Multimedia encryption, transmission and authentication
| Other Authors: | Khalifa, Othman Omran |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/25515/ http://irep.iium.edu.my/25515/1/Book.pdf |
Similar Items
Real-time MPEG-4 transmission over wireless LAN
by: Mohammed Jama, Abdirisaq, et al.
Published: (2011)
by: Mohammed Jama, Abdirisaq, et al.
Published: (2011)
Super Authentication Security System (SASS) to Malaysian community for safety management
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
Design and fabrication of Stewart platform for tracking and vibration isolation for free space optic transmission
by: Antong, Hasmawati, et al.
Published: (2012)
by: Antong, Hasmawati, et al.
Published: (2012)
Durian Farm Threats Identification through Convolution Neural
Networks and Multimedia Mobile Development
by: Yusoff, Aiman, et al.
by: Yusoff, Aiman, et al.
Security threats of finger print biometric in network system environment
by: Taha, Imad, et al.
Published: (2011)
by: Taha, Imad, et al.
Published: (2011)
Context aware knowledge bases for efficient contextual retrieval: design and methodologies
by: Wani, Sharyar, et al.
Published: (2019)
by: Wani, Sharyar, et al.
Published: (2019)
Dynamic object replica placement using underlying routing protocols: ensuring the reliability
by: Waqas, Ahmad, et al.
Published: (2013)
by: Waqas, Ahmad, et al.
Published: (2013)
Investigating key success factors in adopting knowledge management system
by: Noordin, Mohamad Fauzan, et al.
Published: (2013)
by: Noordin, Mohamad Fauzan, et al.
Published: (2013)
A novel associative memory approach to speech enhancement
in a vehicular environment
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2009)
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2009)
Selected topics in information technology : series 1
Published: (2017)
Published: (2017)
Android based application for monitoring patients health and medicine intake
by: Othman, Muhaini, et al.
Published: (2017)
by: Othman, Muhaini, et al.
Published: (2017)
Enhancing user experience in interactive directory kiosk with virtual walkthrough
by: Senan, Norhalina, et al.
Published: (2017)
by: Senan, Norhalina, et al.
Published: (2017)
A proof of concept on real-time air quality monitoring system
by: Selvarajah, Ruban, et al.
Published: (2017)
by: Selvarajah, Ruban, et al.
Published: (2017)
Tailoring human resource management in home furnishing business
by: Wong, Li Teng, et al.
Published: (2017)
by: Wong, Li Teng, et al.
Published: (2017)
Facilitator management system for campus orientation programme
by: Mahamad Zakaria, Muhammad Luqman, et al.
Published: (2017)
by: Mahamad Zakaria, Muhammad Luqman, et al.
Published: (2017)
Wedding planner in a box
by: Peraganathan, Megalah, et al.
Published: (2017)
by: Peraganathan, Megalah, et al.
Published: (2017)
Dream life matchmaker
by: Subramaniam Chetty, Nithya Dewi, et al.
Published: (2017)
by: Subramaniam Chetty, Nithya Dewi, et al.
Published: (2017)
E-kenegaraan online exam practise
by: Kasim, Shahreen, et al.
Published: (2017)
by: Kasim, Shahreen, et al.
Published: (2017)
MIS: mommies information system
by: Kasim, Shahreen, et al.
Published: (2017)
by: Kasim, Shahreen, et al.
Published: (2017)
Online korean skincare decision support system
by: Wahid, Norfaradilla, et al.
Published: (2017)
by: Wahid, Norfaradilla, et al.
