Search Results for Cryptography - Narrowed by: Cryptography - English SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dCryptography$0026qf$003dSUBJECT$002509Subject$002509Cryptography$002509Cryptography$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list 2024-06-19T09:58:30Z Contemporary cryptography ent://SD_ILS/0/SD_ILS:799372 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Oppliger, Rolf<br/>Author&#160;Oppliger, Rolf<br/>Format:&#160;Books<br/>Call Number&#160;Z103 O66 2011<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781608071456<br/> Contemporary cryptography ent://SD_ILS/0/SD_ILS:454299 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Oppliger, Rolf<br/>Author&#160;Oppliger, Rolf<br/>Format:&#160;Books<br/>Call Number&#160;Z103 O66 2005<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781580536424<br/> Practical cryptography ent://SD_ILS/0/SD_ILS:371526 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Ferguson, Niels<br/>Author&#160;Ferguson, Niels,&#160;Schneier, Bruce, 1963-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F474 2003<br/>Publisher&#160;Wiley ,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780471228943&#160;9780471223573<br/> Cryptography decrypted ent://SD_ILS/0/SD_ILS:394200 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Mel, H. X., 1948-<br/>Author&#160;Mel, H. X., 1948-,&#160;Baker, Doris M., 1953-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M44 2001<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2001<br/>ISBN&#160;9780201616477<br/> Broadband quantum cryptography ent://SD_ILS/0/SD_ILS:764760 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Rogers, Daniel J.<br/>Author&#160;Rogers, Daniel J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R64 2010<br/>Publisher&#160;Morgan &amp; Claypool Publishers,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781608450596<br/> Cryptography research perspectives ent://SD_ILS/0/SD_ILS:642541 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Chen, Roland E.<br/>Author&#160;Chen, Roland E.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C833 2009<br/>Publisher&#160;Nova Science Publishers,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781604564921<br/> Cryptography for developers ent://SD_ILS/0/SD_ILS:170967 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;St. Denis, Tom<br/>Author&#160;St. Denis, Tom,&#160;Johnson, Simon<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S725 2007<br/>Publisher&#160;Syngrees Publishing,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781597491044<br/> Introduction to cryptography ent://SD_ILS/0/SD_ILS:152707 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Buchmann, Johannes A.<br/>Author&#160;Buchmann, Johannes A.<br/>Format:&#160;Books<br/>Call Number&#160;QA268 B82 2004<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780387207568<br/> Cryptography: an introduction ent://SD_ILS/0/SD_ILS:345509 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Smart, Nigel<br/>Author&#160;Smart, Nigel<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S62 2003<br/>Publisher&#160;McGraw-Hill Education ,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780077099879<br/> Cryptography : an introduction ent://SD_ILS/0/SD_ILS:756035 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Yaschenko V. V.<br/>Author&#160;Yaschenko V. V.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 .A25 V85 2002<br/>Series Title&#160;Student mathematical library, 1520-9121 ; v. 18<br/>Publisher&#160;American Mathematical Society,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780821829868<br/> Combine Cryptography Algorithms ent://SD_ILS/0/SD_ILS:843814 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Ahmad Sahban Rafsanjani, author<br/>Author&#160;Ahmad Sahban Rafsanjani, author,&#160;Jackman, James, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034525 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> Combine Cryptography Algorithms ent://SD_ILS/0/SD_ILS:843813 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Ahmad Sahban Rafsanjani, author<br/>Author&#160;Ahmad Sahban Rafsanjani, author,&#160;Jackman, James, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 A36 2014 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> Introduction to modern cryptography ent://SD_ILS/0/SD_ILS:284442 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Katz, Jonathan, 1974-<br/>Author&#160;Katz, Jonathan, 1974-,&#160;Lindell, Yehuda<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K37 2008<br/>Publisher&#160;Chapman &amp; Hall,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781584885511<br/> Introduction to modern cryptography ent://SD_ILS/0/SD_ILS:835855 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Katz, Jonathan, 1974- author<br/>Author&#160;Katz, Jonathan, 1974- author,&#160;Lindell, Yehuda, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K38 2015<br/>Edition&#160;Second edition<br/>Publisher&#160;CRC Press/Taylor &amp; Francis,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781466570269<br/> Cryptography : Infosec pro guide ent://SD_ILS/0/SD_ILS:807371 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Oriyano, Sean-Philip<br/>Author&#160;Oriyano, Sean-Philip<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 O75 2013<br/>Publisher&#160;McGraw-Hill Education,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780071794251<br/> Cryptography and information security ent://SD_ILS/0/SD_ILS:316537 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Pachghare, V. K.<br/>Author&#160;Pachghare, V. K.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P32 2009<br/>Publisher&#160;Prentice Hall of India,<br/>Publication Date&#160;2009<br/>ISBN&#160;9788120335219<br/> Computer security and cryptography ent://SD_ILS/0/SD_ILS:195334 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Konheim, Alan G., 1934-<br/>Author&#160;Konheim, Alan G., 1934-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K664 2007<br/>Publisher&#160;Wiley-Interscience,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780471947837<br/> Cryptography and its application ent://SD_ILS/0/SD_ILS:10299 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Chong, Sook Leng<br/>Author&#160;Chong, Sook Leng<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 13793<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Project Paper (Sarjana Muda Sains (Mathematik)) - Universiti Teknologi Malaysia, 2006<br/> Cryptography and its application ent://SD_ILS/0/SD_ILS:618999 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Chong, Sook Leng<br/>Author&#160;Chong, Sook Leng<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 4596<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Project Paper (Sarjana Muda Sains (Matematik)) - Universiti Teknologi Malaysia, 2006<br/> Cryptography and its application ent://SD_ILS/0/SD_ILS:477714 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Chong, Sook Leng<br/>Author&#160;Chong, Sook Leng<br/>Format:&#160;Books<br/>Call Number&#160;Z103 C46 2006 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Project Paper (Sarjana Muda Sains (Mathematik)) - Universiti Teknologi Malaysia, 2006<br/> Cryptography : theory and practice ent://SD_ILS/0/SD_ILS:143227 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Stinson, Douglas R. (Douglas Robert), 1956-<br/>Author&#160;Stinson, Douglas R. (Douglas Robert), 1956-<br/>Format:&#160;Books<br/>Call Number&#160;QA268 S74 2006<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Chapman &amp; Hall/CRC,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781584885085<br/> Quantum communications and cryptography ent://SD_ILS/0/SD_ILS:490877 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Sergienko, Alexander V.<br/>Author&#160;Sergienko, Alexander V.<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 Q36 2005<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780849336843<br/> Beginning cryptography with Java ent://SD_ILS/0/SD_ILS:537235 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Hook, David, 1962-<br/>Author&#160;Hook, David, 1962-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H66 2005<br/>Publisher&#160;Wiley Pub.,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780764596339<br/> Malicious cryptography : exposing cryptovirology ent://SD_ILS/0/SD_ILS:395529 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Young, Adam, 1972-<br/>Author&#160;Young, Adam, 1972-,&#160;Yung, Moti<br/>Format:&#160;Books<br/>Call Number&#160;QA 76.9 .A25 Y68 2004<br/>Publisher&#160;Wiley Pub.,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780764549755<br/> Cryptography and secure communications ent://SD_ILS/0/SD_ILS:299072 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Man, Young Rhee<br/>Author&#160;Man, Young Rhee<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R43 1994<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;1994<br/>ISBN&#160;9780071125024<br/> Cryptolib: cryptography in software ent://SD_ILS/0/SD_ILS:415709 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Lacy, John B.<br/>Author&#160;Lacy, John B.<br/>Format:&#160;Books<br/>Call Number&#160;MAK 5972<br/> Cryptography and data security ent://SD_ILS/0/SD_ILS:296031 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Denning, Dorothy Elizabeth Robling<br/>Author&#160;Denning, Dorothy Elizabeth Robling<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D46 1982<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;1983&#160;1982<br/>ISBN&#160;9780201101508<br/> Introduction to cryptography : principles and applications ent://SD_ILS/0/SD_ILS:164219 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Delfs, Hans<br/>Author&#160;Delfs, Hans,&#160;Knebl, Helmut<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D44 2007<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540492436<br/><a href="http://dx.doi.org/10.1007/3-540-49244-5">Fulltext</a><br/> Applications of cryptography and network security ent://SD_ILS/0/SD_ILS:836934 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Mason, Stephen<br/>Author&#160;Mason, Stephen<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 A675 2015<br/>Publisher&#160;Clanrye Intl.,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632400659<br/> An introduction to number theory with cryptography ent://SD_ILS/0/SD_ILS:834546 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Kraft, James S.