Search Results for Cryptography - Narrowed by: Cryptography - EnglishSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dCryptography$0026qf$003dSUBJECT$002509Subject$002509Cryptography$002509Cryptography$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list2024-06-19T09:58:30ZContemporary cryptographyent://SD_ILS/0/SD_ILS:7993722024-06-19T09:58:30Z2024-06-19T09:58:30Zby Oppliger, Rolf<br/>Author Oppliger, Rolf<br/>Format: Books<br/>Call Number Z103 O66 2011<br/>Edition 2nd ed.<br/>Publisher Artech House,<br/>Publication Date 2011<br/>ISBN 9781608071456<br/>Contemporary cryptographyent://SD_ILS/0/SD_ILS:4542992024-06-19T09:58:30Z2024-06-19T09:58:30Zby Oppliger, Rolf<br/>Author Oppliger, Rolf<br/>Format: Books<br/>Call Number Z103 O66 2005<br/>Publisher Artech House,<br/>Publication Date 2005<br/>ISBN 9781580536424<br/>Practical cryptographyent://SD_ILS/0/SD_ILS:3715262024-06-19T09:58:30Z2024-06-19T09:58:30Zby Ferguson, Niels<br/>Author Ferguson, Niels, Schneier, Bruce, 1963-<br/>Format: Books<br/>Call Number QA76.9.A25 F474 2003<br/>Publisher Wiley ,<br/>Publication Date 2003<br/>ISBN 9780471228943 9780471223573<br/>Cryptography decryptedent://SD_ILS/0/SD_ILS:3942002024-06-19T09:58:30Z2024-06-19T09:58:30Zby Mel, H. X., 1948-<br/>Author Mel, H. X., 1948-, Baker, Doris M., 1953-<br/>Format: Books<br/>Call Number QA76.9.A25 M44 2001<br/>Publisher Addison-Wesley,<br/>Publication Date 2001<br/>ISBN 9780201616477<br/>Broadband quantum cryptographyent://SD_ILS/0/SD_ILS:7647602024-06-19T09:58:30Z2024-06-19T09:58:30Zby Rogers, Daniel J.<br/>Author Rogers, Daniel J.<br/>Format: Books<br/>Call Number QA76.9.A25 R64 2010<br/>Publisher Morgan & Claypool Publishers,<br/>Publication Date 2010<br/>ISBN 9781608450596<br/>Cryptography research perspectivesent://SD_ILS/0/SD_ILS:6425412024-06-19T09:58:30Z2024-06-19T09:58:30Zby Chen, Roland E.<br/>Author Chen, Roland E.<br/>Format: Books<br/>Call Number QA76.9.A25 C833 2009<br/>Publisher Nova Science Publishers,<br/>Publication Date 2009<br/>ISBN 9781604564921<br/>Cryptography for developersent://SD_ILS/0/SD_ILS:1709672024-06-19T09:58:30Z2024-06-19T09:58:30Zby St. Denis, Tom<br/>Author St. Denis, Tom, Johnson, Simon<br/>Format: Books<br/>Call Number QA76.9.A25 S725 2007<br/>Publisher Syngrees Publishing,<br/>Publication Date 2007<br/>ISBN 9781597491044<br/>Introduction to cryptographyent://SD_ILS/0/SD_ILS:1527072024-06-19T09:58:30Z2024-06-19T09:58:30Zby Buchmann, Johannes A.<br/>Author Buchmann, Johannes A.<br/>Format: Books<br/>Call Number QA268 B82 2004<br/>Edition 2nd ed.<br/>Publisher Springer,<br/>Publication Date 2004<br/>ISBN 9780387207568<br/>Cryptography: an introductionent://SD_ILS/0/SD_ILS:3455092024-06-19T09:58:30Z2024-06-19T09:58:30Zby Smart, Nigel<br/>Author Smart, Nigel<br/>Format: Books<br/>Call Number QA76.9.A25 S62 2003<br/>Publisher McGraw-Hill Education ,<br/>Publication Date 2003<br/>ISBN 9780077099879<br/>Cryptography : an introductionent://SD_ILS/0/SD_ILS:7560352024-06-19T09:58:30Z2024-06-19T09:58:30Zby Yaschenko V. V.<br/>Author Yaschenko V. V.<br/>Format: Books<br/>Call Number QA76.9 .A25 V85 2002<br/>Series Title Student mathematical library, 1520-9121 ; v. 18<br/>Publisher American Mathematical Society,<br/>Publication Date 2002<br/>ISBN 9780821829868<br/>Combine Cryptography Algorithmsent://SD_ILS/0/SD_ILS:8438142024-06-19T09:58:30Z2024-06-19T09:58:30Zby Ahmad Sahban Rafsanjani, author<br/>Author Ahmad Sahban Rafsanjani, author, Jackman, James, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034525 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>Combine Cryptography Algorithmsent://SD_ILS/0/SD_ILS:8438132024-06-19T09:58:30Z2024-06-19T09:58:30Zby Ahmad Sahban Rafsanjani, author<br/>Author Ahmad Sahban Rafsanjani, author, Jackman, James, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5102.94 A36 2014 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>Introduction to modern cryptographyent://SD_ILS/0/SD_ILS:2844422024-06-19T09:58:30Z2024-06-19T09:58:30Zby Katz, Jonathan, 1974-<br/>Author Katz, Jonathan, 1974-, Lindell, Yehuda<br/>Format: Books<br/>Call Number QA76.9.A25 K37 2008<br/>Publisher Chapman & Hall,<br/>Publication Date 2008<br/>ISBN 9781584885511<br/>Introduction to modern cryptographyent://SD_ILS/0/SD_ILS:8358552024-06-19T09:58:30Z2024-06-19T09:58:30Zby Katz, Jonathan, 1974- author<br/>Author Katz, Jonathan, 1974- author, Lindell, Yehuda, author<br/>Format: Books<br/>Call Number QA76.9.A25 K38 2015<br/>Edition Second edition<br/>Publisher CRC Press/Taylor & Francis,<br/>Publication Date 2015<br/>ISBN 9781466570269<br/>Cryptography : Infosec pro guideent://SD_ILS/0/SD_ILS:8073712024-06-19T09:58:30Z2024-06-19T09:58:30Zby Oriyano, Sean-Philip<br/>Author Oriyano, Sean-Philip<br/>Format: Books<br/>Call Number TK5102.94 O75 2013<br/>Publisher McGraw-Hill Education,<br/>Publication Date 2013<br/>ISBN 9780071794251<br/>Cryptography and information securityent://SD_ILS/0/SD_ILS:3165372024-06-19T09:58:30Z2024-06-19T09:58:30Zby Pachghare, V. K.<br/>Author Pachghare, V. K.<br/>Format: Books<br/>Call Number QA76.9.A25 P32 2009<br/>Publisher Prentice Hall of India,<br/>Publication Date 2009<br/>ISBN 9788120335219<br/>Computer security and cryptographyent://SD_ILS/0/SD_ILS:1953342024-06-19T09:58:30Z2024-06-19T09:58:30Zby Konheim, Alan G., 1934-<br/>Author Konheim, Alan G., 1934-<br/>Format: Books<br/>Call Number QA76.9.A25 K664 2007<br/>Publisher Wiley-Interscience,<br/>Publication Date 2007<br/>ISBN 9780471947837<br/>Cryptography and its applicationent://SD_ILS/0/SD_ILS:102992024-06-19T09:58:30Z2024-06-19T09:58:30Zby Chong, Sook Leng<br/>Author Chong, Sook Leng<br/>Format: Visual Materials<br/>Call Number MFL 13793<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Sains (Mathematik)) - Universiti Teknologi Malaysia, 2006<br/>Cryptography and its applicationent://SD_ILS/0/SD_ILS:6189992024-06-19T09:58:30Z2024-06-19T09:58:30Zby Chong, Sook Leng<br/>Author Chong, Sook Leng<br/>Format: Computer file<br/>Call Number CP 4596<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Sains (Matematik)) - Universiti Teknologi Malaysia, 2006<br/>Cryptography and its applicationent://SD_ILS/0/SD_ILS:4777142024-06-19T09:58:30Z2024-06-19T09:58:30Zby Chong, Sook Leng<br/>Author Chong, Sook Leng<br/>Format: Books<br/>Call Number Z103 C46 2006 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Sains (Mathematik)) - Universiti Teknologi Malaysia, 2006<br/>Cryptography : theory and practiceent://SD_ILS/0/SD_ILS:1432272024-06-19T09:58:30Z2024-06-19T09:58:30Zby Stinson, Douglas R. (Douglas Robert), 1956-<br/>Author Stinson, Douglas R. (Douglas Robert), 1956-<br/>Format: Books<br/>Call Number QA268 S74 2006<br/>Edition 3rd ed.<br/>Publisher Chapman & Hall/CRC,<br/>Publication Date 2006<br/>ISBN 9781584885085<br/>Quantum communications and cryptographyent://SD_ILS/0/SD_ILS:4908772024-06-19T09:58:30Z2024-06-19T09:58:30Zby Sergienko, Alexander V.<br/>Author Sergienko, Alexander V.<br/>Format: Books<br/>Call Number TK5102.94 Q36 2005<br/>Publisher CRC Press,<br/>Publication Date 2006<br/>ISBN 9780849336843<br/>Beginning cryptography with Javaent://SD_ILS/0/SD_ILS:5372352024-06-19T09:58:30Z2024-06-19T09:58:30Zby Hook, David, 1962-<br/>Author Hook, David, 1962-<br/>Format: Books<br/>Call Number QA76.9.A25 H66 2005<br/>Publisher Wiley Pub.,<br/>Publication Date 2005<br/>ISBN 9780764596339<br/>Malicious cryptography : exposing cryptovirologyent://SD_ILS/0/SD_ILS:3955292024-06-19T09:58:30Z2024-06-19T09:58:30Zby Young, Adam, 1972-<br/>Author Young, Adam, 1972-, Yung, Moti<br/>Format: Books<br/>Call Number QA 76.9 .A25 Y68 2004<br/>Publisher Wiley Pub.,<br/>Publication Date 2004<br/>ISBN 9780764549755<br/>Cryptography and secure communicationsent://SD_ILS/0/SD_ILS:2990722024-06-19T09:58:30Z2024-06-19T09:58:30Zby Man, Young Rhee<br/>Author Man, Young Rhee<br/>Format: Books<br/>Call Number QA76.9.A25 R43 1994<br/>Publisher McGraw-Hill,<br/>Publication Date 1994<br/>ISBN 9780071125024<br/>Cryptolib: cryptography in softwareent://SD_ILS/0/SD_ILS:4157092024-06-19T09:58:30Z2024-06-19T09:58:30Zby Lacy, John B.<br/>Author Lacy, John B.<br/>Format: Books<br/>Call Number MAK 5972<br/>Cryptography and data securityent://SD_ILS/0/SD_ILS:2960312024-06-19T09:58:30Z2024-06-19T09:58:30Zby Denning, Dorothy Elizabeth Robling<br/>Author Denning, Dorothy Elizabeth Robling<br/>Format: Books<br/>Call Number QA76.9.A25 D46 1982<br/>Publisher Addison-Wesley,<br/>Publication Date 1983 1982<br/>ISBN 9780201101508<br/>Introduction to cryptography : principles and applicationsent://SD_ILS/0/SD_ILS:1642192024-06-19T09:58:30Z2024-06-19T09:58:30Zby Delfs, Hans<br/>Author Delfs, Hans, Knebl, Helmut<br/>Format: Books<br/>Call Number QA76.9.A25 D44 2007<br/>Edition 2nd ed.<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540492436<br/><a href="http://dx.doi.org/10.1007/3-540-49244-5">Fulltext</a><br/>Applications of cryptography and network securityent://SD_ILS/0/SD_ILS:8369342024-06-19T09:58:30Z2024-06-19T09:58:30Zby Mason, Stephen<br/>Author Mason, Stephen<br/>Format: Books<br/>Call Number TK5102.94 A675 2015<br/>Publisher Clanrye Intl.,<br/>Publication Date 2015<br/>ISBN 9781632400659<br/>An introduction to number theory with cryptographyent://SD_ILS/0/SD_ILS:8345462024-06-19T09:58:30Z2024-06-19T09:58:30Zby Kraft, James S.<br/>Author Kraft, James S., Washington, Lawrence C.