Search Results for Data encryption (Computer science) - Narrowed by: English SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ps$003d300$0026isd$003dtrue?dt=list 2024-05-14T06:00:00Z Advances of DNA computing in cryptography ent://SD_ILS/0/SD_ILS:882384 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Namasudra, Suyel, editor<br/>Author&#160;Namasudra, Suyel, editor,&#160;Deka, Ganesh Chandra, 1969- editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 .A25 A378 2019<br/>Publication Date&#160;2019<br/>ISBN&#160;9780815385325<br/> A comparative study on image encryption based on 2D Chaotic Map ent://SD_ILS/0/SD_ILS:882556 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Nik Nur Syahirah Nik Rahim, 1996-, author<br/>Author&#160;Nik Nur Syahirah Nik Rahim, 1996-, author,&#160;Rashidah Kadir, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N55 2019 raf<br/>Publication Date&#160;2019<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian Dan Keselamatan)) - Universiti Teknologi Malaysia, 2019<br/> Cryptoken wallet system ent://SD_ILS/0/SD_ILS:882591 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Syafiq Shamsuddin, 1996-, author<br/>Author&#160;Syafiq Shamsuddin, 1996-, author,&#160;Mohd. Yazid Idris, 1973-, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.B56 S93 2019 raf<br/>Publication Date&#160;2019<br/>Project Paper (Sarjana Muda Sains Komputer (Kejuruteraan Perisian)) - Universiti Teknologi Malaysia, 2019<br/> Cryptoken wallet system ent://SD_ILS/0/SD_ILS:882593 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Syafiq Shamsuddin, 1996-, author<br/>Author&#160;Syafiq Shamsuddin, 1996-, author,&#160;Mohd. Yazid Idris, 1973-, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Electronic Resources<br/>Call Number&#160;CP 082916 ra<br/>Publication Date&#160;2019<br/>Project Paper (Sarjana Muda Sains Komputer (Kejuruteraan Perisian)) - Universiti Teknologi Malaysia, 2019<br/> VLSI design of present encryption algorithm ent://SD_ILS/0/SD_ILS:883120 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Siti Maisara Murniyati Muin, 1996-, author<br/>Author&#160;Siti Maisara Murniyati Muin, 1996-, author,&#160;Shaikh Nasir Shaikh Husin, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Kejuruteraan Elektrik<br/>Format:&#160;Electronic Resources<br/>Call Number&#160;CP 083065 ra<br/>Publication Date&#160;2019<br/>Thesis (Sarjana Muda Kejuruteraan (Elektrik &ndash; Elektronik)) - Universiti Teknologi Malaysia, 2019<br/> CRYPTOLOGY : Classical and Modern ent://SD_ILS/0/SD_ILS:882329 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Klima, Richard E., author<br/>Author&#160;Klima, Richard E., author,&#160;Sigmon, Neil, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 K55 2019<br/>Edition&#160;Second Edition<br/>Publication Date&#160;2019<br/>ISBN&#160;9781138047624<br/> A comparative study on image encryption based on 2D Chaotic Map ent://SD_ILS/0/SD_ILS:882558 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Nik Nur Syahirah Nik Rahim, 1996-, author<br/>Author&#160;Nik Nur Syahirah Nik Rahim, 1996-, author,&#160;Rashidah Kadir, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Electronic Resources<br/>Call Number&#160;CP 082943 ra<br/>Publication Date&#160;2019<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian Dan Keselamatan)) - Universiti Teknologi Malaysia, 2019<br/> VLSI design of present encryption algorithm ent://SD_ILS/0/SD_ILS:883116 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Siti Maisara Murniyati Muin, 1996-, author<br/>Author&#160;Siti Maisara Murniyati Muin, 1996-, author,&#160;Shaikh Nasir Shaikh Husin, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;TK7874.75 S58 2019 raf<br/>Publication Date&#160;2019<br/>Thesis (Sarjana Muda Kejuruteraan (Elektrik &ndash; Elektronik)) - Universiti Teknologi Malaysia, 2019<br/> QR parking system for disable ent://SD_ILS/0/SD_ILS:883333 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Muhammad Safwan Rashid, 1995-, author<br/>Author&#160;Muhammad Safwan Rashid, 1995-, author,&#160;Salinda Buyamin, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 M84 2019 raf<br/>Publication Date&#160;2019<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik &ndash; Mekatronik)) - Universiti Teknologi Malaysia, 2019<br/> QR parking system for disable ent://SD_ILS/0/SD_ILS:883334 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Muhammad Safwan Rashid, 1995-, author<br/>Author&#160;Muhammad Safwan Rashid, 1995-, author,&#160;Salinda Buyamin, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Kejuruteraan Elektrik<br/>Format:&#160;Electronic Resources<br/>Call Number&#160;CP 083136 ra<br/>Publication Date&#160;2019<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik &ndash; Mekatronik)) - Universiti Teknologi Malaysia, 2019<br/> Selective colour image encryption based on texture features using enhanced blowfish algorithm ent://SD_ILS/0/SD_ILS:863505 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Lahieb Mohammed Jawad, 1978-, author<br/>Author&#160;Lahieb Mohammed Jawad, 1978-, author,&#160;Ghazali Sulong, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;XX(863505.2)<br/>Publication Date&#160;2016<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/> Selective colour image encryption based on texture features using enhanced blowfish algorithm ent://SD_ILS/0/SD_ILS:868484 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Lahieb Mohammed Jawad, 1978-, author<br/>Author&#160;Lahieb Mohammed Jawad, 1978-, author,&#160;Ghazali Sulong, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Electronic Resources<br/>Call Number&#160;CP 064628 ra<br/>Publication Date&#160;2016<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/> Steganografi berkapasiti tinggi menggunakan penggantian bit terkurang bererti dan pengesanan pinggir hibrid ent://SD_ILS/0/SD_ILS:851482 