<br/>Author&#160;Kraft, James S.,&#160;Washington, Lawrence C.<br/>Format:&#160;Books<br/>Call Number&#160;QA241 K73 2014<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781482214413<br/> Cryptography in C and C++ ent://SD_ILS/0/SD_ILS:829247 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Welschenbach, Michael, author<br/>Author&#160;Welschenbach, Michael, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W45 2013<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Apress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781430250982<br/> New directions of modern cryptography ent://SD_ILS/0/SD_ILS:837292 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Cao, Zhenfu, author<br/>Author&#160;Cao, Zhenfu, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 C36 2013<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466501386<br/> Introduction to cryptography and network security ent://SD_ILS/0/SD_ILS:155877 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Forouzan, Behrouz A.<br/>Author&#160;Forouzan, Behrouz A.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 F67 2008<br/>Publisher&#160;McGraw-Hill Higher Education,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780073327532<br/> Quantum cryptography and secret-key distillation ent://SD_ILS/0/SD_ILS:134938 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Van Assche, Gilles<br/>Author&#160;Van Assche, Gilles<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V36 2006<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780521864855<br/> Complexity and cryptography : an introduction ent://SD_ILS/0/SD_ILS:390976 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Talbot, John<br/>Author&#160;Talbot, John,&#160;Welsh, D. J. A<br/>Format:&#160;Books<br/>Call Number&#160;Z103 T35 2006<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780521852319<br/> Introduction to cryptography : with coding theory ent://SD_ILS/0/SD_ILS:326112 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Trappe, Wade<br/>Author&#160;Trappe, Wade,&#160;Washington, Lawrence C.<br/>Format:&#160;Books<br/>Call Number&#160;QA268 T73 2006<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780131981997&#160;9780131862395<br/> Modern cryptography : theory and practice ent://SD_ILS/0/SD_ILS:156314 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Mao, Wenbo<br/>Author&#160;Mao, Wenbo<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M36 2004<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780130669438<br/> RSA Securitys official guide to cryptography ent://SD_ILS/0/SD_ILS:615019 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Burnett, Steve<br/>Author&#160;Burnett, Steve,&#160;Paine, Stephen,&#160;RSA Security<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 6691<br/>Publisher&#160;McGraw-Hill/Osborne,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780072254969<br/> RSA Securitys official guide to cryptography ent://SD_ILS/0/SD_ILS:437144 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Burnett, Steve<br/>Author&#160;Burnett, Steve,&#160;Paine, Stephen,&#160;RSA Security<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B87 2004<br/>Publisher&#160;McGraw-Hill/Osborne,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780072254952<br/> Introduction to cryptography with Java applets ent://SD_ILS/0/SD_ILS:419277 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Bishop, David, 1963-<br/>Author&#160;Bishop, David, 1963-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B57 2003<br/>Publisher&#160;Jones and Bartlett,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780763722074<br/> Introduction to cryptography : with coding theory ent://SD_ILS/0/SD_ILS:358964 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Trappe, Wade<br/>Author&#160;Trappe, Wade,&#160;Washington, Lawrence C.<br/>Format:&#160;Books<br/>Call Number&#160;QA268 T73 2002<br/>Publisher&#160;Pearson Education,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780130618146<br/> VHDL implementation of RC5 cryptography ent://SD_ILS/0/SD_ILS:359923 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Puvanesvaran Rangasamy<br/>Author&#160;Puvanesvaran Rangasamy<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P86 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Bachelor of Electrical Engineering (Computer)) - Universiti Teknologi Malaysia, 2002<br/> Coding theory and cryptography : the essentials ent://SD_ILS/0/SD_ILS:398310 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Hankerson, Darrel R.<br/>Author&#160;Hankerson, Darrel R.<br/>Format:&#160;Books<br/>Call Number&#160;QA268 C62 2000<br/>Edition&#160;2nd ed., rev. and expanded<br/>Publisher&#160;Marcel Dekker,<br/>Publication Date&#160;2000<br/>ISBN&#160;9780824704650<br/> Cryptography : an introduction to computer security ent://SD_ILS/0/SD_ILS:442385 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Seberry, Jennifer<br/>Author&#160;Seberry, Jennifer,&#160;Pieprzyk, Josef<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S37 1989<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780724802746&#160;9780131949867<br/> Machine cryptography and modern cryptanalysis ent://SD_ILS/0/SD_ILS:327081 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Deavours, Cipher A.<br/>Author&#160;Deavours, Cipher A.,&#160;Kruh, Louis<br/>Format:&#160;Books<br/>Call Number&#160;Z103.D42 1985<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;1985<br/>ISBN&#160;9780890061619<br/> Quantum cryptography and computing : theory and implementation ent://SD_ILS/0/SD_ILS:812825 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Horodecki, Ryszard<br/>Author&#160;Horodecki, Ryszard,&#160;Kilin, Sergei Ya,&#160;Mowalik, Janusz<br/>Format:&#160;Books<br/>Call Number&#160;QA76.889 Q366 2010<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781607505464<br/> Disappearing cryptography : information hiding : steganography and watermarking ent://SD_ILS/0/SD_ILS:335029 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Wayner, Peter<br/>Author&#160;Wayner, Peter<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W39 2009<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Morgan Kaufmann,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780123744791<br/> Understanding and applying cryptography and data security ent://SD_ILS/0/SD_ILS:337579 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Elbirt, Adam J.<br/>Author&#160;Elbirt, Adam J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E43 2009<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781420061604<br/> Topics in geometry, coding theory and cryptography ent://SD_ILS/0/SD_ILS:171381 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Garcia, Arnaldo<br/>Author&#160;Garcia, Arnaldo,&#160;Stichtenoth, H., (Henning), 1944-<br/>Format:&#160;Books<br/>Call Number&#160;QA268 T66 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781402053337&#160;9781402053344<br/><a href="http://dx.doi.org/10.1007/1-4020-5334-4">View Fulltext</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Wireless security and cryptography : specifications and implementations ent://SD_ILS/0/SD_ILS:288506 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Sklavos, Nicolas<br/>Author&#160;Sklavos, Nicolas,&#160;Zhang, Xinmiao<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 W64 2007<br/>Publisher&#160;CRC Pr.,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780849387715<br/> FPGA based adaptive cryptography engine for IPSec ent://SD_ILS/0/SD_ILS:107562 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Cheah, Thean Charn<br/>Author&#160;Cheah, Thean Charn,&#160;Nasir Shaikh Husin,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;TK7867 C44 2005 raf<br/>Publication Date&#160;2005<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Elektronik)) - Universiti Teknologi Malaysia, 2005<br/> Java cryptography extensions : practical guide for programmers ent://SD_ILS/0/SD_ILS:397443 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Weiss, Jason<br/>Author&#160;Weiss, Jason<br/>Format:&#160;Books<br/>Call Number&#160;QA76.73.J38 W444 2004<br/>Publisher&#160;Morgan Kaufmann,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780127427515<br/> Designs, codes and cryptography : an international journal ent://SD_ILS/0/SD_ILS:550005 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z Format:&#160;Continuing Resources<br/>Call Number&#160;Z102.5 .D47 05-06no1-3(1995)<br/>Publisher&#160;Kluwer Academic Pub.,<br/>Publication Date&#160;2020&#160;2019&#160;2018&#160;2017&#160;2016<br/>ISSN&#160;09251022<br/> Integration of verification in otp cryptography for highly critical embedded system ent://SD_ILS/0/SD_ILS:859380 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Muhammad Maharoff, 1980- , author<br/>Author&#160;Muhammad Maharoff, 1980- , author,&#160;Saiful Adli Ismail, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M846 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Kejuruteraan Sistem Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Protocols and procedures of cryptography and network security ent://SD_ILS/0/SD_ILS:835156 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Mason, Stephen<br/>Author&#160;Mason, Stephen<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P768 2015<br/>Publisher&#160;Clanrye International,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632404237<br/> Integration of verification in otp cryptography for highly critical embedded system ent://SD_ILS/0/SD_ILS:859625 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Muhammad Maharoff, 1980- , author<br/>Author&#160;Muhammad Maharoff, 1980- , author,&#160;Saiful Adli Ismail, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034740 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Kejuruteraan Sistem Komputer))-Universiti Teknologi Malaysia, 2015<br/> Cryptography for security and privacy in cloud computing ent://SD_ILS/0/SD_ILS:814026 