Search Results - Samsudin, Azman
- Showing 1 - 20 results of 29
- Go to Next Page
-
1
Simple Knit Design System; Using Pattern Matching. by Budiarto, Rahmat, Samsudin, Azman, Masashi, Yamada
Published 2002Get full text
Get full text
Conference or Workshop Item -
2
Honeypots: Why We Need A Dynamics Honeypots? by Budiarto, Rahmat, Samsudin, Azman, Chuah, Wee Heong, Noori, Salah
Published 2004Get full text
Get full text
Conference or Workshop Item -
3
Development Of Penetration Testing Model For Increasing Network Security. by Budiarto, Rahmat, Ramadass, Sureswaran, Samsudin, Azman, Noori, Salah
Published 2004Get full text
Get full text
Conference or Workshop Item -
4
Multi-Threading Elliptic Curve Cryptosystems. by Kanniah, Uma S., Samsudin, Azman
Published 2007Get full text
Get full text
Conference or Workshop Item -
5
Efficient NEMO Security Management Via CAPKI. by Tat, Kin Tan, Samsudin, Azman
Published 2007Get full text
Get full text
Conference or Workshop Item -
6
Fast And Simple NEMO Authentication Via Random Number. by Tan, Tat Kin, Samsudin, Azman
Published 2007Get full text
Get full text
Conference or Workshop Item -
7
Generalized Scheme For Fractal Based Digital Signature (GFDS). by Alia, Mohammad Ahmad, Samsudin, Azman
Published 2007Get full text
Get full text
Article -
8
-
9
Visual Public-Key Cryptosystems. by Samsudin, Azman
Published 2012Get full text
Get full text
Monograph -
10
lPv6 Transition: Why A New Security Mechanisms Model Is Necessary. by Hj Mat Taib, Abidah, Budiarto, Rahmat, Samsudin, Azman
Published 2007Get full text
Get full text
Conference or Workshop Item -
11
-
12
Digital steganalysis: Computational intelligence approach by Din, Roshidi, Samsudin, Azman
Published 2009Get full text
Get full text
Get full text
Article -
13
Distributed Hierarchical IDS For MANET Over AODV+. by Pahlevanzadeh, Bahareh, Samsudin, Azman
Published 2007Get full text
Get full text
Conference or Workshop Item -
14
Computational intelligence in steganalysis environment by Din, Roshidi, Samsudin, Azman
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
15
-
16
ECSC-128: New Stream Cipher Based On Elliptic Curve Discrete Logarithm Problem. by Suwais, Khaled, Samsudin, Azman
Published 2007Get full text
Get full text
Conference or Workshop Item -
17
A conceptual framework for natural language steganalysis by Din, Roshidi, Samsudin, Azman
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Analysis of natural language steganography by Mansor, Shaifizat, Din, Roshidi, Samsudin, Azman
Published 2009Get full text
Get full text
Get full text
Article -
20