<br/>Format: Books<br/>Call Number QA241 K73 2014<br/>Publisher CRC Press, Taylor & Francis Group,<br/>Publication Date 2014<br/>ISBN 9781482214413<br/>Cryptography in C and C++ent://SD_ILS/0/SD_ILS:8292472024-06-19T09:58:30Z2024-06-19T09:58:30Zby Welschenbach, Michael, author<br/>Author Welschenbach, Michael, author<br/>Format: Books<br/>Call Number QA76.9.A25 W45 2013<br/>Edition 2nd ed.<br/>Publisher Apress,<br/>Publication Date 2013<br/>ISBN 9781430250982<br/>New directions of modern cryptographyent://SD_ILS/0/SD_ILS:8372922024-06-19T09:58:30Z2024-06-19T09:58:30Zby Cao, Zhenfu, author<br/>Author Cao, Zhenfu, author<br/>Format: Books<br/>Call Number TK5102.94 C36 2013<br/>Publisher CRC Press, Taylor & Francis Group,<br/>Publication Date 2013<br/>ISBN 9781466501386<br/>Introduction to cryptography and network securityent://SD_ILS/0/SD_ILS:1558772024-06-19T09:58:30Z2024-06-19T09:58:30Zby Forouzan, Behrouz A.<br/>Author Forouzan, Behrouz A.<br/>Format: Books<br/>Call Number TK5105.59 F67 2008<br/>Publisher McGraw-Hill Higher Education,<br/>Publication Date 2007<br/>ISBN 9780073327532<br/>Quantum cryptography and secret-key distillationent://SD_ILS/0/SD_ILS:1349382024-06-19T09:58:30Z2024-06-19T09:58:30Zby Van Assche, Gilles<br/>Author Van Assche, Gilles<br/>Format: Books<br/>Call Number QA76.9.A25 V36 2006<br/>Publisher Cambridge University Press,<br/>Publication Date 2006<br/>ISBN 9780521864855<br/>Complexity and cryptography : an introductionent://SD_ILS/0/SD_ILS:3909762024-06-19T09:58:30Z2024-06-19T09:58:30Zby Talbot, John<br/>Author Talbot, John, Welsh, D. J. A<br/>Format: Books<br/>Call Number Z103 T35 2006<br/>Publisher Cambridge University Press,<br/>Publication Date 2006<br/>ISBN 9780521852319<br/>Introduction to cryptography : with coding theoryent://SD_ILS/0/SD_ILS:3261122024-06-19T09:58:30Z2024-06-19T09:58:30Zby Trappe, Wade<br/>Author Trappe, Wade, Washington, Lawrence C.<br/>Format: Books<br/>Call Number QA268 T73 2006<br/>Edition 2nd ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2006<br/>ISBN 9780131981997 9780131862395<br/>Modern cryptography : theory and practiceent://SD_ILS/0/SD_ILS:1563142024-06-19T09:58:30Z2024-06-19T09:58:30Zby Mao, Wenbo<br/>Author Mao, Wenbo<br/>Format: Books<br/>Call Number QA76.9.A25 M36 2004<br/>Publisher Prentice Hall,<br/>Publication Date 2004<br/>ISBN 9780130669438<br/>RSA Securitys official guide to cryptographyent://SD_ILS/0/SD_ILS:6150192024-06-19T09:58:30Z2024-06-19T09:58:30Zby Burnett, Steve<br/>Author Burnett, Steve, Paine, Stephen, RSA Security<br/>Format: Computer file<br/>Call Number CP 6691<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2004<br/>ISBN 9780072254969<br/>RSA Securitys official guide to cryptographyent://SD_ILS/0/SD_ILS:4371442024-06-19T09:58:30Z2024-06-19T09:58:30Zby Burnett, Steve<br/>Author Burnett, Steve, Paine, Stephen, RSA Security<br/>Format: Books<br/>Call Number TK5105.59 B87 2004<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2004<br/>ISBN 9780072254952<br/>Introduction to cryptography with Java appletsent://SD_ILS/0/SD_ILS:4192772024-06-19T09:58:30Z2024-06-19T09:58:30Zby Bishop, David, 1963-<br/>Author Bishop, David, 1963-<br/>Format: Books<br/>Call Number QA76.9.A25 B57 2003<br/>Publisher Jones and Bartlett,<br/>Publication Date 2003<br/>ISBN 9780763722074<br/>Introduction to cryptography : with coding theoryent://SD_ILS/0/SD_ILS:3589642024-06-19T09:58:30Z2024-06-19T09:58:30Zby Trappe, Wade<br/>Author Trappe, Wade, Washington, Lawrence C.<br/>Format: Books<br/>Call Number QA268 T73 2002<br/>Publisher Pearson Education,<br/>Publication Date 2002<br/>ISBN 9780130618146<br/>VHDL implementation of RC5 cryptographyent://SD_ILS/0/SD_ILS:3599232024-06-19T09:58:30Z2024-06-19T09:58:30Zby Puvanesvaran Rangasamy<br/>Author Puvanesvaran Rangasamy<br/>Format: Books<br/>Call Number QA76.9.A25 P86 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Bachelor of Electrical Engineering (Computer)) - Universiti Teknologi Malaysia, 2002<br/>Coding theory and cryptography : the essentialsent://SD_ILS/0/SD_ILS:3983102024-06-19T09:58:30Z2024-06-19T09:58:30Zby Hankerson, Darrel R.<br/>Author Hankerson, Darrel R.<br/>Format: Books<br/>Call Number QA268 C62 2000<br/>Edition 2nd ed., rev. and expanded<br/>Publisher Marcel Dekker,<br/>Publication Date 2000<br/>ISBN 9780824704650<br/>Cryptography : an introduction to computer securityent://SD_ILS/0/SD_ILS:4423852024-06-19T09:58:30Z2024-06-19T09:58:30Zby Seberry, Jennifer<br/>Author Seberry, Jennifer, Pieprzyk, Josef<br/>Format: Books<br/>Call Number QA76.9.A25 S37 1989<br/>Publisher Prentice Hall,<br/>Publication Date 1989<br/>ISBN 9780724802746 9780131949867<br/>Machine cryptography and modern cryptanalysisent://SD_ILS/0/SD_ILS:3270812024-06-19T09:58:30Z2024-06-19T09:58:30Zby Deavours, Cipher A.<br/>Author Deavours, Cipher A., Kruh, Louis<br/>Format: Books<br/>Call Number Z103.D42 1985<br/>Publisher Artech House,<br/>Publication Date 1985<br/>ISBN 9780890061619<br/>Quantum cryptography and computing : theory and implementationent://SD_ILS/0/SD_ILS:8128252024-06-19T09:58:30Z2024-06-19T09:58:30Zby Horodecki, Ryszard<br/>Author Horodecki, Ryszard, Kilin, Sergei Ya, Mowalik, Janusz<br/>Format: Books<br/>Call Number QA76.889 Q366 2010<br/>Publisher IOS Press,<br/>Publication Date 2010<br/>ISBN 9781607505464<br/>Disappearing cryptography : information hiding : steganography and watermarkingent://SD_ILS/0/SD_ILS:3350292024-06-19T09:58:30Z2024-06-19T09:58:30Zby Wayner, Peter<br/>Author Wayner, Peter<br/>Format: Books<br/>Call Number TK5105.59 W39 2009<br/>Edition 3rd ed.<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2009<br/>ISBN 9780123744791<br/>Understanding and applying cryptography and data securityent://SD_ILS/0/SD_ILS:3375792024-06-19T09:58:30Z2024-06-19T09:58:30Zby Elbirt, Adam J.<br/>Author Elbirt, Adam J.<br/>Format: Books<br/>Call Number QA76.9.A25 E43 2009<br/>Publisher Auerbach Publications,<br/>Publication Date 2009<br/>ISBN 9781420061604<br/>Topics in geometry, coding theory and cryptographyent://SD_ILS/0/SD_ILS:1713812024-06-19T09:58:30Z2024-06-19T09:58:30Zby Garcia, Arnaldo<br/>Author Garcia, Arnaldo, Stichtenoth, H., (Henning), 1944-<br/>Format: Books<br/>Call Number QA268 T66 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9781402053337 9781402053344<br/><a href="http://dx.doi.org/10.1007/1-4020-5334-4">View Fulltext</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Wireless security and cryptography : specifications and implementationsent://SD_ILS/0/SD_ILS:2885062024-06-19T09:58:30Z2024-06-19T09:58:30Zby Sklavos, Nicolas<br/>Author Sklavos, Nicolas, Zhang, Xinmiao<br/>Format: Books<br/>Call Number TK5103.2 W64 2007<br/>Publisher CRC Pr.,<br/>Publication Date 2007<br/>ISBN 9780849387715<br/>FPGA based adaptive cryptography engine for IPSecent://SD_ILS/0/SD_ILS:1075622024-06-19T09:58:30Z2024-06-19T09:58:30Zby Cheah, Thean Charn<br/>Author Cheah, Thean Charn, Nasir Shaikh Husin, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TK7867 C44 2005 raf<br/>Publication Date 2005<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Elektronik)) - Universiti Teknologi Malaysia, 2005<br/>Java cryptography extensions : practical guide for programmersent://SD_ILS/0/SD_ILS:3974432024-06-19T09:58:30Z2024-06-19T09:58:30Zby Weiss, Jason<br/>Author Weiss, Jason<br/>Format: Books<br/>Call Number QA76.73.J38 W444 2004<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2004<br/>ISBN 9780127427515<br/>Designs, codes and cryptography : an international journalent://SD_ILS/0/SD_ILS:5500052024-06-19T09:58:30Z2024-06-19T09:58:30ZFormat: Continuing Resources<br/>Call Number Z102.5 .D47 05-06no1-3(1995)<br/>Publisher Kluwer Academic Pub.,<br/>Publication Date 2020 2019 2018 2017 2016<br/>ISSN 09251022<br/>Integration of verification in otp cryptography for highly critical embedded systement://SD_ILS/0/SD_ILS:8593802024-06-19T09:58:30Z2024-06-19T09:58:30Zby Muhammad Maharoff, 1980- , author<br/>Author Muhammad Maharoff, 1980- , author, Saiful Adli Ismail, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 M846 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Kejuruteraan Sistem Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Protocols and procedures of cryptography and network securityent://SD_ILS/0/SD_ILS:8351562024-06-19T09:58:30Z2024-06-19T09:58:30Zby Mason, Stephen<br/>Author Mason, Stephen<br/>Format: Books<br/>Call Number TK5105.59 P768 2015<br/>Publisher Clanrye International,<br/>Publication Date 2015<br/>ISBN 9781632404237<br/>Integration of verification in otp cryptography for highly critical embedded systement://SD_ILS/0/SD_ILS:8596252024-06-19T09:58:30Z2024-06-19T09:58:30Zby Muhammad Maharoff, 1980- , author<br/>Author Muhammad Maharoff, 1980- , author, Saiful Adli Ismail, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034740 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Kejuruteraan Sistem Komputer))-Universiti Teknologi Malaysia, 2015<br/>Cryptography for security and privacy in cloud computingent://SD_ILS/0/SD_ILS:8140262024-06-19T09:58:30Z2024-06-19T09:58:30Zby Rass, Stefan<br/>Author Rass, Stefan, Slamanig, Daniel, author<br/>Format: Books<br/>Call Number QA76.9.A25 R37 2014<br/>Publisher Artech House,<br/>Publication Date 2014<br/>ISBN 9781608075751<br/>Improving the integrity service for classical