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Rass, Stefan<br/>Author&#160;Rass, Stefan,&#160;Slamanig, Daniel, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R37 2014<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781608075751<br/> Improving the integrity service for classical message with the help of quantum cryptography ent://SD_ILS/0/SD_ILS:811469 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Abouzar Azarpira, 1985-<br/>Author&#160;Abouzar Azarpira, 1985-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031084 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Efficiency key generation management in a big organization for symmetric cryptography system ent://SD_ILS/0/SD_ILS:811262 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Atefeh Mirzaee, 1986-<br/>Author&#160;Atefeh Mirzaee, 1986-,&#160;Majid Bakhtiari, Dr.,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A844 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Efficiency key generation management in a big organization for symmetric cryptography system ent://SD_ILS/0/SD_ILS:811264 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Atefeh Mirzaee, 1986-<br/>Author&#160;Atefeh Mirzaee, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 030847 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Improving the integrity service for classical message with the help of quantum cryptography ent://SD_ILS/0/SD_ILS:811466 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Abouzar Azarpira, 1985-<br/>Author&#160;Abouzar Azarpira, 1985-,&#160;Subariah Ibrahim,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 A26 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Chaos synchronization and cryptography for secure communications : applications for encryption ent://SD_ILS/0/SD_ILS:630454 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Banerjee, Santo, 1976-<br/>Author&#160;Banerjee, Santo, 1976-<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 C43 2011 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781615207374&#160;9781615207381<br/> Cryptography technique in securing the e-passport authentication system ent://SD_ILS/0/SD_ILS:603544 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Tham, Yuew Chyi, 1986-<br/>Author&#160;Tham, Yuew Chyi, 1986-<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 026313 ra<br/>Publication Date&#160;2009<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2009<br/> Cryptography technique in securing the e-passport authentication system ent://SD_ILS/0/SD_ILS:369963 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Tham, Yuew Chyi, 1986-<br/>Author&#160;Tham, Yuew Chyi, 1986-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T43 2009 raf<br/>Publication Date&#160;2009<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2009<br/> Primality testing and integer factorization in public-key cryptography ent://SD_ILS/0/SD_ILS:344752 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Yan, Song Y.<br/>Author&#160;Yan, Song Y.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Y364 2009<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780387772677<br/> Implementation of RSA cryptography algorithm for encryption and decryption ent://SD_ILS/0/SD_ILS:127253 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Chua, Bao Shu<br/>Author&#160;Chua, Bao Shu<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C48 2006<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2006<br/> Cryptography in the database : the last line of defense ent://SD_ILS/0/SD_ILS:465219 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Kenan, Kevin<br/>Author&#160;Kenan, Kevin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 K45 2006<br/>Publisher&#160;Addison Wesley,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780321320735<br/> A classical introduction to cryptography : applications for communications security ent://SD_ILS/0/SD_ILS:94421 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Vaudenay, Serge<br/>Author&#160;Vaudenay, Serge<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V38 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387254647<br/> Cryptography, information theory, and error-correction : a handbook for the 21st century ent://SD_ILS/0/SD_ILS:424781 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Bruen, Aiden A., 1941-<br/>Author&#160;Bruen, Aiden A., 1941-,&#160;Forcinito, Mario, 1962-<br/>Format:&#160;Books<br/>Call Number&#160;QA 76.9.A25 B79 2005<br/>Publisher&#160;Wiley-Interscience,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780471653172<br/> Cryptography and public key infrastructure on the Internet ent://SD_ILS/0/SD_ILS:372272 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Schmeh, Klaus<br/>Author&#160;Schmeh, Klaus<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S33 2003<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780470847459<br/> Cryptography for Internet and database applications : developing secret and public key techniques with Java ent://SD_ILS/0/SD_ILS:370725 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Galbreath, Nick<br/>Author&#160;Galbreath, Nick<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G34 2002<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780471210290<br/> VHDL implementation of the SHA-1 hash function cryptography ent://SD_ILS/0/SD_ILS:320470 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Suresh Sinnappu<br/>Author&#160;Suresh Sinnappu<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S97 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2002<br/> Cryptography and e-commerce : a Wiley tech brief ent://SD_ILS/0/SD_ILS:371601 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Graff, Jon C.<br/>Author&#160;Graff, Jon C.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G72 2001<br/>Publisher&#160;John Wiley,<br/>Publication Date&#160;2001<br/>ISBN&#160;9780471405740<br/> Applied cryptography : protocols, algorithms, and source code in C ent://SD_ILS/0/SD_ILS:452822 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Schneier, Bruce, 1963-<br/>Author&#160;Schneier, Bruce, 1963-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S36 1996<br/>Edition&#160;2nd ed.<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;1996<br/>ISBN&#160;9780471117094<br/> Applications of cryptography for the security of database and distributed database systems ent://SD_ILS/0/SD_ILS:165515 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Hardjono, Thomas<br/>Author&#160;Hardjono, Thomas<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H38 1991<br/>Publisher&#160;Univ. of New South Wales,<br/>Publication Date&#160;1991<br/>Thesis (PhD) - University of New South Wales, Australian Defence Force Academy, 1991<br/> The application of cryptography for data base security ent://SD_ILS/0/SD_ILS:640651 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Gudes, Ehud<br/>Author&#160;Gudes, Ehud,&#160;Koch, Harvey S.,&#160;Stahl, Fred A.<br/>Format:&#160;Books<br/>Call Number&#160;MAK 16855<br/>Publication Date&#160;1976<br/> A METHOD TO ENCRYPT INFORMATION WITH DNA-BASED CRYPTOGRAPHY ent://SD_ILS/0/SD_ILS:836013 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Mohammad Reza Najaf Torkaman, 1984-, author<br/>Author&#160;Mohammad Reza Najaf Torkaman, 1984-, author,&#160;Bharanidharan Shanmugam, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 M64 2011 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> EXTREME LEARNING MACHINE BASED CRYPTOGRAPHY AND STEGANOGRAPHY SYSTEMS ent://SD_ILS/0/SD_ILS:871005 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Hayfaa Abdulzahra Atee, 1967-, author<br/>Author&#160;Hayfaa Abdulzahra Atee, 1967-, author,&#160;Robiah Ahmad, Dr., supervisor,&#160;Norliza Mohd. Noor, Dr., supervisor,&#160;Abdul Monem S. Rahma, Dr., supervisor,&#160;Sekolah Razak UTM Dalam Kejuruteraan dan Teknologi Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H395 2017 raf<br/>Thesis (Ph.D) - Universiti Teknologi Malaysia, 2017<br/> EXTREME LEARNING MACHINE BASED CRYPTOGRAPHY AND STEGANOGRAPHY SYSTEMS ent://SD_ILS/0/SD_ILS:872218 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Hayfaa Abdulzahra Atee, 1967-, author<br/>Author&#160;Hayfaa Abdulzahra Atee, 1967-, author,&#160;Robiah Ahmad, Dr., supervisor,&#160;Norliza Mohd. Noor, Dr., supervisor,&#160;Abdul Monem S. Rahma, Dr., supervisor,&#160;Sekolah Razak UTM Dalam Kejuruteraan dan Teknologi Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 064099 ra<br/>Thesis (Ph.D) - Universiti Teknologi Malaysia, 2017<br/> Concurrent zero knowledge ent://SD_ILS/0/SD_ILS:94672 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Rosen, Alon<br/>Author&#160;Rosen, Alon,&#160;Goldreich, Oded<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R674 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9783540329381<br/> CRYPTOLOGY : Classical and Modern ent://SD_ILS/0/SD_ILS:882329 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Klima, Richard E., author<br/>Author&#160;Klima, Richard E., author,&#160;Sigmon, Neil, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 K55 2019<br/>Edition&#160;Second Edition<br/>Publication Date&#160;2019<br/>ISBN&#160;9781138047624<br/> Enhancement of embedding capacity in GSM full rate encoded speech signal using pitch-dependent steganography ent://SD_ILS/0/SD_ILS:863507 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Abdulaleem Zaid Mohammed Al-Othman, 1981-, author<br/>Author&#160;Abdulaleem Zaid Mohammed Al-Othman, 1981-, author,&#160;Azizah Abd. Manaf, supervisor,&#160;Akram M. Zeki Khedher, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;XX(863507.2)<br/>Publication Date&#160;2016<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/> Bit inverting map method for improved steganography scheme ent://SD_ILS/0/SD_ILS:863626 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Ammar Mohammedali Fadhil, 1973-, author<br/>Author&#160;Ammar Mohammedali Fadhil, 1973-, author,&#160;Siti Mariyam Shamsuddin, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;XX(863626.2)<br/>Publication Date&#160;2016<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/> Bit inverting map method for improved steganography scheme