Cryptanalysis, provable security and implementation of fuzzy identity-based cryptography
| Main Author: | Tan, Syh Yuan |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/1491/ http://eprints.utar.edu.my/1491/1/EGA%2D2014%2D1106189%2D1.pdf |
Similar Items
An efficient and provable secure identity-based identification scheme in the standard model
by: Ji-Jian, Chin, et al.
Published: (2008)
by: Ji-Jian, Chin, et al.
Published: (2008)
Extention and cryptanalysis of golden cryptography
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
Provably secure randomized AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
Provably secure Rabin-p cryptosystem in hybrid setting
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Path detection implementation using fuzzy classifier
by: Khan, Imran Moez, et al.
Published: (2011)
by: Khan, Imran Moez, et al.
Published: (2011)
Design And Analysis Of Identity-Based Identification Schemes And Their Variants
by: Yuan, Tan Syh
Published: (2010)
by: Yuan, Tan Syh
Published: (2010)
Implementation of Fuzzy Logic System for Motor Motion Generation Based on Electrooculogram / Nurul Muthmainnah Mohd Noor...[et al.]
by: Mohd Noor, Nurul Muthmainnah, et al.
Published: (2015)
by: Mohd Noor, Nurul Muthmainnah, et al.
Published: (2015)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Investigations of nanocoolant based Al2O3 for improving cooling performance in hot press forming
by: Lim, Syh Kai
Published: (2018)
by: Lim, Syh Kai
Published: (2018)
Topics in coding, cryptography and information security
Published: (2011)
Published: (2011)
On the use of fuzzy rule interpolation techniques for monotonic multi-input fuzzy rule base models
by: Tay, Kai Mei, et al.
Published: (2009)
by: Tay, Kai Mei, et al.
Published: (2009)
Implementing cryptography in database
by: Kwan, Shong Hann
Published: (2010)
by: Kwan, Shong Hann
Published: (2010)
Fuzzy logic-based intelligent control of flexible link manipulator
by: Tijani, Ismaila, et al.
Published: (2011)
by: Tijani, Ismaila, et al.
Published: (2011)
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Daily streamflow forecasting using simplified
rule-based fuzzy logic system
by: Yaacob, Mohd. Shafiek, et al.
Published: (2005)
by: Yaacob, Mohd. Shafiek, et al.
Published: (2005)
Fuzzy Analytic Hierarchy Process (FAHP) for Better Selection during Implementation of Design for Remanufacturing in Economy Indicator / Ahamad Zaki Mohamed Noor... [et al.]
by: Mohamed Noor, Ahamad Zaki, et al.
Published: (2019)
by: Mohamed Noor, Ahamad Zaki, et al.
Published: (2019)
Coding, cryptography, information security and OFDM
Published: (2011)
Published: (2011)
Fuzzy Mixed Assembly Line Sequencing and Scheduling Optimization Model Using Multiobjective Dynamic Fuzzy GA
by: Zahari, Taha, et al.
Published: (2014)
by: Zahari, Taha, et al.
Published: (2014)
The new fuzzy analytical hierarchy process with interval type-2 trapezoidal fuzzy sets and its application
by: Sam’an, Muhammad, et al.
Published: (2021)
by: Sam’an, Muhammad, et al.
Published: (2021)
Design and implementation of an intelligent fuzzy logic controller (FLC) for Air Handling Unit (AHU) for smart house
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2011)
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2011)
Cryptanalysis of RSA
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Fuzzy PID controller applied on milling machine
by: Mohd Zafrullah, Zulkifli
Published: (2012)
by: Mohd Zafrullah, Zulkifli
Published: (2012)
Fuzzy active vibration control for lathe machine
by: Muhamad Faisal Ezuarie , Draman
Published: (2010)
by: Muhamad Faisal Ezuarie , Draman
Published: (2010)
Muscle-Alike Actuator based on Ionic Polymer Metal Composite (IPMC)
by: Ong, Yon Yuan
Published: (2016)
by: Ong, Yon Yuan
Published: (2016)
Automatic room temperature control with security system
by: Ahmad Faris, Zulkifli
Published: (2009)
by: Ahmad Faris, Zulkifli
Published: (2009)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Chaos Based Cryptography An Alternative to Algebraic Cryptography
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
Fuzzy logic approach for estimation of longitudinal aircraft parameters
by: Yaacob, M. S., et al.
Published: (2002)
by: Yaacob, M. S., et al.
Published: (2002)
In-socket sensory system with an adaptive neuro-based fuzzy inference system for active transfemoral prosthetic legs
by: Mohd Yusof, Nur Hidayah, et al.
Published: (2019)
by: Mohd Yusof, Nur Hidayah, et al.
Published: (2019)
Rekabentuk shelter security system dan analisis kejuruteraan
by: Subramaniam, Tamil Selvan, et al.
Published: (2021)
by: Subramaniam, Tamil Selvan, et al.
Published: (2021)
Implementation of outcome based education in the faculty of mechanical engineering, universiti malaysia pahang : An experience
by: Mohd Ruzaimi, Mat Rejab, et al.
Published: (2008)
by: Mohd Ruzaimi, Mat Rejab, et al.
Published: (2008)
Microstructure and mechanical properties of boron sheet metal steels in hot press forming process with nanofluid as coolant
by: Ahmad Razlan, Yusoff, et al.
Published: (2019)
by: Ahmad Razlan, Yusoff, et al.
Published: (2019)
Multiobjective Fuzzy Mixed Assembly Line Sequencing Optimization Model
by: Tahriri, Farzad, et al.
Published: (2014)
by: Tahriri, Farzad, et al.
Published: (2014)
Application of fuzzy logic approach for an aircraft model with and without winglet
by: Hossain, Altab, et al.
Published: (2011)
by: Hossain, Altab, et al.
Published: (2011)
Proceedings of the 2nd Energy Security and Chemical Engineering Congress
Published: (2023)
Published: (2023)
Secret to Success: Securing Petronas Vendor Development Program (VDP)
by: M. S. M., Sani, et al.
Published: (2016)
by: M. S. M., Sani, et al.
Published: (2016)
Implementing slam for practical scenarios
by: Lim, Zhi Jian
Published: (2022)
by: Lim, Zhi Jian
Published: (2022)
Fuzzy-tuned PID anti-swing control of automatic gantry crane
by: Solihin, Mahmud Iwan, et al.
Published: (2010)
by: Solihin, Mahmud Iwan, et al.
Published: (2010)
Design of controller for elevator group using fuzzy logic Part 1
by: Rashid, Muhammad Mahbubur, et al.
Published: (2011)
by: Rashid, Muhammad Mahbubur, et al.
Published: (2011)
Similar Items
-
An efficient and provable secure identity-based identification scheme in the standard model
by: Ji-Jian, Chin, et al.
Published: (2008) -
Extention and cryptanalysis of golden cryptography
by: Sharabyan, Mohammad Tahghighi
Published: (2015) -
Provably secure randomized AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015) -
Provably secure Rabin-p cryptosystem in hybrid setting
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016) -
Path detection implementation using fuzzy classifier
by: Khan, Imran Moez, et al.
Published: (2011)