message with the help of quantum cryptographyent://SD_ILS/0/SD_ILS:8114692024-06-19T09:58:30Z2024-06-19T09:58:30Zby Abouzar Azarpira, 1985-<br/>Author Abouzar Azarpira, 1985-<br/>Format: Books<br/>Call Number CP 031084 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Efficiency key generation management in a big organization for symmetric cryptography systement://SD_ILS/0/SD_ILS:8112622024-06-19T09:58:30Z2024-06-19T09:58:30Zby Atefeh Mirzaee, 1986-<br/>Author Atefeh Mirzaee, 1986-, Majid Bakhtiari, Dr., Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 A844 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Efficiency key generation management in a big organization for symmetric cryptography systement://SD_ILS/0/SD_ILS:8112642024-06-19T09:58:30Z2024-06-19T09:58:30Zby Atefeh Mirzaee, 1986-<br/>Author Atefeh Mirzaee, 1986-<br/>Format: Books<br/>Call Number CP 030847 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Improving the integrity service for classical message with the help of quantum cryptographyent://SD_ILS/0/SD_ILS:8114662024-06-19T09:58:30Z2024-06-19T09:58:30Zby Abouzar Azarpira, 1985-<br/>Author Abouzar Azarpira, 1985-, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5102.94 A26 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Chaos synchronization and cryptography for secure communications : applications for encryptionent://SD_ILS/0/SD_ILS:6304542024-06-19T09:58:30Z2024-06-19T09:58:30Zby Banerjee, Santo, 1976-<br/>Author Banerjee, Santo, 1976-<br/>Format: Books<br/>Call Number TK5102.94 C43 2011 f<br/>Publisher Information Science Reference,<br/>Publication Date 2011<br/>ISBN 9781615207374 9781615207381<br/>Cryptography technique in securing the e-passport authentication systement://SD_ILS/0/SD_ILS:6035442024-06-19T09:58:30Z2024-06-19T09:58:30Zby Tham, Yuew Chyi, 1986-<br/>Author Tham, Yuew Chyi, 1986-<br/>Format: Computer file<br/>Call Number CP 026313 ra<br/>Publication Date 2009<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2009<br/>Cryptography technique in securing the e-passport authentication systement://SD_ILS/0/SD_ILS:3699632024-06-19T09:58:30Z2024-06-19T09:58:30Zby Tham, Yuew Chyi, 1986-<br/>Author Tham, Yuew Chyi, 1986-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 T43 2009 raf<br/>Publication Date 2009<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2009<br/>Primality testing and integer factorization in public-key cryptographyent://SD_ILS/0/SD_ILS:3447522024-06-19T09:58:30Z2024-06-19T09:58:30Zby Yan, Song Y.<br/>Author Yan, Song Y.<br/>Format: Books<br/>Call Number QA76.9.A25 Y364 2009<br/>Edition 2nd ed.<br/>Publisher Springer,<br/>Publication Date 2009<br/>ISBN 9780387772677<br/>Implementation of RSA cryptography algorithm for encryption and decryptionent://SD_ILS/0/SD_ILS:1272532024-06-19T09:58:30Z2024-06-19T09:58:30Zby Chua, Bao Shu<br/>Author Chua, Bao Shu<br/>Format: Books<br/>Call Number QA76.9.A25 C48 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2006<br/>Cryptography in the database : the last line of defenseent://SD_ILS/0/SD_ILS:4652192024-06-19T09:58:30Z2024-06-19T09:58:30Zby Kenan, Kevin<br/>Author Kenan, Kevin<br/>Format: Books<br/>Call Number QA76.9.D314 K45 2006<br/>Publisher Addison Wesley,<br/>Publication Date 2006<br/>ISBN 9780321320735<br/>A classical introduction to cryptography : applications for communications securityent://SD_ILS/0/SD_ILS:944212024-06-19T09:58:30Z2024-06-19T09:58:30Zby Vaudenay, Serge<br/>Author Vaudenay, Serge<br/>Format: Books<br/>Call Number QA76.9.A25 V38 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387254647<br/>Cryptography, information theory, and error-correction : a handbook for the 21st centuryent://SD_ILS/0/SD_ILS:4247812024-06-19T09:58:30Z2024-06-19T09:58:30Zby Bruen, Aiden A., 1941-<br/>Author Bruen, Aiden A., 1941-, Forcinito, Mario, 1962-<br/>Format: Books<br/>Call Number QA 76.9.A25 B79 2005<br/>Publisher Wiley-Interscience,<br/>Publication Date 2005<br/>ISBN 9780471653172<br/>Cryptography and public key infrastructure on the Internetent://SD_ILS/0/SD_ILS:3722722024-06-19T09:58:30Z2024-06-19T09:58:30Zby Schmeh, Klaus<br/>Author Schmeh, Klaus<br/>Format: Books<br/>Call Number QA76.9.A25 S33 2003<br/>Publisher Wiley,<br/>Publication Date 2003<br/>ISBN 9780470847459<br/>Cryptography for Internet and database applications : developing secret and public key techniques with Javaent://SD_ILS/0/SD_ILS:3707252024-06-19T09:58:30Z2024-06-19T09:58:30Zby Galbreath, Nick<br/>Author Galbreath, Nick<br/>Format: Books<br/>Call Number QA76.9.A25 G34 2002<br/>Publisher Wiley Publishing,<br/>Publication Date 2002<br/>ISBN 9780471210290<br/>VHDL implementation of the SHA-1 hash function cryptographyent://SD_ILS/0/SD_ILS:3204702024-06-19T09:58:30Z2024-06-19T09:58:30Zby Suresh Sinnappu<br/>Author Suresh Sinnappu<br/>Format: Books<br/>Call Number QA76.9.A25 S97 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2002<br/>Cryptography and e-commerce : a Wiley tech briefent://SD_ILS/0/SD_ILS:3716012024-06-19T09:58:30Z2024-06-19T09:58:30Zby Graff, Jon C.<br/>Author Graff, Jon C.<br/>Format: Books<br/>Call Number QA76.9.A25 G72 2001<br/>Publisher John Wiley,<br/>Publication Date 2001<br/>ISBN 9780471405740<br/>Applied cryptography : protocols, algorithms, and source code in Cent://SD_ILS/0/SD_ILS:4528222024-06-19T09:58:30Z2024-06-19T09:58:30Zby Schneier, Bruce, 1963-<br/>Author Schneier, Bruce, 1963-<br/>Format: Books<br/>Call Number QA76.9.A25 S36 1996<br/>Edition 2nd ed.<br/>Publisher John Wiley & Sons,<br/>Publication Date 1996<br/>ISBN 9780471117094<br/>Applications of cryptography for the security of database and distributed database systemsent://SD_ILS/0/SD_ILS:1655152024-06-19T09:58:30Z2024-06-19T09:58:30Zby Hardjono, Thomas<br/>Author Hardjono, Thomas<br/>Format: Books<br/>Call Number QA76.9.A25 H38 1991<br/>Publisher Univ. of New South Wales,<br/>Publication Date 1991<br/>Thesis (PhD) - University of New South Wales, Australian Defence Force Academy, 1991<br/>The application of cryptography for data base securityent://SD_ILS/0/SD_ILS:6406512024-06-19T09:58:30Z2024-06-19T09:58:30Zby Gudes, Ehud<br/>Author Gudes, Ehud, Koch, Harvey S., Stahl, Fred A.<br/>Format: Books<br/>Call Number MAK 16855<br/>Publication Date 1976<br/>A METHOD TO ENCRYPT INFORMATION WITH DNA-BASED CRYPTOGRAPHYent://SD_ILS/0/SD_ILS:8360132024-06-19T09:58:30Z2024-06-19T09:58:30Zby Mohammad Reza Najaf Torkaman, 1984-, author<br/>Author Mohammad Reza Najaf Torkaman, 1984-, author, Bharanidharan Shanmugam, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5102.94 M64 2011 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>EXTREME LEARNING MACHINE BASED CRYPTOGRAPHY AND STEGANOGRAPHY SYSTEMSent://SD_ILS/0/SD_ILS:8710052024-06-19T09:58:30Z2024-06-19T09:58:30Zby Hayfaa Abdulzahra Atee, 1967-, author<br/>Author Hayfaa Abdulzahra Atee, 1967-, author, Robiah Ahmad, Dr., supervisor, Norliza Mohd. Noor, Dr., supervisor, Abdul Monem S. Rahma, Dr., supervisor, Sekolah Razak UTM Dalam Kejuruteraan dan Teknologi Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 H395 2017 raf<br/>Thesis (Ph.D) - Universiti Teknologi Malaysia, 2017<br/>EXTREME LEARNING MACHINE BASED CRYPTOGRAPHY AND STEGANOGRAPHY SYSTEMSent://SD_ILS/0/SD_ILS:8722182024-06-19T09:58:30Z2024-06-19T09:58:30Zby Hayfaa Abdulzahra Atee, 1967-, author<br/>Author Hayfaa Abdulzahra Atee, 1967-, author, Robiah Ahmad, Dr., supervisor, Norliza Mohd. Noor, Dr., supervisor, Abdul Monem S. Rahma, Dr., supervisor, Sekolah Razak UTM Dalam Kejuruteraan dan Teknologi Termaju<br/>Format: Books<br/>Call Number CP 064099 ra<br/>Thesis (Ph.D) - Universiti Teknologi Malaysia, 2017<br/>Concurrent zero knowledgeent://SD_ILS/0/SD_ILS:946722024-06-19T09:58:30Z2024-06-19T09:58:30Zby Rosen, Alon<br/>Author Rosen, Alon, Goldreich, Oded<br/>Format: Books<br/>Call Number QA76.9.A25 R674 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9783540329381<br/>CRYPTOLOGY : Classical and Modernent://SD_ILS/0/SD_ILS:8823292024-06-19T09:58:30Z2024-06-19T09:58:30Zby Klima, Richard E., author<br/>Author Klima, Richard E., author, Sigmon, Neil, author<br/>Format: Books<br/>Call Number TK5102.94 K55 2019<br/>Edition Second Edition<br/>Publication Date 2019<br/>ISBN 9781138047624<br/>Enhancement of embedding capacity in GSM full rate encoded speech signal using pitch-dependent steganographyent://SD_ILS/0/SD_ILS:8635072024-06-19T09:58:30Z2024-06-19T09:58:30Zby Abdulaleem Zaid Mohammed Al-Othman, 1981-, author<br/>Author Abdulaleem Zaid Mohammed Al-Othman, 1981-, author, Azizah Abd. Manaf, supervisor, Akram M. Zeki Khedher, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number XX(863507.2)<br/>Publication Date 2016<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/>Bit inverting map method for improved steganography schemeent://SD_ILS/0/SD_ILS:8636262024-06-19T09:58:30Z2024-06-19T09:58:30Zby Ammar Mohammedali Fadhil, 1973-, author<br/>Author Ammar Mohammedali Fadhil, 1973-, author, Siti Mariyam Shamsuddin, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number XX(863626.2)<br/>Publication Date 2016<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/>Bit inverting map method for improved steganography schemeent://SD_ILS/0/SD_ILS:8685482024-06-19T09:58:30Z2024-06-19T09:58:30Zby Ammar Mohammedali Fadhil, 1973-, author<br/>Author Ammar Mohammedali Fadhil, 