ent://SD_ILS/0/SD_ILS:868548 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Ammar Mohammedali Fadhil, 1973-, author<br/>Author&#160;Ammar Mohammedali Fadhil, 1973-, author<br/>Format:&#160;Electronic Resources<br/>Call Number&#160;CP 064716 ra<br/>Publication Date&#160;2016<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/> Enhancement of embedding capacity in GSM full rate encoded speech signal using pitch-dependent steganography ent://SD_ILS/0/SD_ILS:868486 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Abdulaleem Zaid Mohammed Al-Othman, 1981-, author<br/>Author&#160;Abdulaleem Zaid Mohammed Al-Othman, 1981-, author<br/>Format:&#160;Electronic Resources<br/>Call Number&#160;CP 064626 ra<br/>Publication Date&#160;2016<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/> A new steganography technique using magic square matrix and affine chiper ent://SD_ILS/0/SD_ILS:850668 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Al-Hasan, Waleed S. Hasan, 1983-, author<br/>Author&#160;Al-Hasan, Waleed S. Hasan, 1983-, author,&#160;Muhammad Mun'im Ahmad Zabidi, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;Z104 A44 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2015<br/> Steganografi berkapasiti tinggi menggunakan penggantian bit terkurang bererti dan pengesanan pinggir hibrid ent://SD_ILS/0/SD_ILS:851482 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Harja Santana Purba, 1963- , author<br/>Author&#160;Harja Santana Purba, 1963- , author<br/>Format:&#160;Books<br/>Call Number&#160;CP 054777 ra<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Steganografi berkapasiti tinggi menggunakan penggantian bit terkurang bererti dan pengesanan pinggir hibrid ent://SD_ILS/0/SD_ILS:849346 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Harja Santana Purba, 1963- , author<br/>Author&#160;Harja Santana Purba, 1963- , author,&#160;Ghazali Sulong, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;XX(849346.1)<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/> A new steganography technique using magic square matrix and affine chiper ent://SD_ILS/0/SD_ILS:850670 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Al-Hasan, Waleed S. Hasan, 1983-, author<br/>Author&#160;Al-Hasan, Waleed S. Hasan, 1983-, author<br/>Format:&#160;Books<br/>Call Number&#160;CP 054419 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2015<br/> Integrated researh in steganography ent://SD_ILS/0/SD_ILS:837102 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Coon, Audrey, editor<br/>Author&#160;Coon, Audrey, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 I58 2015<br/>Publisher&#160;Clanrye Intl.,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632403131<br/> Enhancing the security of high payload image steganography using chaos ent://SD_ILS/0/SD_ILS:803748 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Rezza Moieni, 1979-<br/>Author&#160;Rezza Moieni, 1979-,&#160;Subariah Ibrahim,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 R49<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Enhancing the security of high payload image steganography using chaos ent://SD_ILS/0/SD_ILS:804148 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Rezza Moieni, 1979-<br/>Author&#160;Rezza Moieni, 1979-<br/>Format:&#160;Books<br/>Call Number&#160;CP 029976 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> A gray-scale image steganography techmique using fibonacci 12-bitplane decomposition and LSB approach ent://SD_ILS/0/SD_ILS:804288 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Sabah Fadhel Hamood, 1973-<br/>Author&#160;Sabah Fadhel Hamood, 1973-,&#160;Ghazali Sulong,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S234 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Least significant bit steganography technique using modulus operation with pixel selection derived from K-map and Gaussian elimination ent://SD_ILS/0/SD_ILS:806156 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Sayuthi Jaafar, 1962-<br/>Author&#160;Sayuthi Jaafar, 1962-<br/>Format:&#160;Books<br/>Call Number&#160;CP 030475 ra<br/>Publication Date&#160;2013<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Image steganography based on LSB approach coupled with Caesar Cipher and Huffman Coding ent://SD_ILS/0/SD_ILS:807723 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Low, Shu Lin, 1989-<br/>Author&#160;Low, Shu Lin, 1989-,&#160;Ghazali Sulong,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L69 2013 raf<br/>Publication Date&#160;2013<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafik dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/> Image steganography based on LSB approach coupled with Caesar cipher and Huffman coding ent://SD_ILS/0/SD_ILS:807726 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Low, Shu Lin, 1989-<br/>Author&#160;Low, Shu Lin, 1989-<br/>Format:&#160;Books<br/>Call Number&#160;CP 032402 ra<br/>Publication Date&#160;2013<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafik dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/> Color image steganography technique based onleast significant bits approach coupled with Huffman encoding compression ent://SD_ILS/0/SD_ILS:807887 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Eng, Chia Jing, 1989-<br/>Author&#160;Eng, Chia Jing, 1989-<br/>Format:&#160;Books<br/>Call Number&#160;CP 030805 ra<br/>Publication Date&#160;2013<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafik dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/> Steganography in GIF animated grayscale images ent://SD_ILS/0/SD_ILS:811669 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Massalin Yerlan, 1976-<br/>Author&#160;Massalin Yerlan, 1976-,&#160;Majid Bakhtiari, Dr.,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M379 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Steganography in GIF animated grayscale images ent://SD_ILS/0/SD_ILS:811670 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Massalin Yerlan, 1976-<br/>Author&#160;Massalin Yerlan, 1976-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031190 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Algebraic geometry modeling in information theory ent://SD_ILS/0/SD_ILS:801380 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Mart&iacute;nez-Moro, Edgar<br/>Author&#160;Mart&iacute;nez-Moro, Edgar<br/>Format:&#160;Books<br/>Call Number&#160;QA268 A44 2013<br/>Publisher&#160;World Scientific,<br/>Publication Date&#160;2013<br/>ISBN&#160;9789814335751<br/> Least significant bit steganography technique using modulus operation with pixel selection derived from K-map and Gaussian elimination ent://SD_ILS/0/SD_ILS:802817 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Sayuthi Jaafar, 1962- , author<br/>Author&#160;Sayuthi Jaafar, 1962- , author,&#160;Azizah Abd. Manaf, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S29 2013 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2013<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> A gray-scale image steganography techmique using fibonacci 12-bitplane decomposition and LSB approach ent://SD_ILS/0/SD_ILS:804489 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Sabah Fadhel Hamood, 1973-<br/>Author&#160;Sabah Fadhel Hamood, 1973-<br/>Format:&#160;Books<br/>Call Number&#160;CP 030220 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Color image steganography technique based onleast significant bits approach coupled with Huffman encoding compression ent://SD_ILS/0/SD_ILS:807885 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Eng, Chia Jing, 1989-<br/>Author&#160;Eng, Chia Jing, 1989-,&#160;Ghazali Sulong,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 E54 2013 raf<br/>Publication Date&#160;2013<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafik dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/> Enhanced winnow key reconciliation for bennett-brassard 84 quantum key distribution protocol ent://SD_ILS/0/SD_ILS:811860 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Riaz Ahmad Qamar, 1959- , author<br/>Author&#160;Riaz Ahmad Qamar, 1959- , author,&#160;Mohd. Aizaini Maarof, supervisor,&#160;Subariah Ibrahim, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 R53 2013 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2013<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Enhanced winnow key reconciliation for bennett-brassard 84 quantum key distribution protocol ent://SD_ILS/0/SD_ILS:811863 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Riaz Ahmad Qamar, 1959-<br/>Author&#160;Riaz Ahmad Qamar, 1959-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031127 ra<br/>Publication Date&#160;2013<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory ent://SD_ILS/0/SD_ILS:778667 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Nordiana Rahim, 1987-<br/>Author&#160;Nordiana Rahim, 1987-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N675 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory ent://SD_ILS/0/SD_ILS:778668 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Nordiana Rahim, 1987-<br/>Author&#160;Nordiana Rahim, 1987-<br/>Format:&#160;Books<br/>Call Number&#160;CP 027499 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Performance analysis of steganography algorithms based for JPEG Images ent://SD_ILS/0/SD_ILS:790156 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Areej Abdulmalik Rosmmani, 1985-<br/>Author&#160;Areej Abdulmalik Rosmmani, 1985-,&#160;Subariah Ibrahim,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A744 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) &ndash; Universiti Teknologi Malaysia, 2012<br/> Performance analysis of steganography algorithms based for JPEG Images ent://SD_ILS/0/SD_ILS:790157 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Areej Abdulmalik Rosmmani, 1985-<br/>Author&#160;Areej Abdulmalik Rosmmani, 1985-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028331 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) &ndash; Universiti Teknologi Malaysia, 2012<br/> Advanced linear cryptanalysis of block and stream ciphers ent://SD_ILS/0/SD_ILS:796013 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Junod, Pascal, 