A study on one way hashing function and its application for FTMSK webmail / Noor Hasimah Ibrahim Teo
Password is a normal way for securing data from intruders. The widespread use of password is in email account. The advances of technology have reduced the function of password in security, where there are many chances of password to be sniffed or hack by intruders. FTMSK webmail is using passwor...
| Main Author: | Ibrahim Teo, Noor Hasimah |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2005
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/1732/ |
Similar Items
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
Planar SIW diplexer using circular cavity resonator / Noor Hasimah Baba … [et al.]
by: Baba, Noor Hasimah, et al.
Published: (2017)
by: Baba, Noor Hasimah, et al.
Published: (2017)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Cryptographic hash function: a high level view
by: Taha, Imad, et al.
Published: (2015)
by: Taha, Imad, et al.
Published: (2015)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Hash function of finalist SHA-3: analysis study
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Cryptographic hash function: A high level view
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
Deferred tax and earnings management under MASB 25 / Noor Hasimah M. Yacob, Nor'Azam Mastuki and Rohaya Md Noor
by: M. Yacob, Hasimah, et al.
Published: (2011)
by: M. Yacob, Hasimah, et al.
Published: (2011)
New constructions of universal hash functions based on function sums
by: Khoo, , K, et al.
Published: (2006)
by: Khoo, , K, et al.
Published: (2006)
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Remarks on BioHash and its mathematical foundation
by: TEOH, A, et al.
Published: (2006)
by: TEOH, A, et al.
Published: (2006)
Examining the fraud awareness from the university’s academic staffs perspectives / Mohamad Ridhuan Mat Dangi and Noor Hasimah M. Yacob
by: Mat Dangi, Mohamad Ridhuan, et al.
Published: (2013)
by: Mat Dangi, Mohamad Ridhuan, et al.
Published: (2013)
Free space microwave characterization of silicon wafers for microelectronic applications / Zaiki Awang, Deepak Kumar Ghodgaonkar and Noor Hasimah Baba
by: Awang, Zaiki, et al.
Published: (2005)
by: Awang, Zaiki, et al.
Published: (2005)
Personal tax system: a comparison among Asean Commonwealth countries / Noor Hasimah M Yacob ... [et al.]
by: M Yacob, Noor Hasimah, et al.
Published: (2019)
by: M Yacob, Noor Hasimah, et al.
Published: (2019)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Recovery And Tamper Localization For Reversible Iris Image Watermarking Scheme Using Hash Function
by: Muhammad Alif Aiman, Abd Samad
Published: (2023)
by: Muhammad Alif Aiman, Abd Samad
Published: (2023)
Punca utama keresahan spiritual dalam penjagaan paliatif menurut perspektif psikologi agama / Hasimah Chik
by: Hasimah , Chik
Published: (2018)
by: Hasimah , Chik
Published: (2018)
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)
by: Ngo, , DCL, et al.
Published: (2004)
FTMSK online student support system (FOSS) / Karno Omar
by: Omar, Karno
Published: (2005)
by: Omar, Karno
Published: (2005)
FTMSK Resources Scheduling System (FRSS) / Maria Kamaruddin @ Yin
by: Kamaruddin @ Yin, Maria
Published: (2005)
by: Kamaruddin @ Yin, Maria
Published: (2005)
Omega network hash construction
by: Chuah, Chai Wen
Published: (2009)
by: Chuah, Chai Wen
Published: (2009)
Computer risk profiling system for FTMSK computer's lab / Yusaniah Yusof
by: Yusof, Yusaniah
Published: (2007)
by: Yusof, Yusaniah
Published: (2007)
i-Learn portal: The perception among FTMSK students / Norhayati Ishak
by: Ishak, Norhayati
Published: (2006)
by: Ishak, Norhayati
Published: (2006)
Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali
by: Azali, Muhamad Rizal
Published: (2005)
by: Azali, Muhamad Rizal
Published: (2005)
Design and development of FTMSK alumni information repository / Herojer Asoon
by: Asoon, Herojer
Published: (2006)
by: Asoon, Herojer
Published: (2006)
Traffic analysis for video streaming : a study in FTMSK
/ Diana Mohd Alwi
by: Mohd Alwi, Diana
Published: (2005)
by: Mohd Alwi, Diana
Published: (2005)
Wireless security assessment on the FTMSK2 building / Zainurzaman Mah Sangit @ Kasmat
by: Mah Sangit @ Kasmat, Zainurzaman
Published: (2007)
by: Mah Sangit @ Kasmat, Zainurzaman
Published: (2007)
The service quality of computer laboratory's facility in FTMSK : student's satisfaction / Mazliani Arsad
by: Arsad, Mazliani
Published: (2006)
by: Arsad, Mazliani
Published: (2006)
Cancellable biometrics and annotations on BioHash
by: TEOH, A, et al.
Published: (2008)
by: TEOH, A, et al.
Published: (2008)
Improved fuzzy hashing technique for biometric template protection
by: Ong, T. S., et al.
Published: (2014)
by: Ong, T. S., et al.
Published: (2014)
A collision resistant cryptographic hash function based on cellular automata rules
by: Jamil, Norziana
Published: (2013)
by: Jamil, Norziana
Published: (2013)
A proposed framework for FTMSK alumni / Fazleen Noorhuda Abdul Majid
by: Abdul Majid, Fazleen Noorhuda
Published: (2005)
by: Abdul Majid, Fazleen Noorhuda
Published: (2005)
Development of online facility management system for FTMSK computer center / Husni Ahmad Hanafi
by: Ahmad Hanafi, Husni
Published: (2007)
by: Ahmad Hanafi, Husni
Published: (2007)
Knowledgepoint : a study on the usability of the user interface for FTMSK'S knowledge portal / Sharliza Kamarulzaman
by: Kamarulzaman, Sharliza
Published: (2005)
by: Kamarulzaman, Sharliza
Published: (2005)
Awareness of e-learning drawbacks among FTMSK students / Zool Fadly Arasat (Arshad)
by: Arasat (Arshad), Zool Fadly
Published: (2007)
by: Arasat (Arshad), Zool Fadly
Published: (2007)
SHA family hash function
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
RIPEMD and Chameleon hash function
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Similar Items
-
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013) -
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023) -
Planar SIW diplexer using circular cavity resonator / Noor Hasimah Baba … [et al.]
by: Baba, Noor Hasimah, et al.
Published: (2017) -
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014) -
Cryptographic hash function: a high level view
by: Taha, Imad, et al.
Published: (2015)