GRANT(PI & MEMBERS)
13
PUBLICATIONS
32
INDEXED PUBLICATION
18
TOTAL STUDENTS
H-INDEXED (SCOPUS)
CITATIONS (SCOPUS)
Grant (PI)
NATIONAL GRANTS
1
UNIVERSITY FUND
1
TOTAL
Publications
INDEXED PUBLICATION
18
NON-INDEXED PUBLICATION
7
OTHERS PUBLICATION
7
TOTAL
Supervisions
MASTER
9
PHD
9
TOTAL
Legend : SPONSOR TYPE OF GRANT
Grant Name | Year |
---|---|
SECURE AND INTELLIGENT AUTHENTICATION WATERMARKING SCHEME FOR DIGITAL MEDICAL IMAGES AT MALAYSIAN HOSPITALS RUG OF UTM Tier 1 |
2016 |
New Access Control Mechanism Based on Palm Biometrics Authentication for Users Cardio Information Transdiscplinary Research Grant Scheme |
2016 |
MULTILAYER REVERSIBLE WATERMARKING IN MEDICAL IMAGES USING NON-UNDERFLOW DIFFERENCE EXPANSION RUG OF UTM Tier 1 |
2015 |
Cryptography Technology For National Defense Industry QUESTRANS SDN. BHD Business Entity |
2015 |
Novel Computer Forensic Approach for Cloud Computing Environment Fundamental Research Grant Scheme |
2015 |
Trustworthiness Assessment Algorithm based on Temporal and Spatial Properties of Mobility Data in Ephemeral Network Fundamental Research Grant Scheme |
2015 |
COPYRIGHT PROTECTION OF DIGITAL CAMPUS RUG OF UTM Flagship-Research Group |
2014 |
DESIGN AND IMPLEMENTATION ENCRYPTED PATIENT DATA BY ELLIPTIC CURVE CRYPTOGRAPHY RUG OF UTM Encouragement Grant |
2014 |
HEALTH AWARE COMMUTING. RUG OF UTM Flagship |
2014 |
ONLINE ANOMALY DETECTION OF THE PRESENCE OF GANODERMA BONINENSE IN PALM OIL PLANTATION USING WIRELESS SENSOR RUG OF UTM Tier 1 |
2014 |
Enhancement of Elliptic Curve Cryptography and Implementation on Android Mobile Platform Exploratory Research Grant Scheme |
2013 |
Hybridizing Rabin-Shamir Secret Sharing for Data Confidentiality and Integrity in Cloud Computing Exploratory Research Grant Scheme |
2013 |
A New Technique for Maximizing Key Space of Elliptic Curve Cryptography Fundamental Research Grant Scheme |
2013 |
Legend : PUBLICATION CATEGORY TYPE OF AUTHORS
Publication Name | Year |
---|---|
Identification Of Influential Parameters For Ntru Decryption Failure And Recommendation Of Extended Parameter Selection Criteria For Elimination Of Decryption Failure
IAENG INTERNATIONAL JOURNAL OF COMPUTER SCIENCE Publication In Scopus CO-AUTHOR |
2017 |
A Comprehensive Literature Review Of Asymmetric Key Cryptography Algorithms For Establishment Of The Existing Gap
2015 9TH MALAYSIAN SOFTWARE ENGINEERING CONFERENCE, MYSEC 2015 Publication In Scopus UTM FIRST AUTHOR |
2016 |
Survey On Method Of Encryption In Cloud Computing
COMPUTER & NETWORKING PART II Book Chapter CO-AUTHOR |
2016 |
Cryptanalysis And Improvement Of A Robust Smart Card Secured Authentication Scheme On Sip Using Elliptic Curve Cryptography
MULTIMEDIA TOOLS AND APPLICATIONS Publication In Scopus UTM FIRST AUTHOR |
2016 |
Wireless Sensor Network Performance Analysis And Effect Of Blackhole And Sinkhole Attacks
JURNAL TEKNOLOGI Publication In Scopus UTM FIRST AUTHOR |
2016 |
Lightweight Symmetric Encryption Algorithm In Big Data
INTERNATIONAL JOURNAL OF ADVANCES IN SOFT COMPUTING AND ITS APPLICATIONS Publication In Scopus CORRESPONDING AUTHOR |
2015 |
Authentication In Mobile Cloud Computing
SECURITY IN COMPUTING & NETWORKING PART I Book Chapter CO-AUTHOR |
2015 |
Survey On Method Of Encryption In Cloud Computing
SECURITY IN COMPUTING & NETWORKING PART II Book Chapter CO-AUTHOR |
2015 |
Ec Encryption Cbc Method Of Operation
SECURITY IN COMPUTING AND NETWORKING - PART I Book Chapter CO-AUTHOR |
2015 |
A Survey Of Wireless Sensor Network Security And Routing Techniques
RESEARCH JOURNAL OF APPLIED SCIENCES, ENGINEERING AND TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2015 |
Selection Of Soil Features For Detection Of Ganoderma
Using Rough Set Theory
4TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, WICT 2014 Publication In Scopus CO-AUTHOR |
2015 |
Jpeg Image Encryption With Elliptic Curve Cryptography
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014 Publication In Scopus CO-AUTHOR |
2015 |
Security In Wireless Sensor Network: Approaches And Issues
TELKOMNIKA INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2015 |
Survey On Method Of Encryption In Cloud Computing
SECURITY IN COMPUTING AND NETWORK Book Chapter UTM FIRST AUTHOR |