1976-<br/>Author&#160;Junod, Pascal, 1976-,&#160;Canteaut, Anne<br/>Format:&#160;Books<br/>Call Number&#160;Z103 A38 2011<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781607508434<br/> Hacking miracles : the true strories of inventors and cyberspace pioneer such as Alexander Bell, Thomas Edison, Steve Jobs, Bill Gates and others ent://SD_ILS/0/SD_ILS:816673 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Gubitosa, Carlo<br/>Author&#160;Gubitosa, Carlo<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.O63 G83 2011<br/>Publisher&#160;Jaico Publishing House,<br/>Publication Date&#160;2011<br/>ISBN&#160;9788184952018<br/> New stream cipher algorithm with nonlinear Boolean functions and parallel pseudo random number generator ent://SD_ILS/0/SD_ILS:772817 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Majid Bakhtiari, 1961-<br/>Author&#160;Majid Bakhtiari, 1961-,&#160;Mohd. Aizaini Maarof, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M355 2011 raf<br/>Publication Date&#160;2011<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/> New stream cipher algorithm with nonlinear Boolean functions and parallel pseudo random number generator ent://SD_ILS/0/SD_ILS:772821 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Majid Bakhtiari, 1961-<br/>Author&#160;Majid Bakhtiari, 1961-<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 025814 ra<br/>Publication Date&#160;2011<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/>Restricted until 5 June 2014<br/> Web application obfuscation : -/WAFs..Evasion..Filters//alert (/Obfuscation/)- ent://SD_ILS/0/SD_ILS:758794 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Heiderich, Mario<br/>Author&#160;Heiderich, Mario<br/>Format:&#160;Books<br/>Call Number&#160;QA76.625 H46 2011<br/>Publisher&#160;Elsevier/Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597496049<br/> Mycrypttools cryptographic algorithm learning aid ent://SD_ILS/0/SD_ILS:787675 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Nelmiawati, author<br/>Author&#160;Nelmiawati, author,&#160;Mazleena Salleh,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;Z103 N45 2011 raf<br/>Publication Date&#160;2011<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2011<br/> Mycrypttools cryptographic algorithm learning aid ent://SD_ILS/0/SD_ILS:787676 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Nelmiawati, author,<br/>Author&#160;Nelmiawati, author,<br/>Format:&#160;Electronic Resources<br/>Call Number&#160;CP 058333 ra<br/>Publication Date&#160;2011<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2011<br/> Hashing in computer science : fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:639636 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Konheim, Alan G., 1934-<br/>Author&#160;Konheim, Alan G., 1934-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.H36 K65 2010<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780470344736<br/> Steganography based on utilizing more surrounding pixels ent://SD_ILS/0/SD_ILS:603419 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Masoud Afrakhteh<br/>Author&#160;Masoud Afrakhteh,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 017368 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Interpretative key management framework (IKM) ent://SD_ILS/0/SD_ILS:396660 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Saman Shojae Chaeikar<br/>Author&#160;Saman Shojae Chaeikar,&#160;Shukor Abd. Razak, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 S26 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Steganography based on utilizing more surrounding pixels ent://SD_ILS/0/SD_ILS:390257 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Masoud Afrakhteh<br/>Author&#160;Masoud Afrakhteh,&#160;Subariah Ibrahim,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M378 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Expert SQL server 2008 encryption ent://SD_ILS/0/SD_ILS:640718 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Coles, Michael, 1972-<br/>Author&#160;Coles, Michael, 1972-,&#160;Landrum, Rodney<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C653 2009<br/>Publisher&#160;Apress,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781430224648&#160;9781430224655<br/> Comprehensive possible attacks on RSA ent://SD_ILS/0/SD_ILS:588292 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Majid Bakhtiari, 1961-<br/>Author&#160;Majid Bakhtiari, 1961-,&#160;Rabiah Ahmad, supervisor,&#160;Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 016838<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2008&#160;20<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/> Modern cryptanalysis : techniques for advanced code breaking ent://SD_ILS/0/SD_ILS:287325 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Swenson, Christopher<br/>Author&#160;Swenson, Christopher<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S932 2008<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470135938<br/> Quantum bits and quantum secrets : how quantum physics is revolutionizing codes and computers ent://SD_ILS/0/SD_ILS:330155 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Morsch, Oliver<br/>Author&#160;Morsch, Oliver<br/>Format:&#160;Books<br/>Call Number&#160;QA76.889 M67 2008<br/>Publisher&#160;Wiley-VCH,<br/>Publication Date&#160;2008<br/>ISBN&#160;9783527407101<br/> Comprehensive possible attacks on RSA ent://SD_ILS/0/SD_ILS:306904 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Majid Bakhtiari, 1961-<br/>Author&#160;Majid Bakhtiari, 1961-,&#160;Rabiah Ahmad, supervisor,&#160;Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M23 2008 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2008<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/> Applied cryptanalysis : breaking ciphers in the real world ent://SD_ILS/0/SD_ILS:155893 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Stamp, Mark<br/>Author&#160;Stamp, Mark,&#160;Low, Richard M., 1967-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S68 2007<br/>Publisher&#160;Wiley-IEEE Press,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780470114865<br/> Decrypted secrets : methods and maxims of cryptology ent://SD_ILS/0/SD_ILS:158035 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Bauer, Friedrich Ludwig, 1924-<br/>Author&#160;Bauer, Friedrich Ludwig, 1924-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B38 2007<br/>Edition&#160;4th, rev. and extended ed.<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540245025<br/><a href="http://dx.doi.org/10.1007/978-3-540-48121-8">FullText</a><br/> A customizable cryptographic service provider for an embedded cryptohardware system ent://SD_ILS/0/SD_ILS:142096 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Illiasaak Ahmad<br/>Author&#160;Illiasaak Ahmad<br/>Format:&#160;Books<br/>Call Number&#160;TK7895.E42 I44 2007<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2007<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2007<br/> A customizable cryptographic service provider for an embedded cryptohardware system ent://SD_ILS/0/SD_ILS:566821 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Illiasaak Ahmad<br/>Author&#160;Illiasaak Ahmad<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 013421<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2007<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2007<br/> Finite fields and applications ent://SD_ILS/0/SD_ILS:320540 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Mullen, Gary L.<br/>Author&#160;Mullen, Gary L.,&#160;Mummert, Carl, 1978-<br/>Format:&#160;Books<br/>Call Number&#160;QA247.3 M85 2007<br/>Publisher&#160;American Mathematical Society,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780821844182<br/> Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation ent://SD_ILS/0/SD_ILS:95222 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Mohd. Izuan Ismail<br/>Author&#160;Mohd. Izuan Ismail<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M59 2006<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=37293">Preview</a><br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2006<br/> Aplikasi penjana nombor sudo rawak ent://SD_ILS/0/SD_ILS:109688 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Lai, Min Tak<br/>Author&#160;Lai, Min Tak<br/>Format:&#160;Books<br/>Call Number&#160;QA268 L34 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006&#160;2005<br/>Project Paper (Sarjana Muda Kejuruteraan Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2006<br/> e-secure file transfer system (based on secure examination paper preparation case study ) ent://SD_ILS/0/SD_ILS:111961 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Yee, Thee Gee<br/>Author&#160;Yee, Thee Gee<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Y43 2006<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Komputer)) - Universiti Teknologi Malaysia, 2006<br/> Cryptographic algorithms on reconfigurable hardware ent://SD_ILS/0/SD_ILS:158018 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Rodriquez-Henriquez, Francisco<br/>Author&#160;Rodriquez-Henriquez, Francisco<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A3 C79 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387338835<br/> Encryption using Triple DES, new DES and DES-X algorithm ent://SD_ILS/0/SD_ILS:126603 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Thilakan Krishanansamy<br/>Author&#160;Thilakan Krishanansamy<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T74 2006<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Elektronik)) - Universiti Teknologi Malaysia, 2006<br/> Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation ent://SD_ILS/0/SD_ILS:559864 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Mohd. Izuan Abdullah<br/>Author&#160;Mohd. Izuan Abdullah<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 12381<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2006<br/> Cryptographic libraries for developers ent://SD_ILS/0/SD_ILS:620463 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Moyle, Ed, 1973-<br/>Author&#160;Moyle, Ed, 1973-,&#160;Kelley, Diana, 1965-<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 7014<br/>Edition&#160;1st ed.