An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Lightweight cryptography offers energy-efficient cryptographic capabilities on low powered devices such as those commonly found in the Internet of Things (IoT). One such lightweight scheme is the AA-Beta (AAḃ) asymmetric cryptographic scheme whose algorithm consists of only basic arithmetic operatio...
| Main Author: | Syed Adnan, Syed Farid |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/31518/ |
Similar Items
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
by: ‘Asri, Nur Nadia Syahirah
Published: (2017)
by: ‘Asri, Nur Nadia Syahirah
Published: (2017)
Modified algorithm for image watermarking using 2D-DCT and elgamal cryptosystem / Nur Azien Yazid, Kamilah Abdullah and Suhaila Abd Halim
by: Yazid, Nur Azien, et al.
Published: (2019)
by: Yazid, Nur Azien, et al.
Published: (2019)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011)
by: Mandangan, Arif
Published: (2011)
Cryptanalysis of polynomial reconstruction problem based cryptosystems
by: Yusof, Siti Nabilah
Published: (2023)
by: Yusof, Siti Nabilah
Published: (2023)
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
Pengering buah-buahan / Adnan Abdul Rahman and Syed Mohd. Nazri Syed Aziz
by: Abdul Rahman, Adnan, et al.
Published: (1991)
by: Abdul Rahman, Adnan, et al.
Published: (1991)
Practical fair anonymous undeniable signatures
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Generating of cotidal dataset by spatial interpolation techniques / Khadijah Sahdan, Syed Ahmad Qusoiri Syed Abdul Karim and Othman Mohd Yusof
by: Khadijah, Sahdan, et al.
Published: (2015)
by: Khadijah, Sahdan, et al.
Published: (2015)
Steganography For Embedding Data In Digital Image
by: Sowan, Salah Ibrahem
Published: (2003)
by: Sowan, Salah Ibrahem
Published: (2003)
Nonlinearity analyses and adaptation of nonlinearity traits of key generation protocol of el-gamal AAß cryptosystem
by: Ahmad, Miza Mumtaz
Published: (2011)
by: Ahmad, Miza Mumtaz
Published: (2011)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
Improved Algebraic Cryptanalysis of the Reduced-Round Advanced Encryption Standard
by: Rezaeipour, Davood
Published: (2011)
by: Rezaeipour, Davood
Published: (2011)
The comparison of [ARCGIS] and [QGIS] software using geocoding method for postal code enhancement in mailing delivery / Syed Izzad Syamil Syed Mahdi
by: Syed Mahdi, Syed Izzad Syamil
Published: (2019)
by: Syed Mahdi, Syed Izzad Syamil
Published: (2019)
IoT data encryption algorithm for security
by: Kanaan Ismael, Marwan
Published: (2020)
by: Kanaan Ismael, Marwan
Published: (2020)
Security performance analysis of photography service system / Farah Shazwani Ismail
by: Ismail, Farah Shazwani
Published: (2019)
by: Ismail, Farah Shazwani
Published: (2019)
Kembangan pseudotnaf untuk pendaraban skalar di atas lenkuk koblitz
by: Yunos, Faridah
Published: (2014)
by: Yunos, Faridah
Published: (2014)
Analysis of Rabin-p and HIME(R) encryption scheme on IoT platform
by: Abd Nashir, Abdul Muhaimin, et al.
Published: (2020)
by: Abd Nashir, Abdul Muhaimin, et al.
Published: (2020)
Synthesis and characterization of lisicon structured solid electrolytes for potential application in solid state electrochemical cells / Syed Bahari Ramadzan bin Syed Adnan
by: Syed Adnan, Syed Bahari Ramadzan
Published: (2014)
by: Syed Adnan, Syed Bahari Ramadzan
Published: (2014)
The study of radio frequency interference (RFI) for radio astronomy in some remote locations in Peninsular Malaysia / Syed Bahari Ramadzan bin Syed Adnan
by: Syed Adnan, Syed Bahari Ramadzan
Published: (2010)
by: Syed Adnan, Syed Bahari Ramadzan
Published: (2010)
Iris recognition for E-Voting authentication in UiTM Melaka Campus Jasin / Muhamad Akmal Othman
by: Othman, Muhamad Akmal
Published: (2017)
by: Othman, Muhamad Akmal
Published: (2017)
Modified Data Encryption Standard Algorithm for Textbased Applications
by: Mohamed Khmag, Asem Ib.
Published: (2006)
by: Mohamed Khmag, Asem Ib.
Published: (2006)
Security and privacy for IoT and fog computing paradigm
by: Rauf, Abdul, et al.
Published: (2018)
by: Rauf, Abdul, et al.
Published: (2018)
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
by: Wong, Tze Jin
Published: (2006)
by: Wong, Tze Jin
Published: (2006)
Design and implementation of a web-based replacement for the manual system of moderating exams
by: Oladokun, Adeola Asiat
Published: (2014)
by: Oladokun, Adeola Asiat
Published: (2014)
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
by: M. Abulkhirat, Esam
Published: (2003)
by: M. Abulkhirat, Esam
Published: (2003)
Performance analysis and improvement of rabin primitive based cryptosystems
by: Mahad, Zahari
Published: (2014)
by: Mahad, Zahari
Published: (2014)
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018)
by: Iranmanesh, Vahab
Published: (2018)
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
by: Alomari, Mohammad Ahmed Mohammad
Published: (2017)
by: Alomari, Mohammad Ahmed Mohammad
Published: (2017)
The humanitarian impacts on internal conflicts in Indonesia: a national security analysis / Denik Iswardani and Sharifah Shahirah Syed Sheikh
by: Iswardani, Denik, et al.
Published: (2014)
by: Iswardani, Denik, et al.
Published: (2014)
User interface for mobile learning / Syed Rahazuan Syed Deraman
by: Syed Deraman, Syed Rahazuan
Published: (2002)
by: Syed Deraman, Syed Rahazuan
Published: (2002)
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
Blockchain based security framework for device authentication and data communication in decentralized IoT network
by: Alahmed, Mahmoud Tayseer
Published: (2023)
by: Alahmed, Mahmoud Tayseer
Published: (2023)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
Regulasi sosial dalam Akta Komunikasi dan Multimedia dan kesannya kepada masyarakat Malaysia / Syed Agil b. Sheikh Alsagoff
by: Alsagoff, Syed Agil
Published: (2001)
by: Alsagoff, Syed Agil
Published: (2001)
A systematic mapping on risks and techniques to enhance security in multi-cloud environments
by: Gonzalez Alberto, Ana Y
Published: (2017)
by: Gonzalez Alberto, Ana Y
Published: (2017)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
Benefits and challenges of knowledge management in public sector : a case study of local authorities in Malaysia / Kalsom Salleh, Syed Noh Syed Ahmad and Syed Omar Sharifuddin Syed Ikhsan
by: Salleh, Kalsom, et al.
Published: (2010)
by: Salleh, Kalsom, et al.
Published: (2010)
Leadership style and the employee perceived on safety climate / Syed Hazim Syed Noh
by: Syed Noh, Syed Hazim
Published: (2018)
by: Syed Noh, Syed Hazim
Published: (2018)
Similar Items
-
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
by: ‘Asri, Nur Nadia Syahirah
Published: (2017) -
Modified algorithm for image watermarking using 2D-DCT and elgamal cryptosystem / Nur Azien Yazid, Kamilah Abdullah and Suhaila Abd Halim
by: Yazid, Nur Azien, et al.
Published: (2019) -
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010) -
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011) -
Cryptanalysis of polynomial reconstruction problem based cryptosystems
by: Yusof, Siti Nabilah
Published: (2023)