1973-, author<br/>Format: Electronic Resources<br/>Call Number CP 064716 ra<br/>Publication Date 2016<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/>Enhancement of embedding capacity in GSM full rate encoded speech signal using pitch-dependent steganographyent://SD_ILS/0/SD_ILS:8684862024-06-19T09:58:30Z2024-06-19T09:58:30Zby Abdulaleem Zaid Mohammed Al-Othman, 1981-, author<br/>Author Abdulaleem Zaid Mohammed Al-Othman, 1981-, author<br/>Format: Electronic Resources<br/>Call Number CP 064626 ra<br/>Publication Date 2016<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/>A new steganography technique using magic square matrix and affine chiperent://SD_ILS/0/SD_ILS:8506682024-06-19T09:58:30Z2024-06-19T09:58:30Zby Al-Hasan, Waleed S. Hasan, 1983-, author<br/>Author Al-Hasan, Waleed S. Hasan, 1983-, author, Muhammad Mun'im Ahmad Zabidi, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number Z104 A44 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2015<br/>Steganografi berkapasiti tinggi menggunakan penggantian bit terkurang bererti dan pengesanan pinggir hibrident://SD_ILS/0/SD_ILS:8514822024-06-19T09:58:30Z2024-06-19T09:58:30Zby Harja Santana Purba, 1963- , author<br/>Author Harja Santana Purba, 1963- , author<br/>Format: Books<br/>Call Number CP 054777 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Steganografi berkapasiti tinggi menggunakan penggantian bit terkurang bererti dan pengesanan pinggir hibrident://SD_ILS/0/SD_ILS:8493462024-06-19T09:58:30Z2024-06-19T09:58:30Zby Harja Santana Purba, 1963- , author<br/>Author Harja Santana Purba, 1963- , author, Ghazali Sulong, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number XX(849346.1)<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/>A new steganography technique using magic square matrix and affine chiperent://SD_ILS/0/SD_ILS:8506702024-06-19T09:58:30Z2024-06-19T09:58:30Zby Al-Hasan, Waleed S. Hasan, 1983-, author<br/>Author Al-Hasan, Waleed S. Hasan, 1983-, author<br/>Format: Books<br/>Call Number CP 054419 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2015<br/>Integrated researh in steganographyent://SD_ILS/0/SD_ILS:8371022024-06-19T09:58:30Z2024-06-19T09:58:30Zby Coon, Audrey, editor<br/>Author Coon, Audrey, editor<br/>Format: Books<br/>Call Number TK5102.94 I58 2015<br/>Publisher Clanrye Intl.,<br/>Publication Date 2015<br/>ISBN 9781632403131<br/>Enhancing the security of high payload image steganography using chaosent://SD_ILS/0/SD_ILS:8037482024-06-19T09:58:30Z2024-06-19T09:58:30Zby Rezza Moieni, 1979-<br/>Author Rezza Moieni, 1979-, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5102.94 R49<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Enhancing the security of high payload image steganography using chaosent://SD_ILS/0/SD_ILS:8041482024-06-19T09:58:30Z2024-06-19T09:58:30Zby Rezza Moieni, 1979-<br/>Author Rezza Moieni, 1979-<br/>Format: Books<br/>Call Number CP 029976 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>A gray-scale image steganography techmique using fibonacci 12-bitplane decomposition and LSB approachent://SD_ILS/0/SD_ILS:8042882024-06-19T09:58:30Z2024-06-19T09:58:30Zby Sabah Fadhel Hamood, 1973-<br/>Author Sabah Fadhel Hamood, 1973-, Ghazali Sulong, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 S234 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Least significant bit steganography technique using modulus operation with pixel selection derived from K-map and Gaussian eliminationent://SD_ILS/0/SD_ILS:8061562024-06-19T09:58:30Z2024-06-19T09:58:30Zby Sayuthi Jaafar, 1962-<br/>Author Sayuthi Jaafar, 1962-<br/>Format: Books<br/>Call Number CP 030475 ra<br/>Publication Date 2013<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Image steganography based on LSB approach coupled with Caesar Cipher and Huffman Codingent://SD_ILS/0/SD_ILS:8077232024-06-19T09:58:30Z2024-06-19T09:58:30Zby Low, Shu Lin, 1989-<br/>Author Low, Shu Lin, 1989-, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 L69 2013 raf<br/>Publication Date 2013<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafik dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/>Image steganography based on LSB approach coupled with Caesar cipher and Huffman codingent://SD_ILS/0/SD_ILS:8077262024-06-19T09:58:30Z2024-06-19T09:58:30Zby Low, Shu Lin, 1989-<br/>Author Low, Shu Lin, 1989-<br/>Format: Books<br/>Call Number CP 032402 ra<br/>Publication Date 2013<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafik dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/>Color image steganography technique based onleast significant bits approach coupled with Huffman encoding compressionent://SD_ILS/0/SD_ILS:8078872024-06-19T09:58:30Z2024-06-19T09:58:30Zby Eng, Chia Jing, 1989-<br/>Author Eng, Chia Jing, 1989-<br/>Format: Books<br/>Call Number CP 030805 ra<br/>Publication Date 2013<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafik dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/>Steganography in GIF animated grayscale imagesent://SD_ILS/0/SD_ILS:8116692024-06-19T09:58:30Z2024-06-19T09:58:30Zby Massalin Yerlan, 1976-<br/>Author Massalin Yerlan, 1976-, Majid Bakhtiari, Dr., Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 M379 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Steganography in GIF animated grayscale imagesent://SD_ILS/0/SD_ILS:8116702024-06-19T09:58:30Z2024-06-19T09:58:30Zby Massalin Yerlan, 1976-<br/>Author Massalin Yerlan, 1976-<br/>Format: Books<br/>Call Number CP 031190 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Algebraic geometry modeling in information theoryent://SD_ILS/0/SD_ILS:8013802024-06-19T09:58:30Z2024-06-19T09:58:30Zby Martínez-Moro, Edgar<br/>Author Martínez-Moro, Edgar<br/>Format: Books<br/>Call Number QA268 A44 2013<br/>Publisher World Scientific,<br/>Publication Date 2013<br/>ISBN 9789814335751<br/>Least significant bit steganography technique using modulus operation with pixel selection derived from K-map and Gaussian eliminationent://SD_ILS/0/SD_ILS:8028172024-06-19T09:58:30Z2024-06-19T09:58:30Zby Sayuthi Jaafar, 1962- , author<br/>Author Sayuthi Jaafar, 1962- , author, Azizah Abd. Manaf, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 S29 2013 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2013<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>A gray-scale image steganography techmique using fibonacci 12-bitplane decomposition and LSB approachent://SD_ILS/0/SD_ILS:8044892024-06-19T09:58:30Z2024-06-19T09:58:30Zby Sabah Fadhel Hamood, 1973-<br/>Author Sabah Fadhel Hamood, 1973-<br/>Format: Books<br/>Call Number CP 030220 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Color image steganography technique based onleast significant bits approach coupled with Huffman encoding compressionent://SD_ILS/0/SD_ILS:8078852024-06-19T09:58:30Z2024-06-19T09:58:30Zby Eng, Chia Jing, 1989-<br/>Author Eng, Chia Jing, 1989-, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number TK5102.94 E54 2013 raf<br/>Publication Date 2013<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafik dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/>Enhanced winnow key reconciliation for bennett-brassard 84 quantum key distribution protocolent://SD_ILS/0/SD_ILS:8118602024-06-19T09:58:30Z2024-06-19T09:58:30Zby Riaz Ahmad Qamar, 1959- , author<br/>Author Riaz Ahmad Qamar, 1959- , author, Mohd. Aizaini Maarof, supervisor, Subariah Ibrahim, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number TK5102.94 R53 2013 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2013<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Enhanced winnow key reconciliation for bennett-brassard 84 quantum key distribution protocolent://SD_ILS/0/SD_ILS:8118632024-06-19T09:58:30Z2024-06-19T09:58:30Zby Riaz Ahmad Qamar, 1959-<br/>Author Riaz Ahmad Qamar, 1959-<br/>Format: Books<br/>Call Number CP 031127 ra<br/>Publication Date 2013<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memoryent://SD_ILS/0/SD_ILS:7786672024-06-19T09:58:30Z2024-06-19T09:58:30Zby Nordiana Rahim, 1987-<br/>Author Nordiana Rahim, 1987-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 N675 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memoryent://SD_ILS/0/SD_ILS:7786682024-06-19T09:58:30Z2024-06-19T09:58:30Zby Nordiana Rahim, 1987-<br/>Author Nordiana Rahim, 1987-<br/>Format: Books<br/>Call Number CP 027499 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Performance analysis of steganography algorithms based for JPEG Imagesent://SD_ILS/0/SD_ILS:7901562024-06-19T09:58:30Z2024-06-19T09:58:30Zby Areej Abdulmalik Rosmmani, 1985-<br/>Author Areej Abdulmalik Rosmmani, 1985-, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A744 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) – Universiti Teknologi Malaysia, 2012<br/>Performance analysis of steganography algorithms based for JPEG Imagesent://SD_ILS/0/SD_ILS:7901572024-06-19T09:58:30Z2024-06-19T09:58:30Zby Areej Abdulmalik Rosmmani, 1985-<br/>Author Areej Abdulmalik Rosmmani, 1985-<br/>Format: Books<br/>Call Number CP 028331 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) – Universiti Teknologi Malaysia, 2012<br/>Advanced linear cryptanalysis of block and stream ciphersent://SD_ILS/0/SD_ILS:7960132024-06-19T09:58:30Z2024-06-19T09:58:30Zby Junod, Pascal, 1976-<br/>Author Junod, Pascal, 