<br/>Publisher&#160;Charles River Media,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781584504092<br/> Cryptographic libraries for developers ent://SD_ILS/0/SD_ILS:454419 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Moyle, Ed, 1973-<br/>Author&#160;Moyle, Ed, 1973-,&#160;Kelley, Diana, 1965-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.D47 M79 2006<br/>Edition&#160;1st ed.<br/>Publisher&#160;Charles River Media,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781584504092<br/> Practical cryptology and Web security ent://SD_ILS/0/SD_ILS:470477 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Yuen, P.K.<br/>Author&#160;Yuen, P.K.<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 Y83 2006<br/>Publisher&#160;Pearson Education LTD,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780321263339<br/> Cryptanalysis in cryptographic algorithm design ent://SD_ILS/0/SD_ILS:461476 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Muhammad Reza Z'aba<br/>Author&#160;Muhammad Reza Z'aba,&#160;Badrisham Ahmad,&#160;Subariah Ibrahim,&#160;Mohd. Aizaini Maarof,&#160;National ICT Conference (2006 : Perlis)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C794<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/> Authentification codes and combinatorial designs ent://SD_ILS/0/SD_ILS:143222 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Pei, Dingyi<br/>Author&#160;Pei, Dingyi<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P446 2006<br/>Publisher&#160;Chapman &amp; Hall/CRC,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781584864738&#160;9781584884736<br/> Classical and contemporary cryptology ent://SD_ILS/0/SD_ILS:615018 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Spillman, Richard J.<br/>Author&#160;Spillman, Richard J.<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 6690<br/>Publisher&#160;Pearson Prentice Hall,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780131477360<br/> Classical and contemporary cryptology ent://SD_ILS/0/SD_ILS:443418 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Spillman, Richard J.<br/>Author&#160;Spillman, Richard J.<br/>Format:&#160;Books<br/>Call Number&#160;QA268 S64 2005<br/>Publisher&#160;Pearson Prentice Hall,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780131828315<br/> Analysis of image quality for steganographic software ent://SD_ILS/0/SD_ILS:454770 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Azizah Abd. Manaf, Prof. Dr.<br/>Author&#160;Azizah Abd. Manaf, Prof. Dr.,&#160;M. Z. Akram,&#160;K. Salehuddin,&#160;Sayuthi Jaafar,&#160;Brunei International Conference on Engineering and Technology (2005 : Brunei Darussalam)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A53 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/> Implementing key management system based on openPGP protocol(RFC 2440) ent://SD_ILS/0/SD_ILS:836511 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;M. Norazizi Sham Mohd Sayuti<br/>Author&#160;M. Norazizi Sham Mohd Sayuti,&#160;Haslina Md. Sarkan,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M567 2004 raf<br/>Publication Date&#160;2004<br/>Thesis (Sarjana Sains (Sains Komputer (Real Time Software Engineering)) - Universiti Teknologi Malaysia, 2004<br/> Impelmenting key management system based on openGP protocol (RFC 2440) ent://SD_ILS/0/SD_ILS:840774 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;M. Norazizi Sham Mohd Sayuti<br/>Author&#160;M. Norazizi Sham Mohd Sayuti,&#160;Haslina Md. Sarkan,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M563 2004 raf<br/>Publication Date&#160;2004<br/>Thesis (Sarjana Sains (Sains Komputer - Real Time Software Engineering) - Universiti Teknologi Malaysia, 2004<br/> Impelmenting key management system based on openGP protocol (RFC 2440) ent://SD_ILS/0/SD_ILS:840775 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;M. Norazizi Sham Mohd Sayuti<br/>Author&#160;M. Norazizi Sham Mohd Sayuti<br/>Format:&#160;Books<br/>Call Number&#160;CP 033986 ra<br/>Publication Date&#160;2004<br/>Thesis (Sarjana Sains (Sains Komputer - Real Time Software Engineering) - Universiti Teknologi Malaysia, 2004<br/> Information security intelligence : cryptographic principles and applications ent://SD_ILS/0/SD_ILS:607934 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Calabrese, Thomas<br/>Author&#160;Calabrese, Thomas<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 5816<br/>Publisher&#160;Thomson Delmar Learning,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781401837273<br/> Intelligent watermarking techniques ent://SD_ILS/0/SD_ILS:618688 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Pan, Jeng-Shyang<br/>Author&#160;Pan, Jeng-Shyang,&#160;Huang, Hsiang-Cheh,&#160;Jain, Lakhmi C.<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 6843<br/>Publisher&#160;World Scientific,<br/>Publication Date&#160;2004<br/>ISBN&#160;9789812389558<br/> Intelligent watermarking techniques ent://SD_ILS/0/SD_ILS:419291 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Pan, Jeng-Shyang<br/>Author&#160;Pan, Jeng-Shyang,&#160;Huang, Hsiang-Cheh,&#160;Jain, Lakhmi C.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I574 2004<br/>Publisher&#160;World Scientific,<br/>Publication Date&#160;2004<br/>ISBN&#160;9789812389558&#160;9789812387578<br/> Public key crypto hardware for real-time security application ent://SD_ILS/0/SD_ILS:400165 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Mohamed Khalil Mohd. Hani<br/>Author&#160;Mohamed Khalil Mohd. Hani,&#160;Hau, Yuan Wen, 1980-,&#160;Lim, Kie Woon,&#160;National Real-Time Technology and Applications Symposium (2nd : 2004 Serdang, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M54 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/> Information security intelligence : cryptographic principles and applications ent://SD_ILS/0/SD_ILS:420147 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Calabrese, Thomas<br/>Author&#160;Calabrese, Thomas<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C344 2004<br/>Publisher&#160;Thomson Delmar Learning,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781401837273<br/> Implementing key management system based on openPGP protocol(RFC 2440) ent://SD_ILS/0/SD_ILS:836513 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;M.Norazizi Sham Mohd Sayuti<br/>Author&#160;M.Norazizi Sham Mohd Sayuti<br/>Format:&#160;Books<br/>Call Number&#160;CP 034176 ra<br/>Publication Date&#160;2004<br/>Thesis (Sarjana Sains (Sains Komputer (Real Time Software Engineering)) - Universiti Teknologi Malaysia, 2004<br/> Video encryption in real time using secret key crytography ent://SD_ILS/0/SD_ILS:8274 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Pushpan, Anthony Devadason<br/>Author&#160;Pushpan, Anthony Devadason<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12887<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Sains komputer) - Universiti Teknologi Malaysia, 2003<br/> Cryptanalysis of number theoretic ciphers ent://SD_ILS/0/SD_ILS:374663 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Wagstaff Jr., Samuel S.<br/>Author&#160;Wagstaff Jr., Samuel S.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W33 2003<br/>Publisher&#160;Chapman &amp; Hall,<br/>Publication Date&#160;2003<br/>ISBN&#160;9781584881537<br/> Twofish-based file encryption ent://SD_ILS/0/SD_ILS:379114 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Muhammad Hatta Kassim<br/>Author&#160;Muhammad Hatta Kassim<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M52 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2003<br/> Advance encryption standard (AES-Rijndeal) software ent://SD_ILS/0/SD_ILS:602175 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Yuzaile Md. Yusof<br/>Author&#160;Yuzaile Md. Yusof<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 6499<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Kejuruteraan Elektrik (Komputer)) - Universiti Teknologi Malaysia, 2003<br/> Hardware Implementation of RC6 algorithm using VHDL ent://SD_ILS/0/SD_ILS:603297 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Muniswaran Krishnan<br/>Author&#160;Muniswaran Krishnan<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 6604<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik Elektronik)) - Universiti Teknologi Malaysia, 2003<br/> Twofish-based file encryption ent://SD_ILS/0/SD_ILS:601993 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Muhammad Hatta Kassim<br/>Author&#160;Muhammad Hatta Kassim<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 6561<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2003<br/> System-on-chip architectures and implementations for private-key data encryption ent://SD_ILS/0/SD_ILS:409391 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;McLoone, Maire<br/>Author&#160;McLoone, Maire,&#160;McCanny, J. V.