Segui
Muhammad Reza Z'aba
Titolo
Citata da
Citata da
Anno
Bit-pattern based integral attack
MR Z’aba, H Raddum, M Henricksen, E Dawson
Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008
1012008
Comprehensive survey of machine learning approaches in cognitive radio-based vehicular ad hoc networks
MA Hossain, RM Noor, KLA Yau, SR Azzuhri, MR Z’aba, I Ahmedy
IEEE Access 8, 78054-78108, 2020
802020
Construction of cryptographically strong S-boxes inspired by bee waggle dance
H Isa, N Jamil, MR Z’aba
New generation computing 34, 221-238, 2016
452016
Threat modeling approaches for securing cloud computin
A Amini, N Jamil, AR Ahmad, MR Zaba
Journal of Applied Sciences 15 (7), 953-967, 2015
402015
A survey of lightweight cryptographic hash function
BT Hammad, N Jamil, ME Rusli, MR Z’aba
Inter. J. Sci. Eng. Res 8, 806-814, 2017
342017
Capacity and frequency optimization of wireless backhaul network using traffic forecasting
A Mahmood, MLM Kiah, MR Z’aba, AN Qureshi, MSS Kassim, ZHA Hasan, ...
IEEE Access 8, 23264-23276, 2020
332020
Authenticated encryption schemes: A systematic review
MA Jimale, MR Z’aba, MLBM Kiah, MYI Idris, N Jamil, MS Mohamad, ...
IEEE Access 10, 14739-14766, 2022
312022
Analysis of linear relationships in block ciphers
MR Z'aba
Queensland University of Technology, 2010
302010
Machine learning-based cooperative spectrum sensing in dynamic segmentation enabled cognitive radio vehicular network
MA Hossain, R Md Noor, KLA Yau, SR Azzuhri, MR Z’aba, I Ahmedy, ...
Energies 14 (4), 1169, 2021
292021
I-PRESENTTM: An Involutive Lightweight Block Cipher
MR Z’aba, N Jamil, ME Rusli, MZ Jamaludin, AAM Yasir
Journal of Information Security 2014, 2014
282014
Implementation of PRINCE algorithm in FPGA
YA Abbas, R Jidin, N Jamil, MR Z'aba, ME Rusli, B Tariq
Proceedings of the 6th International Conference on Information Technology …, 2014
242014
Spectrum sensing challenges & their solutions in cognitive radio based vehicular networks
MA Hossain, R Md Noor, SR Azzuhri, MR Z'aba, I Ahmedy, KLA Yau, ...
International Journal of Communication Systems 34 (7), e4748, 2021
232021
Adapted stream region for packet marking based on DDoS attack detection in vehicular ad hoc networks
R Kolandaisamy, RM Noor, MR Z’aba, I Ahmedy, I Kolandaisamy
The Journal of Supercomputing 76 (8), 5948-5970, 2020
232020
AES: Current security and efficiency analysis of its alternatives
H Isa, I Bahari, H Sufian, MR Z'aba
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
222011
S-box construction from non-permutation power functions
H Isa, N Jamil, MR Z'aba
Proceedings of the 6th International Conference on Security of Information …, 2013
182013
IMPLEMENTATION OF LIGHTWEIGHT CRYPTOGRAPHIC PRIMITIVES.
BT Hammad, N Jamil, ME Rusli, MR Z'ABA, IT Ahmed
Journal of Theoretical & Applied Information Technology 95 (19), 2017
172017
Structured encryption for conceptual graphs
GS Poh, MS Mohamad, MR Z’aba
International Workshop on Security, 105-122, 2012
172012
Hybrid heuristic methods in constructing cryptographically strong S-boxes
H Isa, N Jamil, M Z’aba
Int. J. Cryptol. Res 6 (1), 1-15, 2016
152016
PRINCE IP-core on field programmable gate arrays (FPGA)
YA Abbas, R Jidin, N Jamil, ME Rusli
Research Journal of Applied Sciences, Engineering and Technology 10 (8), 914-922, 2015
102015
A survey on the cryptanalysis of the advanced encryption standard
MR Z’aba, MA Maarof
Proceedings of the postgraduate annual research seminar, 97-102, 2006
102006
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20