1976-, Canteaut, Anne<br/>Format: Books<br/>Call Number Z103 A38 2011<br/>Publisher IOS Press,<br/>Publication Date 2011<br/>ISBN 9781607508434<br/>Hacking miracles : the true strories of inventors and cyberspace pioneer such as Alexander Bell, Thomas Edison, Steve Jobs, Bill Gates and othersent://SD_ILS/0/SD_ILS:8166732024-06-19T09:58:30Z2024-06-19T09:58:30Zby Gubitosa, Carlo<br/>Author Gubitosa, Carlo<br/>Format: Books<br/>Call Number QA76.76.O63 G83 2011<br/>Publisher Jaico Publishing House,<br/>Publication Date 2011<br/>ISBN 9788184952018<br/>New stream cipher algorithm with nonlinear Boolean functions and parallel pseudo random number generatorent://SD_ILS/0/SD_ILS:7728172024-06-19T09:58:30Z2024-06-19T09:58:30Zby Majid Bakhtiari, 1961-<br/>Author Majid Bakhtiari, 1961-, Mohd. Aizaini Maarof, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M355 2011 raf<br/>Publication Date 2011<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/>New stream cipher algorithm with nonlinear Boolean functions and parallel pseudo random number generatorent://SD_ILS/0/SD_ILS:7728212024-06-19T09:58:30Z2024-06-19T09:58:30Zby Majid Bakhtiari, 1961-<br/>Author Majid Bakhtiari, 1961-<br/>Format: Computer file<br/>Call Number CP 025814 ra<br/>Publication Date 2011<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/>Restricted until 5 June 2014<br/>Web application obfuscation : -/WAFs..Evasion..Filters//alert (/Obfuscation/)-ent://SD_ILS/0/SD_ILS:7587942024-06-19T09:58:30Z2024-06-19T09:58:30Zby Heiderich, Mario<br/>Author Heiderich, Mario<br/>Format: Books<br/>Call Number QA76.625 H46 2011<br/>Publisher Elsevier/Syngress,<br/>Publication Date 2011<br/>ISBN 9781597496049<br/>Mycrypttools cryptographic algorithm learning aident://SD_ILS/0/SD_ILS:7876752024-06-19T09:58:30Z2024-06-19T09:58:30Zby Nelmiawati, author<br/>Author Nelmiawati, author, Mazleena Salleh, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number Z103 N45 2011 raf<br/>Publication Date 2011<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2011<br/>Mycrypttools cryptographic algorithm learning aident://SD_ILS/0/SD_ILS:7876762024-06-19T09:58:30Z2024-06-19T09:58:30Zby Nelmiawati, author,<br/>Author Nelmiawati, author,<br/>Format: Electronic Resources<br/>Call Number CP 058333 ra<br/>Publication Date 2011<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2011<br/>Hashing in computer science : fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:6396362024-06-19T09:58:30Z2024-06-19T09:58:30Zby Konheim, Alan G., 1934-<br/>Author Konheim, Alan G., 1934-<br/>Format: Books<br/>Call Number QA76.9.H36 K65 2010<br/>Publisher John Wiley & Sons,<br/>Publication Date 2010<br/>ISBN 9780470344736<br/>Steganography based on utilizing more surrounding pixelsent://SD_ILS/0/SD_ILS:6034192024-06-19T09:58:30Z2024-06-19T09:58:30Zby Masoud Afrakhteh<br/>Author Masoud Afrakhteh, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 017368 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Interpretative key management framework (IKM)ent://SD_ILS/0/SD_ILS:3966602024-06-19T09:58:30Z2024-06-19T09:58:30Zby Saman Shojae Chaeikar<br/>Author Saman Shojae Chaeikar, Shukor Abd. Razak, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5102.94 S26 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Steganography based on utilizing more surrounding pixelsent://SD_ILS/0/SD_ILS:3902572024-06-19T09:58:30Z2024-06-19T09:58:30Zby Masoud Afrakhteh<br/>Author Masoud Afrakhteh, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M378 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Expert SQL server 2008 encryptionent://SD_ILS/0/SD_ILS:6407182024-06-19T09:58:30Z2024-06-19T09:58:30Zby Coles, Michael, 1972-<br/>Author Coles, Michael, 1972-, Landrum, Rodney<br/>Format: Books<br/>Call Number QA76.9.A25 C653 2009<br/>Publisher Apress,<br/>Publication Date 2009<br/>ISBN 9781430224648 9781430224655<br/>Comprehensive possible attacks on RSAent://SD_ILS/0/SD_ILS:5882922024-06-19T09:58:30Z2024-06-19T09:58:30Zby Majid Bakhtiari, 1961-<br/>Author Majid Bakhtiari, 1961-, Rabiah Ahmad, supervisor, Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 016838<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2008 20<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/>Modern cryptanalysis : techniques for advanced code breakingent://SD_ILS/0/SD_ILS:2873252024-06-19T09:58:30Z2024-06-19T09:58:30Zby Swenson, Christopher<br/>Author Swenson, Christopher<br/>Format: Books<br/>Call Number QA76.9.A25 S932 2008<br/>Publisher Wiley Publishing,<br/>Publication Date 2008<br/>ISBN 9780470135938<br/>Quantum bits and quantum secrets : how quantum physics is revolutionizing codes and computersent://SD_ILS/0/SD_ILS:3301552024-06-19T09:58:30Z2024-06-19T09:58:30Zby Morsch, Oliver<br/>Author Morsch, Oliver<br/>Format: Books<br/>Call Number QA76.889 M67 2008<br/>Publisher Wiley-VCH,<br/>Publication Date 2008<br/>ISBN 9783527407101<br/>Comprehensive possible attacks on RSAent://SD_ILS/0/SD_ILS:3069042024-06-19T09:58:30Z2024-06-19T09:58:30Zby Majid Bakhtiari, 1961-<br/>Author Majid Bakhtiari, 1961-, Rabiah Ahmad, supervisor, Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 M23 2008 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2008<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/>Applied cryptanalysis : breaking ciphers in the real worldent://SD_ILS/0/SD_ILS:1558932024-06-19T09:58:30Z2024-06-19T09:58:30Zby Stamp, Mark<br/>Author Stamp, Mark, Low, Richard M., 1967-<br/>Format: Books<br/>Call Number QA76.9.A25 S68 2007<br/>Publisher Wiley-IEEE Press,<br/>Publication Date 2007<br/>ISBN 9780470114865<br/>Decrypted secrets : methods and maxims of cryptologyent://SD_ILS/0/SD_ILS:1580352024-06-19T09:58:30Z2024-06-19T09:58:30Zby Bauer, Friedrich Ludwig, 1924-<br/>Author Bauer, Friedrich Ludwig, 1924-<br/>Format: Books<br/>Call Number QA76.9.A25 B38 2007<br/>Edition 4th, rev. and extended ed.<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540245025<br/><a href="http://dx.doi.org/10.1007/978-3-540-48121-8">FullText</a><br/>A customizable cryptographic service provider for an embedded cryptohardware systement://SD_ILS/0/SD_ILS:1420962024-06-19T09:58:30Z2024-06-19T09:58:30Zby Illiasaak Ahmad<br/>Author Illiasaak Ahmad<br/>Format: Books<br/>Call Number TK7895.E42 I44 2007<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2007<br/>A customizable cryptographic service provider for an embedded cryptohardware systement://SD_ILS/0/SD_ILS:5668212024-06-19T09:58:30Z2024-06-19T09:58:30Zby Illiasaak Ahmad<br/>Author Illiasaak Ahmad<br/>Format: Computer file<br/>Call Number CP 013421<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2007<br/>Finite fields and applicationsent://SD_ILS/0/SD_ILS:3205402024-06-19T09:58:30Z2024-06-19T09:58:30Zby Mullen, Gary L.<br/>Author Mullen, Gary L., Mummert, Carl, 1978-<br/>Format: Books<br/>Call Number QA247.3 M85 2007<br/>Publisher American Mathematical Society,<br/>Publication Date 2007<br/>ISBN 9780821844182<br/>Design of an advanced encryption standard crypto-processor core for field programmable gate array implementationent://SD_ILS/0/SD_ILS:952222024-06-19T09:58:30Z2024-06-19T09:58:30Zby Mohd. Izuan Ismail<br/>Author Mohd. Izuan Ismail<br/>Format: Books<br/>Call Number QA76.9.A25 M59 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=37293">Preview</a><br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2006<br/>Aplikasi penjana nombor sudo rawakent://SD_ILS/0/SD_ILS:1096882024-06-19T09:58:30Z2024-06-19T09:58:30Zby Lai, Min Tak<br/>Author Lai, Min Tak<br/>Format: Books<br/>Call Number QA268 L34 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006 2005<br/>Project Paper (Sarjana Muda Kejuruteraan Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2006<br/>e-secure file transfer system (based on secure examination paper preparation case study )ent://SD_ILS/0/SD_ILS:1119612024-06-19T09:58:30Z2024-06-19T09:58:30Zby Yee, Thee Gee<br/>Author Yee, Thee Gee<br/>Format: Books<br/>Call Number QA76.9.A25 Y43 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Komputer)) - Universiti Teknologi Malaysia, 2006<br/>Cryptographic algorithms on reconfigurable hardwareent://SD_ILS/0/SD_ILS:1580182024-06-19T09:58:30Z2024-06-19T09:58:30Zby Rodriquez-Henriquez, Francisco<br/>Author Rodriquez-Henriquez, Francisco<br/>Format: Books<br/>Call Number QA76.9.A3 C79 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387338835<br/>Encryption using Triple DES, new DES and DES-X algorithment://SD_ILS/0/SD_ILS:1266032024-06-19T09:58:30Z2024-06-19T09:58:30Zby Thilakan Krishanansamy<br/>Author Thilakan Krishanansamy<br/>Format: Books<br/>Call Number QA76.9.A25 T74 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Elektronik)) - Universiti Teknologi Malaysia, 2006<br/>Design of an advanced encryption standard crypto-processor core for field programmable gate array implementationent://SD_ILS/0/SD_ILS:5598642024-06-19T09:58:30Z2024-06-19T09:58:30Zby Mohd. Izuan Abdullah<br/>Author Mohd. Izuan Abdullah<br/>Format: Computer file<br/>Call Number CP 12381<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2006<br/>Cryptographic libraries for developersent://SD_ILS/0/SD_ILS:6204632024-06-19T09:58:30Z2024-06-19T09:58:30Zby Moyle, Ed, 1973-<br/>Author Moyle, Ed, 1973-, Kelley, Diana, 1965-<br/>Format: Computer file<br/>Call Number CP 7014<br/>Edition 1st ed.