Search Results for Computer security -- Malaysia - Narrowed by: Mazleena Salleh SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bsecurity$002b--$002bMalaysia$0026qf$003dAUTHOR$002509Author$002509Mazleena$002bSalleh$002509Mazleena$002bSalleh$0026ps$003d300?dt=list 2024-04-27T06:52:50Z Steganography : random LSB insertion using discrete logarithm ent://SD_ILS/0/SD_ILS:353448 2024-04-27T06:52:50Z 2024-04-27T06:52:50Z by&#160;Muhalim Mohamed Amin<br/>Author&#160;Muhalim Mohamed Amin,&#160;Mazleena Salleh,&#160;Subariah Ibrahim,&#160;Mohd. Rozi Katmin,&#160;International Conference on Information Technology in Asia (3rd : 2003 : Kuching, Sarawak)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S734 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Information hiding using steganography ent://SD_ILS/0/SD_ILS:358844 2024-04-27T06:52:50Z 2024-04-27T06:52:50Z by&#160;Muhalim Mohamed Amin<br/>Author&#160;Muhalim Mohamed Amin,&#160;Mazleena Salleh,&#160;Subariah Ibrahim,&#160;M. R. Katmin,&#160;National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M83 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Secure E-voting with blind signature ent://SD_ILS/0/SD_ILS:327456 2024-04-27T06:52:50Z 2024-04-27T06:52:50Z by&#160;Subariah Ibrahim<br/>Author&#160;Subariah Ibrahim,&#160;Maznah Kamat, 1960-,&#160;Mazleena Salleh,&#160;Shah Rizan Abdul Aziz,&#160;National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S424 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Digital certificate service using LDAP directory ent://SD_ILS/0/SD_ILS:322498 2024-04-27T06:52:50Z 2024-04-27T06:52:50Z by&#160;Subariah Ibrahim<br/>Author&#160;Subariah Ibrahim,&#160;Son, Yeo Yiin,&#160;Mazleena Salleh,&#160;Lui, Yeok Peng,&#160;Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D53 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Security of mobile agents in distributed environment ent://SD_ILS/0/SD_ILS:321475 2024-04-27T06:52:50Z 2024-04-27T06:52:50Z by&#160;Afzan Zaidi<br/>Author&#160;Afzan Zaidi,&#160;Mazleena Salleh,&#160;Abdul Hanan Abdullah,&#160;Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.I58 A394 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Security issues of mobile agents ent://SD_ILS/0/SD_ILS:322071 2024-04-27T06:52:50Z 2024-04-27T06:52:50Z by&#160;Afzan Zaidi<br/>Author&#160;Afzan Zaidi,&#160;Mazleena Salleh,&#160;Abdul Hanan Abdullah,&#160;Malaysia Science and Technology Congress (2002 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.I58 A39 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Security guidelines of electronic academic assets ent://SD_ILS/0/SD_ILS:322088 2024-04-27T06:52:50Z 2024-04-27T06:52:50Z by&#160;Subariah Ibrahim<br/>Author&#160;Subariah Ibrahim,&#160;Mazleena Salleh,&#160;Shah Rizan Abdul Aziz,&#160;Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S92 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Risk analysis guideline for IT environment ent://SD_ILS/0/SD_ILS:123257 2024-04-27T06:52:50Z 2024-04-27T06:52:50Z by&#160;Mazleena Salleh<br/>Author&#160;Mazleena Salleh,&#160;Rabiah Ahmad, Dr.,&#160;Norafida Ithnin,&#160;Subariah Ibrahim,&#160;Symposium Kebangsaan Teknologi Maklumat (2000 : Bangi, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R57 2000<br/>Publication Date&#160;2000<br/>