2015 |
Malicious Node Detection Through Trust Aware Routing In Wireless Sensor Networks
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2015 |
Authentication Methods In Cloud Computing: A Survey
RESEARCH JOURNAL OF APPLIED SCIENCES, ENGINEERING AND TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2015 |
Authentication Method Through Keystrokes Measurement Of Mobile Users In Cloud Environment
INTERNATIONAL JOURNAL OF ADVANCES IN SOFT COMPUTING AND ITS APPLICATIONS Publication In Scopus UTM FIRST AUTHOR |
2014 |
Prime Order Elliptic Curve Generation Methods: A Review
INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, ISDA Publication In Scopus CO-AUTHOR |
2014 |
An Https Approach To Resist Man In The Middle Attack In Secure Sms Using Ecc And Rsa
INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, ISDA Publication In Scopus UTM FIRST AUTHOR |
2014 |
Secure Search Over Encrypted Data In Cloud Computing
PROCEEDINGS - 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES, ACSAT 2013 Publication In Scopus CORRESPONDING AUTHOR |
2014 |
Biometric Encryption To Enhance Confidentiality In Cloud Computing
2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST) Publication In Scopus CO-AUTHOR |
2014 |
Security Issues And Attacks In Wireless Sensor Network
WORLD APPLIED SCIENCES JOURNAL Publication In Scopus UTM FIRST AUTHOR |
2014 |
Printed Document Integrity Verification Using Barcode
JURNAL TEKNOLOGI (SCIENCES AND ENGINEERING) Publication In Scopus UTM FIRST AUTHOR |
2014 |
Keystroke Dynamic Authentication In Mobile Cloud
Computing
INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2014 |
Statistical Analysis Of S-Box In Rijndael-Aes Algorithm And Formulation Of An Enhanced S-Box
Journal of Information Assurance and Security Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2014 |
Insight Into The Operation Of Ntru And A Comparative Study Of Ntru, Rsa And Ecc Public Key Cryptosystems
2014 8TH MALAYSIAN SOFTWARE ENGINEERING CONFERENCE (MySEC) Conference Paper UTM FIRST AUTHOR |
2014 |
Selection Of Soil Features For Detection Of Ganoderma Using Rough Set Theory
THIRD WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES Conference Paper CO-AUTHOR |
2014 |
Performance Evaluation Of Routing Protocol On Aodv And Dsr Under Wormhole Attack
International Journal of Computer network and Communication Security Journal Article Non Citation-Indexed CO-AUTHOR |
2013 |
Studding And Analyzing Wireless Networks Access Points
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2013 |
Agent-Based Approach For Modeling Evacuee Uncertainty Behavior Using Game Theory Model
LIFE SCIENCE JOURNAL Publication In Scopus CO-AUTHOR |
2013 |
Serious Security Weakness In Rsa Cryptosystem
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ISSUES Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2012 |
An Efficient Stream Cipher Algorithm For Data Encryption
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ISSUES Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2011 |
Legend : IP CATEGORY IP LEVEL
Intellectual Property Name | Grant Register No. | IP Level | IP Category |
---|---|---|---|
STREAM CIPHER GENERATOR | MY-167527-A | NATIONAL | PATENT |
A METHOD FOR DESIGNING NONLINEAR BOOLEAN FUNCTIONS OF A CRYPTOGRAPHIC SYSTEM | MY-180906-A | NATIONAL | PATENT |
Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL
Supervision List |
---|
MOHAMMAD JAVAD RAJABI ROBUST DISCRETE CONSINE TRANSFORM BASED TECHNIQUE FOR IMAGE WATERMARKING AGAINST CROPPING ATTACKS PHD GRADUATED CO-SUPERVISOR 2018 |
WAMDA ABDELRAHMAN ELHAG NAGMELDIN ENHANCED FULLY HOMOMORPHIC ENCRYPTION SCHEME USING MODIFIED KEY GENERATION FOR CLOUD ENVIRONMENT PHD GRADUATED CO-SUPERVISOR 2019 |
SHAMIEL HASHIM IBRAHIM BAKHEIT ENHANCED INTEGRITY AUDITING SCHEME FOR DYNAMIC DATA STORAGE IN CLOUD COMPUTING PHD GRADUATED CO-SUPERVISOR 2023 |
MAJID NATEGHIZAD MASTER GRADUATED CO-SUPERVISOR 2013 |
MAHNOUSH BABAEIZADEH MASTER GRADUATED CO-SUPERVISOR 2013 |
SUI TAO MASTER GRADUATED SUPERVISOR 2014 |
SAMUEL NG CHEN YING MASTER GRADUATED SUPERVISOR 2015 |
SK.SAJJAD HOSSAIN MASTER GRADUATED SUPERVISOR 2015 |
MOHD FAIRUS BIN MUSTAPHA MASTER GRADUATED SUPERVISOR 2016 |