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M564 2003<br/>Publisher&#160;Kluwer Academic/Plenum Publishers,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780306478826<br/> Hardware implementation of RC6 algorithm using VHDL ent://SD_ILS/0/SD_ILS:388881 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Muniswaran Krishnan<br/>Author&#160;Muniswaran Krishnan<br/>Format:&#160;Books<br/>Call Number&#160;Z103 M86 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik Elektronik)) - Universiti Teknologi Malaysia, 2003<br/> Securing voice over IP using digital signature and encryption ent://SD_ILS/0/SD_ILS:344379 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Stalin Thangaiah Vijaya Kamaraj<br/>Author&#160;Stalin Thangaiah Vijaya Kamaraj<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S72 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Sains komputer) - Universiti Teknologi Malaysia, 2003<br/> Video encryption in real time using secret key crytography ent://SD_ILS/0/SD_ILS:340838 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Anthony Devadason Pushpan<br/>Author&#160;Anthony Devadason Pushpan<br/>Format:&#160;Books<br/>Call Number&#160;TK6680.5 A57 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Sains komputer) - Universiti Teknologi Malaysia, 2003<br/> Graphical password for symmetric encryption ent://SD_ILS/0/SD_ILS:344899 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Sagathevan Sundrarajoo<br/>Author&#160;Sagathevan Sundrarajoo<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S24 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/> Information hiding using steganography ent://SD_ILS/0/SD_ILS:358844 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Muhalim Mohamed Amin<br/>Author&#160;Muhalim Mohamed Amin,&#160;Mazleena Salleh,&#160;Subariah Ibrahim,&#160;M. R. Katmin,&#160;National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M83 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Secure E-voting with blind signature ent://SD_ILS/0/SD_ILS:327456 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Subariah Ibrahim<br/>Author&#160;Subariah Ibrahim,&#160;Maznah Kamat, 1960-,&#160;Mazleena Salleh,&#160;Shah Rizan Abdul Aziz,&#160;National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S424 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Web defacement detection and recovery system ent://SD_ILS/0/SD_ILS:338088 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Balasubramaniam Manikam<br/>Author&#160;Balasubramaniam Manikam<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B345 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Bachelor of Computer Science) - Universiti Teknologi Malaysia, 2003<br/> Web defacement detection and recovery system ent://SD_ILS/0/SD_ILS:7912 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Balasubramaniam Manikam<br/>Author&#160;Balasubramaniam Manikam<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12879<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Sains (Komputer)) - Universiti Teknologi Malaysia, 2003<br/> Virtual optical laboratory (transmission of signal through an optical fiber) ent://SD_ILS/0/SD_ILS:13509 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Ahmad Syihan Shoib<br/>Author&#160;Ahmad Syihan Shoib<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12321 ra<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Bachelor of Electrical Engineering (Telecommunication)) - Universiti Teknologi Malaysia, 2002<br/> Investigation on the performance of protective equipment under application of switching impulse and high voltage alternating current ent://SD_ILS/0/SD_ILS:21344 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Chitaram Shathasivam<br/>Author&#160;Chitaram Shathasivam<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12335<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2002<br/> Dissolved gas analysis (DGA) as a part of transformer condition monitoring (TCM) using artificial neural network (ANN)-AI ent://SD_ILS/0/SD_ILS:21400 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Muhamad Saiful Muhamad Ghous<br/>Author&#160;Muhamad Saiful Muhamad Ghous<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12317<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2002<br/> Coding theory and cryptology ent://SD_ILS/0/SD_ILS:363827 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Niederreiter, Harald<br/>Author&#160;Niederreiter, Harald<br/>Format:&#160;Books<br/>Call Number&#160;QA268 C66 2002<br/>Publisher&#160;World Scientific,<br/>Publication Date&#160;2002<br/>ISBN&#160;9789812381323<br/> Database encrytion schemes : a comparative study ent://SD_ILS/0/SD_ILS:351511 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.,&#160;Norbik Bashah Idris,&#160;Harihodin Selamat,&#160;Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z34 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Java implemention of encrypter and decrypter using rijndael algorithm ent://SD_ILS/0/SD_ILS:359702 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Nur Elidianna Abu Zar<br/>Author&#160;Nur Elidianna Abu Zar<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N87 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Bachelor of Electrical Engineering (Computer)) - Universiti Teknologi Malaysia, 2002<br/> Auditors' introduction to crytography and its application in database security ent://SD_ILS/0/SD_ILS:345848 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.,&#160;Norbik Bashah Idris,&#160;Harihodin Selamat,&#160;International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 Z34 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Cryptographic applications in database security : a survey study ent://SD_ILS/0/SD_ILS:326720 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.,&#160;Piper, Fred,&#160;Norbik Bashah Idris,&#160;Ciechanowicz, Zbigniew 'Chez',&#160;International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z344 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Virtual encryption driver using blowfish algorithm ent://SD_ILS/0/SD_ILS:321033 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Tay, Kwai Ping<br/>Author&#160;Tay, Kwai Ping<br/>Format:&#160;Books<br/>Call Number&#160;Z103 T39 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Bachelor of Electrical Engineering (Computer)) - Universiti Teknologi Malaysia, 2002<br/> Speed supervisory control via parallel port ent://SD_ILS/0/SD_ILS:7172 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Chan, Noel Zen Kim<br/>Author&#160;Chan, Noel Zen Kim<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12812<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2002<br/> A generalized group signature scheme ent://SD_ILS/0/SD_ILS:301239 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Eddie Shahril Ismail<br/>Author&#160;Eddie Shahril Ismail,&#160;Yahya Abu Hasan, 1953-,&#160;How, Guan Aun<br/>Format:&#160;Books<br/>Call Number&#160;QA268 E33 2001<br/>Publisher&#160;Universiti Sains Malaysia,<br/>Publication Date&#160;2001<br/> The multiple RSA cryptosystem ent://SD_ILS/0/SD_ILS:301269 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;How, Guan Aun<br/>Author&#160;How, Guan Aun,&#160;Yahya Abu Bakar,&#160;Eddie Shahril Ismail<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H68 2001<br/>Publisher&#160;Universiti Sains Malaysia,<br/>Publication Date&#160;2001<br/> Military vehicle sound signature analysis ent://SD_ILS/0/SD_ILS:21089 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Firuz Giry Naidu Ramanujaloo Naidu<br/>Author&#160;Firuz Giry Naidu Ramanujaloo Naidu<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12124<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Project Paper (Bachelor of Computer Engineering) - Universiti Teknologi Malaysia /ATMA, 2000<br/> Decrypted secrets : methods and maxims of cryptology ent://SD_ILS/0/SD_ILS:157291 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Bauer, Friedrich Ludwig<br/>Author&#160;Bauer, Friedrich Ludwig<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B38 2000<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2000<br/>ISBN&#160;9783540668718<br/> A traceable proactive anonymous electronic cash ent://SD_ILS/0/SD_ILS:139538 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Chang, Yu Cheng<br/>Author&#160;Chang, Yu Cheng,&#160;Kamaruzzaman Seman,&#160;Jasmy Yunus,&#160;National Conference on Telecommunication Technology 2000 (2000 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 C42 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/> Integrating security services into computer supported cooperative work ent://SD_ILS/0/SD_ILS:121726 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Mohd. Aizaini Maarof<br/>Author&#160;Mohd. Aizaini Maarof<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M34 2000 raf<br/>Publisher&#160;Aston University,<br/>Publication Date&#160;2000<br/>Thesis (Doctor of Philosophy) - Aston University, 2000<br/> Security control and analysis system ent://SD_ILS/0/SD_ILS:481610 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Norbik Bashah Idris<br/>Author&#160;Norbik Bashah Idris,&#160;Subariah Ibrahim,&#160;Mazleena Salleh,&#160;Nik Khairul Raja Abdullah<br/>Format:&#160;Books<br/>Call Number&#160;MAK 12825 a<br/>Publication Date&#160;2000<br/> A new authentication protocol for distributed environment ent://SD_ILS/0/SD_ILS:330732 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Abdukadir Moalim Ali<br/>Author&#160;Abdukadir Moalim Ali<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.55 A22 2000 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Thesis (Master of Science (Computer Science)) - Universiti Teknologi Malaysia, 2000<br/> Cryptographic protocol for payment transaction ent://SD_ILS/0/SD_ILS:136182 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Chang, Yu Cheng<br/>Author&#160;Chang, Yu Cheng,&#160;Kamaruzzaman Seman,&#160;Jasmy Yunus,&#160;TENCON '2000 (2000 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C42 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/> A new authentication protocol for distributed environment ent://SD_ILS/0/SD_ILS:21564 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Abdukadir Moalim Ali<br/>Author&#160;Abdukadir Moalim Ali<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12302<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Thesis (Master of Science (Computer Science)) - Universiti Teknologi Malaysia, 2000<br/> Flexural behaviour and durability of glass fibre reinforced ent://SD_ILS/0/SD_ILS:13642 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Abdul Rahman Mohd. Sam<br/>Author&#160;Abdul Rahman Mohd. Sam<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 10498<br/>Publisher&#160;University of Sheffield,<br/>Publication Date&#160;1999<br/>Thesis (PhD) - University of Sheffield, 1999<br/> Public-key crytography ent://SD_ILS/0/SD_ILS:157309 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Salomaa, Arto<br/>Author&#160;Salomaa, Arto<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S26 1996<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;1996<br/>ISBN&#160;9783540613565<br/> Building in big brother : the crytographic policy debate ent://SD_ILS/0/SD_ILS:157400 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Hoffman, Lance J.