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL

Supervision List
MOHAMMAD JAVAD RAJABI
ROBUST DISCRETE CONSINE TRANSFORM BASED TECHNIQUE FOR IMAGE WATERMARKING AGAINST CROPPING ATTACKS
PHD GRADUATED CO-SUPERVISOR 2018
WAMDA ABDELRAHMAN ELHAG NAGMELDIN
ENHANCED FULLY HOMOMORPHIC ENCRYPTION SCHEME USING MODIFIED KEY GENERATION FOR CLOUD ENVIRONMENT
PHD GRADUATED CO-SUPERVISOR 2019
SHAMIEL HASHIM IBRAHIM BAKHEIT
ENHANCED INTEGRITY AUDITING SCHEME FOR DYNAMIC DATA STORAGE IN CLOUD COMPUTING
PHD GRADUATED CO-SUPERVISOR 2023
MAHNOUSH BABAEIZADEH

MASTER GRADUATED CO-SUPERVISOR 2013
MAJID NATEGHIZAD

MASTER GRADUATED CO-SUPERVISOR 2013
SUI TAO

MASTER GRADUATED SUPERVISOR 2014
SK.SAJJAD HOSSAIN

MASTER GRADUATED SUPERVISOR 2015
SAMUEL NG CHEN YING

MASTER GRADUATED SUPERVISOR 2015
MOHD FAIRUS BIN MUSTAPHA

MASTER GRADUATED SUPERVISOR 2016