<br/>Publisher Charles River Media,<br/>Publication Date 2006<br/>ISBN 9781584504092<br/>Cryptographic libraries for developersent://SD_ILS/0/SD_ILS:4544192024-06-19T09:58:30Z2024-06-19T09:58:30Zby Moyle, Ed, 1973-<br/>Author Moyle, Ed, 1973-, Kelley, Diana, 1965-<br/>Format: Books<br/>Call Number QA76.76.D47 M79 2006<br/>Edition 1st ed.<br/>Publisher Charles River Media,<br/>Publication Date 2006<br/>ISBN 9781584504092<br/>Practical cryptology and Web securityent://SD_ILS/0/SD_ILS:4704772024-06-19T09:58:30Z2024-06-19T09:58:30Zby Yuen, P.K.<br/>Author Yuen, P.K.<br/>Format: Books<br/>Call Number TK5102.94 Y83 2006<br/>Publisher Pearson Education LTD,<br/>Publication Date 2006<br/>ISBN 9780321263339<br/>Cryptanalysis in cryptographic algorithm designent://SD_ILS/0/SD_ILS:4614762024-06-19T09:58:30Z2024-06-19T09:58:30Zby Muhammad Reza Z'aba<br/>Author Muhammad Reza Z'aba, Badrisham Ahmad, Subariah Ibrahim, Mohd. Aizaini Maarof, National ICT Conference (2006 : Perlis)<br/>Format: Books<br/>Call Number QA76.9.A25 C794<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Authentification codes and combinatorial designsent://SD_ILS/0/SD_ILS:1432222024-06-19T09:58:30Z2024-06-19T09:58:30Zby Pei, Dingyi<br/>Author Pei, Dingyi<br/>Format: Books<br/>Call Number QA76.9.A25 P446 2006<br/>Publisher Chapman & Hall/CRC,<br/>Publication Date 2006<br/>ISBN 9781584864738 9781584884736<br/>Classical and contemporary cryptologyent://SD_ILS/0/SD_ILS:6150182024-06-19T09:58:30Z2024-06-19T09:58:30Zby Spillman, Richard J.<br/>Author Spillman, Richard J.<br/>Format: Computer file<br/>Call Number CP 6690<br/>Publisher Pearson Prentice Hall,<br/>Publication Date 2005<br/>ISBN 9780131477360<br/>Classical and contemporary cryptologyent://SD_ILS/0/SD_ILS:4434182024-06-19T09:58:30Z2024-06-19T09:58:30Zby Spillman, Richard J.<br/>Author Spillman, Richard J.<br/>Format: Books<br/>Call Number QA268 S64 2005<br/>Publisher Pearson Prentice Hall,<br/>Publication Date 2005<br/>ISBN 9780131828315<br/>Analysis of image quality for steganographic softwareent://SD_ILS/0/SD_ILS:4547702024-06-19T09:58:30Z2024-06-19T09:58:30Zby Azizah Abd. Manaf, Prof. Dr.<br/>Author Azizah Abd. Manaf, Prof. Dr., M. Z. Akram, K. Salehuddin, Sayuthi Jaafar, Brunei International Conference on Engineering and Technology (2005 : Brunei Darussalam)<br/>Format: Books<br/>Call Number QA76.9.A25 A53 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Implementing key management system based on openPGP protocol(RFC 2440)ent://SD_ILS/0/SD_ILS:8365112024-06-19T09:58:30Z2024-06-19T09:58:30Zby M. Norazizi Sham Mohd Sayuti<br/>Author M. Norazizi Sham Mohd Sayuti, Haslina Md. Sarkan, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M567 2004 raf<br/>Publication Date 2004<br/>Thesis (Sarjana Sains (Sains Komputer (Real Time Software Engineering)) - Universiti Teknologi Malaysia, 2004<br/>Impelmenting key management system based on openGP protocol (RFC 2440)ent://SD_ILS/0/SD_ILS:8407742024-06-19T09:58:30Z2024-06-19T09:58:30Zby M. Norazizi Sham Mohd Sayuti<br/>Author M. Norazizi Sham Mohd Sayuti, Haslina Md. Sarkan, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M563 2004 raf<br/>Publication Date 2004<br/>Thesis (Sarjana Sains (Sains Komputer - Real Time Software Engineering) - Universiti Teknologi Malaysia, 2004<br/>Impelmenting key management system based on openGP protocol (RFC 2440)ent://SD_ILS/0/SD_ILS:8407752024-06-19T09:58:30Z2024-06-19T09:58:30Zby M. Norazizi Sham Mohd Sayuti<br/>Author M. Norazizi Sham Mohd Sayuti<br/>Format: Books<br/>Call Number CP 033986 ra<br/>Publication Date 2004<br/>Thesis (Sarjana Sains (Sains Komputer - Real Time Software Engineering) - Universiti Teknologi Malaysia, 2004<br/>Information security intelligence : cryptographic principles and applicationsent://SD_ILS/0/SD_ILS:6079342024-06-19T09:58:30Z2024-06-19T09:58:30Zby Calabrese, Thomas<br/>Author Calabrese, Thomas<br/>Format: Computer file<br/>Call Number CP 5816<br/>Publisher Thomson Delmar Learning,<br/>Publication Date 2004<br/>ISBN 9781401837273<br/>Intelligent watermarking techniquesent://SD_ILS/0/SD_ILS:6186882024-06-19T09:58:30Z2024-06-19T09:58:30Zby Pan, Jeng-Shyang<br/>Author Pan, Jeng-Shyang, Huang, Hsiang-Cheh, Jain, Lakhmi C.<br/>Format: Computer file<br/>Call Number CP 6843<br/>Publisher World Scientific,<br/>Publication Date 2004<br/>ISBN 9789812389558<br/>Intelligent watermarking techniquesent://SD_ILS/0/SD_ILS:4192912024-06-19T09:58:30Z2024-06-19T09:58:30Zby Pan, Jeng-Shyang<br/>Author Pan, Jeng-Shyang, Huang, Hsiang-Cheh, Jain, Lakhmi C.<br/>Format: Books<br/>Call Number QA76.9.A25 I574 2004<br/>Publisher World Scientific,<br/>Publication Date 2004<br/>ISBN 9789812389558 9789812387578<br/>Public key crypto hardware for real-time security applicationent://SD_ILS/0/SD_ILS:4001652024-06-19T09:58:30Z2024-06-19T09:58:30Zby Mohamed Khalil Mohd. Hani<br/>Author Mohamed Khalil Mohd. Hani, Hau, Yuan Wen, 1980-, Lim, Kie Woon, National Real-Time Technology and Applications Symposium (2nd : 2004 Serdang, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 M54 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Information security intelligence : cryptographic principles and applicationsent://SD_ILS/0/SD_ILS:4201472024-06-19T09:58:30Z2024-06-19T09:58:30Zby Calabrese, Thomas<br/>Author Calabrese, Thomas<br/>Format: Books<br/>Call Number QA76.9.A25 C344 2004<br/>Publisher Thomson Delmar Learning,<br/>Publication Date 2004<br/>ISBN 9781401837273<br/>Implementing key management system based on openPGP protocol(RFC 2440)ent://SD_ILS/0/SD_ILS:8365132024-06-19T09:58:30Z2024-06-19T09:58:30Zby M.Norazizi Sham Mohd Sayuti<br/>Author M.Norazizi Sham Mohd Sayuti<br/>Format: Books<br/>Call Number CP 034176 ra<br/>Publication Date 2004<br/>Thesis (Sarjana Sains (Sains Komputer (Real Time Software Engineering)) - Universiti Teknologi Malaysia, 2004<br/>Video encryption in real time using secret key crytographyent://SD_ILS/0/SD_ILS:82742024-06-19T09:58:30Z2024-06-19T09:58:30Zby Pushpan, Anthony Devadason<br/>Author Pushpan, Anthony Devadason<br/>Format: Visual Materials<br/>Call Number MFL 12887<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains komputer) - Universiti Teknologi Malaysia, 2003<br/>Cryptanalysis of number theoretic ciphersent://SD_ILS/0/SD_ILS:3746632024-06-19T09:58:30Z2024-06-19T09:58:30Zby Wagstaff Jr., Samuel S.<br/>Author Wagstaff Jr., Samuel S.<br/>Format: Books<br/>Call Number QA76.9.A25 W33 2003<br/>Publisher Chapman & Hall,<br/>Publication Date 2003<br/>ISBN 9781584881537<br/>Twofish-based file encryptionent://SD_ILS/0/SD_ILS:3791142024-06-19T09:58:30Z2024-06-19T09:58:30Zby Muhammad Hatta Kassim<br/>Author Muhammad Hatta Kassim<br/>Format: Books<br/>Call Number QA76.9.A25 M52 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2003<br/>Advance encryption standard (AES-Rijndeal) softwareent://SD_ILS/0/SD_ILS:6021752024-06-19T09:58:30Z2024-06-19T09:58:30Zby Yuzaile Md. Yusof<br/>Author Yuzaile Md. Yusof<br/>Format: Computer file<br/>Call Number CP 6499<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Kejuruteraan Elektrik (Komputer)) - Universiti Teknologi Malaysia, 2003<br/>Hardware Implementation of RC6 algorithm using VHDLent://SD_ILS/0/SD_ILS:6032972024-06-19T09:58:30Z2024-06-19T09:58:30Zby Muniswaran Krishnan<br/>Author Muniswaran Krishnan<br/>Format: Computer file<br/>Call Number CP 6604<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik Elektronik)) - Universiti Teknologi Malaysia, 2003<br/>Twofish-based file encryptionent://SD_ILS/0/SD_ILS:6019932024-06-19T09:58:30Z2024-06-19T09:58:30Zby Muhammad Hatta Kassim<br/>Author Muhammad Hatta Kassim<br/>Format: Computer file<br/>Call Number CP 6561<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2003<br/>System-on-chip architectures and implementations for private-key data encryptionent://SD_ILS/0/SD_ILS:4093912024-06-19T09:58:30Z2024-06-19T09:58:30Zby McLoone, Maire<br/>Author McLoone, Maire, McCanny, J. V.<br/>Format: Books<br/>Call Number QA76.9.A25 M564 2003<br/>Publisher Kluwer Academic/Plenum Publishers,<br/>Publication Date 2003<br/>ISBN 9780306478826<br/>Hardware implementation of RC6 algorithm using VHDLent://SD_ILS/0/SD_ILS:3888812024-06-19T09:58:30Z2024-06-19T09:58:30Zby Muniswaran Krishnan<br/>Author Muniswaran Krishnan<br/>Format: Books<br/>Call Number Z103 M86 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik Elektronik)) - Universiti Teknologi Malaysia, 2003<br/>Securing voice over IP using digital signature and encryptionent://SD_ILS/0/SD_ILS:3443792024-06-19T09:58:30Z2024-06-19T09:58:30Zby Stalin Thangaiah Vijaya Kamaraj<br/>Author Stalin Thangaiah Vijaya Kamaraj<br/>Format: Books<br/>Call Number QA76.9.A25 S72 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains komputer) - Universiti Teknologi Malaysia, 2003<br/>Video encryption in real time using secret key crytographyent://SD_ILS/0/SD_ILS:3408382024-06-19T09:58:30Z2024-06-19T09:58:30Zby Anthony Devadason Pushpan<br/>Author Anthony Devadason Pushpan<br/>Format: Books<br/>Call Number TK6680.5 A57 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains komputer) - Universiti Teknologi Malaysia, 2003<br/>Graphical password for symmetric encryptionent://SD_ILS/0/SD_ILS:3448992024-06-19T09:58:30Z2024-06-19T09:58:30Zby Sagathevan Sundrarajoo<br/>Author Sagathevan Sundrarajoo<br/>Format: Books<br/>Call Number QA76.9.A25 