<br/>Author&#160;Hoffman, Lance J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B85 1995<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;1995<br/>ISBN&#160;9780387944418<br/> Analysis of modified improved geffe random sequence generator ent://SD_ILS/0/SD_ILS:404971 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Ahmad Zuri Sha'ameri<br/>Author&#160;Ahmad Zuri Sha'ameri,&#160;Tuan Sabri Tuan Mat,&#160;Kamaruzzaman Seman,&#160;International Conference on Communication (2nd : 1995 : Langkawi)<br/>Format:&#160;Books<br/>Call Number&#160;MAK 11944 a<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1995<br/> Cryptology ent://SD_ILS/0/SD_ILS:410559 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Beutelspacher, Albrecht<br/>Author&#160;Beutelspacher, Albrecht,&#160;Fisher, J. Chris<br/>Format:&#160;Books<br/>Call Number&#160;Z103 B48 1994<br/>Publisher&#160;Mathematical Association of America,<br/>Publication Date&#160;1994<br/>ISBN&#160;9780883855041<br/> Contemporary cryptology : the science of information integrity ent://SD_ILS/0/SD_ILS:410085 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Simmons, Gustavus J.<br/>Author&#160;Simmons, Gustavus J.,&#160;Institute of Electrical and Electronics Engineers<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C64 1992<br/>Publisher&#160;IEEE Press,<br/>Publication Date&#160;1992<br/>ISBN&#160;9780879422776<br/> Modern cryptology : a tutorial ent://SD_ILS/0/SD_ILS:182755 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Brassard, Gilles<br/>Author&#160;Brassard, Gilles<br/>Format:&#160;Books<br/>Call Number&#160;Z103.B72 1988<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;1988<br/>ISBN&#160;9780387968421<br/> Cipher systems : the protection of communications ent://SD_ILS/0/SD_ILS:157552 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Beker, Henry<br/>Author&#160;Beker, Henry,&#160;Piper, Fred<br/>Format:&#160;Books<br/>Call Number&#160;Z104.B44 1982<br/>Publisher&#160;Northwood Bks,<br/>Publication Date&#160;1982<br/>ISBN&#160;9780442306076<br/> Tutorial : the security of data in networks ent://SD_ILS/0/SD_ILS:254409 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Davies, D. W.<br/>Author&#160;Davies, D. W.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5 D36 1981 f<br/>Publisher&#160;IEEE Computer Society,<br/>Publication Date&#160;1981<br/> Mathematical recreations and essays ent://SD_ILS/0/SD_ILS:295849 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Ball, W. W. Rouse (Walter William Rouse), 1850-1925<br/>Author&#160;Ball, W. W. Rouse (Walter William Rouse), 1850-1925,&#160;Coxeter, H. S. M. (Harold Scott Macdonald), 1907-<br/>Format:&#160;Books<br/>Call Number&#160;QA95.B3 1974<br/>Edition&#160;12th ed.<br/>Publisher&#160;University of Toronto Press,<br/>Publication Date&#160;1974<br/>ISBN&#160;9780802018441<br/> Mathematical recreations &amp; essays ent://SD_ILS/0/SD_ILS:295753 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Ball, W. W. Rouse (Walter William Rouse), 1850-1925<br/>Author&#160;Ball, W. W. Rouse (Walter William Rouse), 1850-1925,&#160;Coxeter, H. S. M. (Harold Scott Macdonald), 1907-<br/>Format:&#160;Books<br/>Call Number&#160;QA95 B3 1947<br/>Edition&#160;American ed.<br/>Publisher&#160;Macmillan Co.,<br/>Publication Date&#160;1947<br/> Mathematical recreations and essays ent://SD_ILS/0/SD_ILS:296625 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Ball, W. W. Rouse (Walter William Rouse), 1850-1925<br/>Author&#160;Ball, W. W. Rouse (Walter William Rouse), 1850-1925<br/>Format:&#160;Books<br/>Call Number&#160;QA95.B3 1939<br/>Edition&#160;11th ed.<br/>Publisher&#160;Macmillan,<br/>Publication Date&#160;1939<br/> DBCRYPT USER AND KEY MANAGEMENT ent://SD_ILS/0/SD_ILS:839603 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Omar Muse Omar, 1980-, author<br/>Author&#160;Omar Muse Omar, 1980-, author,&#160;Mohd. Nazri Kama, Dr., supervisor,&#160;Muhammad Sufyan Basri, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 O43 2007 raf<br/>Thesis&#160;Sarjana Sains (Sains Komputer - Kejuruteraan Perisian Masa Nyata)<br/> IMPLEMENTATION OF PKCS11 and PKCS12 CRYPTOGRAPHIC FUNCTIONS IN .Net FOR SCAN ASSOCIATES ent://SD_ILS/0/SD_ILS:840553 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Pirooz Kiani Kori, 1975-, author<br/>Author&#160;Pirooz Kiani Kori, 1975-, author,&#160;Suhaimi Ibrahim, Assoc. Prof. Dr., supervisor,&#160;Hardiyana Abd. Rahman, supervisor,&#160;Sekolah Informatik Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P57 2010 raf<br/>Thesis&#160;Sarjana Kejuruteraan Komputer<br/> IMPLEMENTATION OF PKCS11 and PKCS12 CRYPTOGRAPHIC FUNCTIONS IN.Net FOR SCAN ASSOCIATES ent://SD_ILS/0/SD_ILS:840554 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Pirooz Kiani Kori, 1975-, author<br/>Author&#160;Pirooz Kiani Kori, 1975-, author,&#160;Suhaimi Ibrahim, Assoc. Prof. Dr., supervisor,&#160;Hardiyana Abd. Rahman, supervisor,&#160;Sekolah Informatik Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034005 ra<br/>Thesis&#160;Sarjana Kejuruteraan Komputer<br/> ENHANCEMENT SECURITY AGAINST SNIFFING ATTACK IN AD HOC NETWORK ent://SD_ILS/0/SD_ILS:840716 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Sanam Ghorbani Lyastani, 1984-, author<br/>Author&#160;Sanam Ghorbani Lyastani, 1984-, author,&#160;Teddy Mantoro, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 S26 2013 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> ENHANCEMENT SECURITY AGAINST SNIFFING ATTACK IN AD HOC NETWORK ent://SD_ILS/0/SD_ILS:840717 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Sanam Ghorbani Lyastani, 1984-, author<br/>Author&#160;Sanam Ghorbani Lyastani, 1984-, author,&#160;Teddy Mantoro, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034040 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> DBCRYPT : (MANUAL AND TRANSPARENT ENCRYPTION/DECRYPTION) ent://SD_ILS/0/SD_ILS:841749 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Mustafa Ahmed Abdullah Aqel, 1979-, author<br/>Author&#160;Mustafa Ahmed Abdullah Aqel, 1979-, author,&#160;Mohd. Nazri Kama, 1963-, supervisor,&#160;Muhammad Sufyan Basri, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M878 2007 raf<br/>Thesis&#160;Sarjana Sains (Sains Komputer - Kejuruteraan Perisian Masa Nyata)<br/> Information leakage of boolean fuctions and its relationship to other cryptographic criteria ent://SD_ILS/0/SD_ILS:411795 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Zhang, M.<br/>Author&#160;Zhang, M.,&#160;Tavares, S. E.,&#160;Campbell, L. L.<br/>Format:&#160;Books<br/>Call Number&#160;MAK 5975<br/> Cryptographic relational algebra ent://SD_ILS/0/SD_ILS:417641 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Davida, George I.<br/>Author&#160;Davida, George I.,&#160;Yeh, I.<br/>Format:&#160;Books<br/>Call Number&#160;MAK 5978<br/> Stream ciphers for high speed data transmission ent://SD_ILS/0/SD_ILS:404253 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Tuan Sabri Tuan Mat<br/>Author&#160;Tuan Sabri Tuan Mat,&#160;Ahmad Zuri Sha'ameri,&#160;Malaysian Science and Technology Congress (1994 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;MAK 12011 a<br/> HYBRID DATA HIDING TECHNIQUE BASED ON SIDE MATCH VECTOR QUANTIZATION AND GENETIC ALGORITHM (SMVQ-GA) FOR MILITARY SECRET COMMUNICATION ent://SD_ILS/0/SD_ILS:871288 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Norshatela Anuar, 1985-, author<br/>Author&#160;Norshatela Anuar, 1985-, author,&#160;Nilam Nur Amir Sjarif, Dr., 1986-, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N671 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/> A new hash function based approach to generate real random values for key management ent://SD_ILS/0/SD_ILS:835999 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Saman Hedayatpour, 1985-, author<br/>Author&#160;Saman Hedayatpour, 1985-, author,&#160;Suriayati Chuprat, Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.5 S263 2012 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> A new hash function based approach to generate real random values for key management ent://SD_ILS/0/SD_ILS:836008 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Saman Hedayatpour, 1985-, author<br/>Author&#160;Saman Hedayatpour, 1985-, author,&#160;Suriayati Chuprat, Dr.,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034116 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> THE DEVELOPMENT OF A KEY GENERATION APPLICATION FOR WIRELESS SECURE MODEM FOR SAPURA TECHNOLOGIES SDN BHD ent://SD_ILS/0/SD_ILS:838972 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Mardiana Sulaiman, author<br/>Author&#160;Mardiana Sulaiman, author,&#160;Azri Azmi, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M373 2004 raf<br/>Thesis&#160;Sarjana Sains (Sains Komputer - Kejuruteraan Perisian Masa Nyata)<br/> THE DEVELOPMENT OF A KEY GENERATION APPLICATION FOR WIRELESS SECURE MODEM FOR SAPURA TECHNOLOGIES SDN BHD ent://SD_ILS/0/SD_ILS:838973 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Mardiana Sulaiman, author<br/>Author&#160;Mardiana Sulaiman, author,&#160;Azri Azmi, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034588 ra<br/>Thesis&#160;Sarjana Sains (Sains Komputer - Kejuruteraan Perisian Masa Nyata)<br/> DBCRYPT USER AND KEY MANAGEMENT ent://SD_ILS/0/SD_ILS:839604 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Omar Muse Omar, 1980-, author<br/>Author&#160;Omar Muse Omar, 1980-, author,&#160;Mohd. Nazri Kama, Dr., supervisor,&#160;Muhammad Sufyan Basri, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034564 ra<br/>Thesis&#160;Sarjana Sains (Sains Komputer - Kejuruteraan Perisian Masa Nyata)<br/> HYBRID DATA HIDING TECHNIQUE BASED ON SIDE MATCH VECTOR QUANTIZATION AND GENETIC ALGORITHM (SMVQ-GA) FOR MILITARY SECRET COMMUNICATION ent://SD_ILS/0/SD_ILS:872121 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Norshatela Anuar, 1985-, author<br/>Author&#160;Norshatela Anuar, 1985-, author,&#160;Nilam Nur Amir Sjarif, Dr., 1986-, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 064085 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/> Hacking the Hacker: Learn From the Experts Who Take Down Hackers ent://SD_ILS/0/SD_ILS:872613 2024-06-19T09:58:30Z 2024-06-19T09:58:30Z by&#160;Grimes, Roger A.<br/>Author&#160;Grimes, Roger A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G75 2017<br/>ISBN&#160;9781119396215<br/>