Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
Biometric technology which can be used to recognize an individual’s identity based on his or her behavioral or physiological characteristics has become one of the most publicized authentication method. Fingerprint authentication has been chosen among other biometric technologies such as hand geometr...
| Main Author: | ‘Asri, Nur Nadia Syahirah |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2017
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/18939/ |
Similar Items
Modified algorithm for image watermarking using 2D-DCT and elgamal cryptosystem / Nur Azien Yazid, Kamilah Abdullah and Suhaila Abd Halim
by: Yazid, Nur Azien, et al.
Published: (2019)
by: Yazid, Nur Azien, et al.
Published: (2019)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011)
by: Mandangan, Arif
Published: (2011)
Cryptanalysis of polynomial reconstruction problem based cryptosystems
by: Yusof, Siti Nabilah
Published: (2023)
by: Yusof, Siti Nabilah
Published: (2023)
Security performance analysis of photography service system / Farah Shazwani Ismail
by: Ismail, Farah Shazwani
Published: (2019)
by: Ismail, Farah Shazwani
Published: (2019)
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
by: Syed Adnan, Syed Farid
Published: (2019)
by: Syed Adnan, Syed Farid
Published: (2019)
Iris recognition for E-Voting authentication in UiTM Melaka Campus Jasin / Muhamad Akmal Othman
by: Othman, Muhamad Akmal
Published: (2017)
by: Othman, Muhamad Akmal
Published: (2017)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
Nonlinearity analyses and adaptation of nonlinearity traits of key generation protocol of el-gamal AAß cryptosystem
by: Ahmad, Miza Mumtaz
Published: (2011)
by: Ahmad, Miza Mumtaz
Published: (2011)
Smart Door Lock System Using Bluetooth Based Android for Smartphone with Door Lock Keypad
by: M. H., Muhammad Sidik, et al.
Published: (2018)
by: M. H., Muhammad Sidik, et al.
Published: (2018)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
Smart door lock based on bluetooth and IoT
by: Hashim Al-Tuma, Khalid Asaad
Published: (2019)
by: Hashim Al-Tuma, Khalid Asaad
Published: (2019)
Kembangan pseudotnaf untuk pendaraban skalar di atas lenkuk koblitz
by: Yunos, Faridah
Published: (2014)
by: Yunos, Faridah
Published: (2014)
Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
Design and implementation of a web-based replacement for the manual system of moderating exams
by: Oladokun, Adeola Asiat
Published: (2014)
by: Oladokun, Adeola Asiat
Published: (2014)
Grid-based multi-touch gesture to enhance two-factor authentication graphical password for mobile phones
by: Zabidi, Nur Syabila
Published: (2021)
by: Zabidi, Nur Syabila
Published: (2021)
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
by: Wong, Tze Jin
Published: (2006)
by: Wong, Tze Jin
Published: (2006)
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
by: M. Abulkhirat, Esam
Published: (2003)
by: M. Abulkhirat, Esam
Published: (2003)
Performance analysis and improvement of rabin primitive based cryptosystems
by: Mahad, Zahari
Published: (2014)
by: Mahad, Zahari
Published: (2014)
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018)
by: Iranmanesh, Vahab
Published: (2018)
Smart door lock bluetooth using mobile android application
by: Abdul Muizz, Abdul Majid
Published: (2018)
by: Abdul Muizz, Abdul Majid
Published: (2018)
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
Rfid Door Lock With Realization Of Internet Of Things For Smart Home System
by: Zafirah, Zainon
Published: (2017)
by: Zafirah, Zainon
Published: (2017)
A study of campus wireless network technology acceptance among student in UiTM Terengganu, Dungun Campus / Aainaa Abdul Rahim, Nur Izyan Kamaru Zaman and Zaimatul Adawiah Zainuddin
by: Abdul Rahim, Aainaa, et al.
Published: (2012)
by: Abdul Rahim, Aainaa, et al.
Published: (2012)
Cryptanalysis of RSA and its variants using continuous midpoint subdivision analysis and lattices
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
A systematic mapping on risks and techniques to enhance security in multi-cloud environments
by: Gonzalez Alberto, Ana Y
Published: (2017)
by: Gonzalez Alberto, Ana Y
Published: (2017)
Broken biosecurity?: veterinarians’ framing of biosecurity on dairy farms in England
by: Shortall, Orla, et al.
Published: (2016)
by: Shortall, Orla, et al.
Published: (2016)
Intelligent automatic door lock
by: Abdul Rahim, Herlina
Published: (2007)
by: Abdul Rahim, Herlina
Published: (2007)
Bluetooth door lock automation system
by: Nor Diyana, Hussin
Published: (2016)
by: Nor Diyana, Hussin
Published: (2016)
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
by: Mohd Ali, Fakariah Hani
Published: (2004)
by: Mohd Ali, Fakariah Hani
Published: (2004)
Mathematical aspects of selected block ciphers
by: Alqarni, Yazeed Saeed
Published: (2015)
by: Alqarni, Yazeed Saeed
Published: (2015)
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf
Published: (2015)
by: Asbullah, Muhammad Asyraf
Published: (2015)
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
by: Daud, Muhamad Azlan
Published: (2014)
by: Daud, Muhamad Azlan
Published: (2014)
A study of the factors influencing yield spread of Malaysian Bond / Fatin Nadia Fatihah Ramli
by: Ramli, Fatin Nadia Fatihah
Published: (2011)
by: Ramli, Fatin Nadia Fatihah
Published: (2011)
Shaaf jack light enterprise / Azwa Nadia Mat Asri...[et al.]
by: Mat Asri, Azwa Nadia, et al.
Published: (2014)
by: Mat Asri, Azwa Nadia, et al.
Published: (2014)
Home door lock system using android based : telegram / Nur Syafinaz Abdullahtip
by: Abdullahtip, Nur Syafinaz
Published: (2020)
by: Abdullahtip, Nur Syafinaz
Published: (2020)
Practical fair anonymous undeniable signatures
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
New compendium of RSA vulnerabilities
by: Abd Ghafar, Amir Hamzah
Published: (2020)
by: Abd Ghafar, Amir Hamzah
Published: (2020)
Similar Items
-
Modified algorithm for image watermarking using 2D-DCT and elgamal cryptosystem / Nur Azien Yazid, Kamilah Abdullah and Suhaila Abd Halim
by: Yazid, Nur Azien, et al.
Published: (2019) -
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010) -
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011) -
Cryptanalysis of polynomial reconstruction problem based cryptosystems
by: Yusof, Siti Nabilah
Published: (2023) -
Security performance analysis of photography service system / Farah Shazwani Ismail
by: Ismail, Farah Shazwani
Published: (2019)