S24 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/>Information hiding using steganographyent://SD_ILS/0/SD_ILS:3588442024-06-19T09:58:30Z2024-06-19T09:58:30Zby Muhalim Mohamed Amin<br/>Author Muhalim Mohamed Amin, Mazleena Salleh, Subariah Ibrahim, M. R. Katmin, National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 M83 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Secure E-voting with blind signatureent://SD_ILS/0/SD_ILS:3274562024-06-19T09:58:30Z2024-06-19T09:58:30Zby Subariah Ibrahim<br/>Author Subariah Ibrahim, Maznah Kamat, 1960-, Mazleena Salleh, Shah Rizan Abdul Aziz, National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 S424 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Web defacement detection and recovery systement://SD_ILS/0/SD_ILS:3380882024-06-19T09:58:30Z2024-06-19T09:58:30Zby Balasubramaniam Manikam<br/>Author Balasubramaniam Manikam<br/>Format: Books<br/>Call Number QA76.9.A25 B345 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Bachelor of Computer Science) - Universiti Teknologi Malaysia, 2003<br/>Web defacement detection and recovery systement://SD_ILS/0/SD_ILS:79122024-06-19T09:58:30Z2024-06-19T09:58:30Zby Balasubramaniam Manikam<br/>Author Balasubramaniam Manikam<br/>Format: Visual Materials<br/>Call Number MFL 12879<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains (Komputer)) - Universiti Teknologi Malaysia, 2003<br/>Virtual optical laboratory (transmission of signal through an optical fiber)ent://SD_ILS/0/SD_ILS:135092024-06-19T09:58:30Z2024-06-19T09:58:30Zby Ahmad Syihan Shoib<br/>Author Ahmad Syihan Shoib<br/>Format: Visual Materials<br/>Call Number MFL 12321 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Bachelor of Electrical Engineering (Telecommunication)) - Universiti Teknologi Malaysia, 2002<br/>Investigation on the performance of protective equipment under application of switching impulse and high voltage alternating currentent://SD_ILS/0/SD_ILS:213442024-06-19T09:58:30Z2024-06-19T09:58:30Zby Chitaram Shathasivam<br/>Author Chitaram Shathasivam<br/>Format: Visual Materials<br/>Call Number MFL 12335<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2002<br/>Dissolved gas analysis (DGA) as a part of transformer condition monitoring (TCM) using artificial neural network (ANN)-AIent://SD_ILS/0/SD_ILS:214002024-06-19T09:58:30Z2024-06-19T09:58:30Zby Muhamad Saiful Muhamad Ghous<br/>Author Muhamad Saiful Muhamad Ghous<br/>Format: Visual Materials<br/>Call Number MFL 12317<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2002<br/>Coding theory and cryptologyent://SD_ILS/0/SD_ILS:3638272024-06-19T09:58:30Z2024-06-19T09:58:30Zby Niederreiter, Harald<br/>Author Niederreiter, Harald<br/>Format: Books<br/>Call Number QA268 C66 2002<br/>Publisher World Scientific,<br/>Publication Date 2002<br/>ISBN 9789812381323<br/>Database encrytion schemes : a comparative studyent://SD_ILS/0/SD_ILS:3515112024-06-19T09:58:30Z2024-06-19T09:58:30Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Norbik Bashah Idris, Harihodin Selamat, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A25 Z34 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Java implemention of encrypter and decrypter using rijndael algorithment://SD_ILS/0/SD_ILS:3597022024-06-19T09:58:30Z2024-06-19T09:58:30Zby Nur Elidianna Abu Zar<br/>Author Nur Elidianna Abu Zar<br/>Format: Books<br/>Call Number QA76.9.A25 N87 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Bachelor of Electrical Engineering (Computer)) - Universiti Teknologi Malaysia, 2002<br/>Auditors' introduction to crytography and its application in database securityent://SD_ILS/0/SD_ILS:3458482024-06-19T09:58:30Z2024-06-19T09:58:30Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Norbik Bashah Idris, Harihodin Selamat, International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number QA76.9.D314 Z34 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Cryptographic applications in database security : a survey studyent://SD_ILS/0/SD_ILS:3267202024-06-19T09:58:30Z2024-06-19T09:58:30Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Piper, Fred, Norbik Bashah Idris, Ciechanowicz, Zbigniew 'Chez', International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number QA76.9.A25 Z344 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Virtual encryption driver using blowfish algorithment://SD_ILS/0/SD_ILS:3210332024-06-19T09:58:30Z2024-06-19T09:58:30Zby Tay, Kwai Ping<br/>Author Tay, Kwai Ping<br/>Format: Books<br/>Call Number Z103 T39 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Bachelor of Electrical Engineering (Computer)) - Universiti Teknologi Malaysia, 2002<br/>Speed supervisory control via parallel portent://SD_ILS/0/SD_ILS:71722024-06-19T09:58:30Z2024-06-19T09:58:30Zby Chan, Noel Zen Kim<br/>Author Chan, Noel Zen Kim<br/>Format: Visual Materials<br/>Call Number MFL 12812<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2002<br/>A generalized group signature schemeent://SD_ILS/0/SD_ILS:3012392024-06-19T09:58:30Z2024-06-19T09:58:30Zby Eddie Shahril Ismail<br/>Author Eddie Shahril Ismail, Yahya Abu Hasan, 1953-, How, Guan Aun<br/>Format: Books<br/>Call Number QA268 E33 2001<br/>Publisher Universiti Sains Malaysia,<br/>Publication Date 2001<br/>The multiple RSA cryptosystement://SD_ILS/0/SD_ILS:3012692024-06-19T09:58:30Z2024-06-19T09:58:30Zby How, Guan Aun<br/>Author How, Guan Aun, Yahya Abu Bakar, Eddie Shahril Ismail<br/>Format: Books<br/>Call Number QA76.9.A25 H68 2001<br/>Publisher Universiti Sains Malaysia,<br/>Publication Date 2001<br/>Military vehicle sound signature analysisent://SD_ILS/0/SD_ILS:210892024-06-19T09:58:30Z2024-06-19T09:58:30Zby Firuz Giry Naidu Ramanujaloo Naidu<br/>Author Firuz Giry Naidu Ramanujaloo Naidu<br/>Format: Visual Materials<br/>Call Number MFL 12124<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Bachelor of Computer Engineering) - Universiti Teknologi Malaysia /ATMA, 2000<br/>Decrypted secrets : methods and maxims of cryptologyent://SD_ILS/0/SD_ILS:1572912024-06-19T09:58:30Z2024-06-19T09:58:30Zby Bauer, Friedrich Ludwig<br/>Author Bauer, Friedrich Ludwig<br/>Format: Books<br/>Call Number QA76.9.A25 B38 2000<br/>Edition 2nd ed.<br/>Publisher Springer-Verlag,<br/>Publication Date 2000<br/>ISBN 9783540668718<br/>A traceable proactive anonymous electronic cashent://SD_ILS/0/SD_ILS:1395382024-06-19T09:58:30Z2024-06-19T09:58:30Zby Chang, Yu Cheng<br/>Author Chang, Yu Cheng, Kamaruzzaman Seman, Jasmy Yunus, National Conference on Telecommunication Technology 2000 (2000 : Johor Bahru)<br/>Format: Books<br/>Call Number TK5102.94 C42 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Integrating security services into computer supported cooperative workent://SD_ILS/0/SD_ILS:1217262024-06-19T09:58:30Z2024-06-19T09:58:30Zby Mohd. Aizaini Maarof<br/>Author Mohd. Aizaini Maarof<br/>Format: Books<br/>Call Number TK5105.59 M34 2000 raf<br/>Publisher Aston University,<br/>Publication Date 2000<br/>Thesis (Doctor of Philosophy) - Aston University, 2000<br/>Security control and analysis systement://SD_ILS/0/SD_ILS:4816102024-06-19T09:58:30Z2024-06-19T09:58:30Zby Norbik Bashah Idris<br/>Author Norbik Bashah Idris, Subariah Ibrahim, Mazleena Salleh, Nik Khairul Raja Abdullah<br/>Format: Books<br/>Call Number MAK 12825 a<br/>Publication Date 2000<br/>A new authentication protocol for distributed environmentent://SD_ILS/0/SD_ILS:3307322024-06-19T09:58:30Z2024-06-19T09:58:30Zby Abdukadir Moalim Ali<br/>Author Abdukadir Moalim Ali<br/>Format: Books<br/>Call Number TK5105.55 A22 2000 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Thesis (Master of Science (Computer Science)) - Universiti Teknologi Malaysia, 2000<br/>Cryptographic protocol for payment transactionent://SD_ILS/0/SD_ILS:1361822024-06-19T09:58:30Z2024-06-19T09:58:30Zby Chang, Yu Cheng<br/>Author Chang, Yu Cheng, Kamaruzzaman Seman, Jasmy Yunus, TENCON '2000 (2000 : Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A25 C42 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>A new authentication protocol for distributed environmentent://SD_ILS/0/SD_ILS:215642024-06-19T09:58:30Z2024-06-19T09:58:30Zby Abdukadir Moalim Ali<br/>Author Abdukadir Moalim Ali<br/>Format: Visual Materials<br/>Call Number MFL 12302<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Thesis (Master of Science (Computer Science)) - Universiti Teknologi Malaysia, 2000<br/>Flexural behaviour and durability of glass fibre reinforcedent://SD_ILS/0/SD_ILS:136422024-06-19T09:58:30Z2024-06-19T09:58:30Zby Abdul Rahman Mohd. Sam<br/>Author Abdul Rahman Mohd. Sam<br/>Format: Visual Materials<br/>Call Number MFL 10498<br/>Publisher University of Sheffield,<br/>Publication Date 1999<br/>Thesis (PhD) - University of Sheffield, 1999<br/>Public-key crytographyent://SD_ILS/0/SD_ILS:1573092024-06-19T09:58:30Z2024-06-19T09:58:30Zby Salomaa, Arto<br/>Author Salomaa, Arto<br/>Format: Books<br/>Call Number QA76.9.A25 S26 1996<br/>Edition 2nd ed.<br/>Publisher Springer-Verlag,<br/>Publication Date 1996<br/>ISBN 9783540613565<br/>Building in big brother : the crytographic policy debateent://SD_ILS/0/SD_ILS:1574002024-06-19T09:58:30Z2024-06-19T09:58:30Zby Hoffman, Lance J.<br/>Author Hoffman, Lance J.