Published: (2017)
A new auditing mechanism for open source NoSQL database a case study on open source MongoDB database
by: Mohamed, Hany Heidar Hussein
Published: (2015)
by: Mohamed, Hany Heidar Hussein
Published: (2015)
Hybrid model of post-processing techniques for Arabic optical character recognition
by: Habeeb, Imad Qasim
Published: (2016)
by: Habeeb, Imad Qasim
Published: (2016)
Optimization of medical image steganography using n-decomposition genetic algorithm
by: Al-Sarayefi, Bushra Abdullah Shtayt
Published: (2023)
by: Al-Sarayefi, Bushra Abdullah Shtayt
Published: (2023)
A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System
by: Chiadighikaobi, Ikenna Rene
Published: (2024)
by: Chiadighikaobi, Ikenna Rene
Published: (2024)
Conceptual model of persuasive multimedia content (PMC) for social media advertising of island homestays
by: Muhammad Abdul Malik, Saedon
Published: (2019)
by: Muhammad Abdul Malik, Saedon
Published: (2019)
Enhancing the security of RCIA ultra-lightweight
authentication protocol by using random number generator (RNG) technique
by: Yasear, Shaymah Akram
Published: (2015)
by: Yasear, Shaymah Akram
Published: (2015)
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
by: Lim, Tsu Chean, et al.
Published: (2018)
by: Lim, Tsu Chean, et al.
Published: (2018)
Feature extraction techniques of online handwriting arabic text recognition
by: Abuzaraida, Mustafa Ali, et al.
Published: (2013)
by: Abuzaraida, Mustafa Ali, et al.
Published: (2013)
Relationship analysis of formal and experiential learning in military survival skills using text mining
by: Zainol, Zuraini, et al.
Published: (2019)
by: Zainol, Zuraini, et al.
Published: (2019)
On infinite-dimensional dissipative quadratic stochastic operators
by: Shahidi, Farruh
Published: (2013)
by: Shahidi, Farruh
Published: (2013)
Evaluating the visibility and accessibility of world universities websites
by: Abu Bakar, Ahmad Bakeri
Published: (2011)
by: Abu Bakar, Ahmad Bakeri
Published: (2011)
Proposing a framework for evaluating content and design of religion-based : Islamic websites
by: Mahmud, Murni, et al.
Published: (2011)
by: Mahmud, Murni, et al.
Published: (2011)
Evaluating the visibility and accessibility of universities websites in the Muslim world
by: Abu Bakar, Ahmad Bakeri
Published: (2011)
by: Abu Bakar, Ahmad Bakeri
Published: (2011)
Empirical investigation on agile methods usage:
issues identified from early adopters in Malaysia
by: Asnawi, Ani Liza, et al.
Published: (2011)
by: Asnawi, Ani Liza, et al.
Published: (2011)
Android smartphone: Battery saving service
by: Ismail, Zahid, et al.
Published: (2011)
by: Ismail, Zahid, et al.
Published: (2011)
Improving the deployment of broadband content delivery using an open access approach in a high speed broadband environment in the Klang Valley
by: Ismail, Zahid
Published: (2011)
by: Ismail, Zahid
Published: (2011)
Strategy and policy statements on green ICT : an Islamic perspective.
by: Hameed, Shihab A.
Published: (2011)
by: Hameed, Shihab A.
Published: (2011)
Improving subscriber viewing experience via the integration of contents from multiple broadband service providers based on open access policy
by: Ismail, Mohd Zahid
Published: (2011)
by: Ismail, Mohd Zahid
Published: (2011)
Basic emotions verification and identification using Gaussian Mixture Model (GMM) features extraction
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2011)
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2011)
Research methodologies: a practical approach
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Similar Items
-
Real-time MPEG-4 transmission over wireless LAN
by: Mohammed Jama, Abdirisaq, et al.
Published: (2011) -
Super Authentication Security System (SASS) to Malaysian community for safety management
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011) -
Design and fabrication of Stewart platform for tracking and vibration isolation for free space optic transmission
by: Antong, Hasmawati, et al.
Published: (2012) -
Durian Farm Threats Identification through Convolution Neural
Networks and Multimedia Mobile Development
by: Yusoff, Aiman, et al. -
Security threats of finger print biometric in network system environment
by: Taha, Imad, et al.
Published: (2011)