<br/>Format: Books<br/>Call Number QA76.9.A25 B85 1995<br/>Publisher Springer-Verlag,<br/>Publication Date 1995<br/>ISBN 9780387944418<br/>Analysis of modified improved geffe random sequence generatorent://SD_ILS/0/SD_ILS:4049712024-06-19T09:58:30Z2024-06-19T09:58:30Zby Ahmad Zuri Sha'ameri<br/>Author Ahmad Zuri Sha'ameri, Tuan Sabri Tuan Mat, Kamaruzzaman Seman, International Conference on Communication (2nd : 1995 : Langkawi)<br/>Format: Books<br/>Call Number MAK 11944 a<br/>Publisher UTM,<br/>Publication Date 1995<br/>Cryptologyent://SD_ILS/0/SD_ILS:4105592024-06-19T09:58:30Z2024-06-19T09:58:30Zby Beutelspacher, Albrecht<br/>Author Beutelspacher, Albrecht, Fisher, J. Chris<br/>Format: Books<br/>Call Number Z103 B48 1994<br/>Publisher Mathematical Association of America,<br/>Publication Date 1994<br/>ISBN 9780883855041<br/>Contemporary cryptology : the science of information integrityent://SD_ILS/0/SD_ILS:4100852024-06-19T09:58:30Z2024-06-19T09:58:30Zby Simmons, Gustavus J.<br/>Author Simmons, Gustavus J., Institute of Electrical and Electronics Engineers<br/>Format: Books<br/>Call Number QA76.9.A25 C64 1992<br/>Publisher IEEE Press,<br/>Publication Date 1992<br/>ISBN 9780879422776<br/>Modern cryptology : a tutorialent://SD_ILS/0/SD_ILS:1827552024-06-19T09:58:30Z2024-06-19T09:58:30Zby Brassard, Gilles<br/>Author Brassard, Gilles<br/>Format: Books<br/>Call Number Z103.B72 1988<br/>Publisher Springer-Verlag,<br/>Publication Date 1988<br/>ISBN 9780387968421<br/>Cipher systems : the protection of communicationsent://SD_ILS/0/SD_ILS:1575522024-06-19T09:58:30Z2024-06-19T09:58:30Zby Beker, Henry<br/>Author Beker, Henry, Piper, Fred<br/>Format: Books<br/>Call Number Z104.B44 1982<br/>Publisher Northwood Bks,<br/>Publication Date 1982<br/>ISBN 9780442306076<br/>Tutorial : the security of data in networksent://SD_ILS/0/SD_ILS:2544092024-06-19T09:58:30Z2024-06-19T09:58:30Zby Davies, D. W.<br/>Author Davies, D. W.<br/>Format: Books<br/>Call Number TK5105.5 D36 1981 f<br/>Publisher IEEE Computer Society,<br/>Publication Date 1981<br/>Mathematical recreations and essaysent://SD_ILS/0/SD_ILS:2958492024-06-19T09:58:30Z2024-06-19T09:58:30Zby Ball, W. W. Rouse (Walter William Rouse), 1850-1925<br/>Author Ball, W. W. Rouse (Walter William Rouse), 1850-1925, Coxeter, H. S. M. (Harold Scott Macdonald), 1907-<br/>Format: Books<br/>Call Number QA95.B3 1974<br/>Edition 12th ed.<br/>Publisher University of Toronto Press,<br/>Publication Date 1974<br/>ISBN 9780802018441<br/>Mathematical recreations & essaysent://SD_ILS/0/SD_ILS:2957532024-06-19T09:58:30Z2024-06-19T09:58:30Zby Ball, W. W. Rouse (Walter William Rouse), 1850-1925<br/>Author Ball, W. W. Rouse (Walter William Rouse), 1850-1925, Coxeter, H. S. M. (Harold Scott Macdonald), 1907-<br/>Format: Books<br/>Call Number QA95 B3 1947<br/>Edition American ed.<br/>Publisher Macmillan Co.,<br/>Publication Date 1947<br/>Mathematical recreations and essaysent://SD_ILS/0/SD_ILS:2966252024-06-19T09:58:30Z2024-06-19T09:58:30Zby Ball, W. W. Rouse (Walter William Rouse), 1850-1925<br/>Author Ball, W. W. Rouse (Walter William Rouse), 1850-1925<br/>Format: Books<br/>Call Number QA95.B3 1939<br/>Edition 11th ed.<br/>Publisher Macmillan,<br/>Publication Date 1939<br/>DBCRYPT USER AND KEY MANAGEMENTent://SD_ILS/0/SD_ILS:8396032024-06-19T09:58:30Z2024-06-19T09:58:30Zby Omar Muse Omar, 1980-, author<br/>Author Omar Muse Omar, 1980-, author, Mohd. Nazri Kama, Dr., supervisor, Muhammad Sufyan Basri, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 O43 2007 raf<br/>Thesis Sarjana Sains (Sains Komputer - Kejuruteraan Perisian Masa Nyata)<br/>IMPLEMENTATION OF PKCS11 and PKCS12 CRYPTOGRAPHIC FUNCTIONS IN .Net FOR SCAN ASSOCIATESent://SD_ILS/0/SD_ILS:8405532024-06-19T09:58:30Z2024-06-19T09:58:30Zby Pirooz Kiani Kori, 1975-, author<br/>Author Pirooz Kiani Kori, 1975-, author, Suhaimi Ibrahim, Assoc. Prof. Dr., supervisor, Hardiyana Abd. Rahman, supervisor, Sekolah Informatik Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 P57 2010 raf<br/>Thesis Sarjana Kejuruteraan Komputer<br/>IMPLEMENTATION OF PKCS11 and PKCS12 CRYPTOGRAPHIC FUNCTIONS IN.Net FOR SCAN ASSOCIATESent://SD_ILS/0/SD_ILS:8405542024-06-19T09:58:30Z2024-06-19T09:58:30Zby Pirooz Kiani Kori, 1975-, author<br/>Author Pirooz Kiani Kori, 1975-, author, Suhaimi Ibrahim, Assoc. Prof. Dr., supervisor, Hardiyana Abd. Rahman, supervisor, Sekolah Informatik Termaju<br/>Format: Books<br/>Call Number CP 034005 ra<br/>Thesis Sarjana Kejuruteraan Komputer<br/>ENHANCEMENT SECURITY AGAINST SNIFFING ATTACK IN AD HOC NETWORKent://SD_ILS/0/SD_ILS:8407162024-06-19T09:58:30Z2024-06-19T09:58:30Zby Sanam Ghorbani Lyastani, 1984-, author<br/>Author Sanam Ghorbani Lyastani, 1984-, author, Teddy Mantoro, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5102.85 S26 2013 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>ENHANCEMENT SECURITY AGAINST SNIFFING ATTACK IN AD HOC NETWORKent://SD_ILS/0/SD_ILS:8407172024-06-19T09:58:30Z2024-06-19T09:58:30Zby Sanam Ghorbani Lyastani, 1984-, author<br/>Author Sanam Ghorbani Lyastani, 1984-, author, Teddy Mantoro, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034040 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>DBCRYPT : (MANUAL AND TRANSPARENT ENCRYPTION/DECRYPTION)ent://SD_ILS/0/SD_ILS:8417492024-06-19T09:58:30Z2024-06-19T09:58:30Zby Mustafa Ahmed Abdullah Aqel, 1979-, author<br/>Author Mustafa Ahmed Abdullah Aqel, 1979-, author, Mohd. Nazri Kama, 1963-, supervisor, Muhammad Sufyan Basri, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M878 2007 raf<br/>Thesis Sarjana Sains (Sains Komputer - Kejuruteraan Perisian Masa Nyata)<br/>Information leakage of boolean fuctions and its relationship to other cryptographic criteriaent://SD_ILS/0/SD_ILS:4117952024-06-19T09:58:30Z2024-06-19T09:58:30Zby Zhang, M.<br/>Author Zhang, M., Tavares, S. E., Campbell, L. L.<br/>Format: Books<br/>Call Number MAK 5975<br/>Cryptographic relational algebraent://SD_ILS/0/SD_ILS:4176412024-06-19T09:58:30Z2024-06-19T09:58:30Zby Davida, George I.<br/>Author Davida, George I., Yeh, I.<br/>Format: Books<br/>Call Number MAK 5978<br/>Stream ciphers for high speed data transmissionent://SD_ILS/0/SD_ILS:4042532024-06-19T09:58:30Z2024-06-19T09:58:30Zby Tuan Sabri Tuan Mat<br/>Author Tuan Sabri Tuan Mat, Ahmad Zuri Sha'ameri, Malaysian Science and Technology Congress (1994 : Kuala Lumpur)<br/>Format: Books<br/>Call Number MAK 12011 a<br/>HYBRID DATA HIDING TECHNIQUE BASED ON SIDE MATCH VECTOR QUANTIZATION AND GENETIC ALGORITHM (SMVQ-GA) FOR MILITARY SECRET COMMUNICATIONent://SD_ILS/0/SD_ILS:8712882024-06-19T09:58:30Z2024-06-19T09:58:30Zby Norshatela Anuar, 1985-, author<br/>Author Norshatela Anuar, 1985-, author, Nilam Nur Amir Sjarif, Dr., 1986-, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 N671 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>A new hash function based approach to generate real random values for key managementent://SD_ILS/0/SD_ILS:8359992024-06-19T09:58:30Z2024-06-19T09:58:30Zby Saman Hedayatpour, 1985-, author<br/>Author Saman Hedayatpour, 1985-, author, Suriayati Chuprat, Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.5 S263 2012 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>A new hash function based approach to generate real random values for key managementent://SD_ILS/0/SD_ILS:8360082024-06-19T09:58:30Z2024-06-19T09:58:30Zby Saman Hedayatpour, 1985-, author<br/>Author Saman Hedayatpour, 1985-, author, Suriayati Chuprat, Dr., Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034116 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>THE DEVELOPMENT OF A KEY GENERATION APPLICATION FOR WIRELESS SECURE MODEM FOR SAPURA TECHNOLOGIES SDN BHDent://SD_ILS/0/SD_ILS:8389722024-06-19T09:58:30Z2024-06-19T09:58:30Zby Mardiana Sulaiman, author<br/>Author Mardiana Sulaiman, author, Azri Azmi, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M373 2004 raf<br/>Thesis Sarjana Sains (Sains Komputer - Kejuruteraan Perisian Masa Nyata)<br/>THE DEVELOPMENT OF A KEY GENERATION APPLICATION FOR WIRELESS SECURE MODEM FOR SAPURA TECHNOLOGIES SDN BHDent://SD_ILS/0/SD_ILS:8389732024-06-19T09:58:30Z2024-06-19T09:58:30Zby Mardiana Sulaiman, author<br/>Author Mardiana Sulaiman, author, Azri Azmi, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034588 ra<br/>Thesis Sarjana Sains (Sains Komputer - Kejuruteraan Perisian Masa Nyata)<br/>DBCRYPT USER AND KEY MANAGEMENTent://SD_ILS/0/SD_ILS:8396042024-06-19T09:58:30Z2024-06-19T09:58:30Zby Omar Muse Omar, 1980-, author<br/>Author Omar Muse Omar, 1980-, author, Mohd. Nazri Kama, Dr., supervisor, Muhammad Sufyan Basri, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034564 ra<br/>Thesis Sarjana Sains (Sains Komputer - Kejuruteraan Perisian Masa Nyata)<br/>HYBRID DATA HIDING TECHNIQUE BASED ON SIDE MATCH VECTOR QUANTIZATION AND GENETIC ALGORITHM (SMVQ-GA) FOR MILITARY SECRET COMMUNICATIONent://SD_ILS/0/SD_ILS:8721212024-06-19T09:58:30Z2024-06-19T09:58:30Zby Norshatela Anuar, 1985-, author<br/>Author Norshatela Anuar, 1985-, author, Nilam Nur Amir Sjarif, Dr., 1986-, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 064085 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>Hacking the Hacker: Learn From the Experts Who Take Down Hackersent://SD_ILS/0/SD_ILS:8726132024-06-19T09:58:30Z2024-06-19T09:58:30Zby Grimes, Roger A.<br/>Author Grimes, Roger A.<br/>Format: Books<br/>Call Number QA76.9.A25 G75 2017<br/>ISBN 9781119396215<br/>