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Harja Santana Purba, 1963- , author<br/>Author&#160;Harja Santana Purba, 1963- , author<br/>Format:&#160;Books<br/>Call Number&#160;CP 054777 ra<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Practical cryptography: algorithms and implementations using C++ ent://SD_ILS/0/SD_ILS:835144 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Azad, Saiful<br/>Author&#160;Azad, Saiful,&#160;Pathan, Al-Sakib Khan editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 A25 P725 2015<br/>Publisher&#160;CRC Press/Taylor &amp; Francis,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781482228892<br/> Information hiding in speech signals for secure communication ent://SD_ILS/0/SD_ILS:841038 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Wu, Zhijun<br/>Author&#160;Wu, Zhijun<br/>Format:&#160;Books<br/>Call Number&#160;TK7882.S65 W8 2015<br/>Publisher&#160;Syngress ,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780128013281<br/> Steganografi berkapasiti tinggi menggunakan penggantian bit terkurang bererti dan pengesanan pinggir hibrid ent://SD_ILS/0/SD_ILS:849346 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Harja Santana Purba, 1963- , author<br/>Author&#160;Harja Santana Purba, 1963- , author,&#160;Ghazali Sulong, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;XX(849346.1)<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Integration of verification in otp cryptography for highly critical embedded system ent://SD_ILS/0/SD_ILS:859380 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Muhammad Maharoff, 1980- , author<br/>Author&#160;Muhammad Maharoff, 1980- , author,&#160;Saiful Adli Ismail, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M846 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Kejuruteraan Sistem Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Gray-scale image steganography using LSB insertion and fibonacci ent://SD_ILS/0/SD_ILS:860369 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Toh, Pui Ling, 1991-<br/>Author&#160;Toh, Pui Ling, 1991-,&#160;Ghazali Sulong,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;TA1636 T64 2015raf<br/>Publication Date&#160;2015<br/>Project Paper (Sarjana Muda Sains Komputer (Grafik dan Perisian Multimedia)) - Universiti Teknologi Malaysia, 2015<br/> Integration of verification in otp cryptography for highly critical embedded system ent://SD_ILS/0/SD_ILS:859625 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Muhammad Maharoff, 1980- , author<br/>Author&#160;Muhammad Maharoff, 1980- , author,&#160;Saiful Adli Ismail, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034740 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Kejuruteraan Sistem Komputer))-Universiti Teknologi Malaysia, 2015<br/> Gray-scale image steganography using LSB insertion and fibonacci ent://SD_ILS/0/SD_ILS:860373 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Toh, Pui Ling, 1991-<br/>Author&#160;Toh, Pui Ling, 1991-,&#160;Ghazali Sulong,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;CP 061116 ra<br/>Publication Date&#160;2015<br/>Project Paper (Sarjana Muda Sains Komputer (Grafik dan Perisian Multimedia)) - Universiti Teknologi Malaysia, 2015<br/> Facial blurring using henon map ent://SD_ILS/0/SD_ILS:860614 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Loh, Shuet Han, 1991-<br/>Author&#160;Loh, Shuet Han, 1991-,&#160;Ghazali Sulong,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;XX(860614.1)<br/>Publication Date&#160;2015<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafik dan Multimedia)) - Universiti Teknologi Malaysia, 2015<br/> Facial blurring using henon map ent://SD_ILS/0/SD_ILS:860637 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Loh, Shuet Han, 1991-<br/>Author&#160;Loh, Shuet Han, 1991-,&#160;Ghazali Sulong,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;CP 061223 ra<br/>Publication Date&#160;2015<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafik dan Multimedia)) - Universiti Teknologi Malaysia, 2015<br/> Image encryption : a communication perspective ent://SD_ILS/0/SD_ILS:828934 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Abd el-Samie, Fathi E.<br/>Author&#160;Abd el-Samie, Fathi E.,&#160;Ahmed, Hossam Eldin H., author,&#160;Elashry, Ibrahim F., author,&#160;Shahieen, Mai H., author,&#160;Faragallah, Osama S., author<br/>Format:&#160;Books<br/>Call Number&#160;TA1637 A23 2014<br/>Publisher&#160;CRC Press, Tayllor &amp; Francis Group,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466576988<br/> Multi-facial blurring using improved henon map ent://SD_ILS/0/SD_ILS:843374 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Muhammed Ahmed Saleh, 1983-<br/>Author&#160;Muhammed Ahmed Saleh, 1983-,&#160;Ghazali Sulong, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M845 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2014<br/> Multi-facial blurring using improved henon map ent://SD_ILS/0/SD_ILS:843637 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Muhammed Ahmed Saleh, 1983-<br/>Author&#160;Muhammed Ahmed Saleh, 1983-,&#160;Ghazali Sulong,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;CP 052050 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2014<br/> A robust image watermarking technique based on Cox 's DCT to against rotation attack ent://SD_ILS/0/SD_ILS:843868 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Seyed Mohamad Bagher Shafieinasab Langeroudi, 1982-<br/>Author&#160;Seyed Mohamad Bagher Shafieinasab Langeroudi, 1982-,&#160;Mazdak Zamani, Dr.,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S494 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> A robust image watermarking technique based on Cox 's DCT to against rotation attack ent://SD_ILS/0/SD_ILS:843869 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Seyed Mohamad Bagher Shafieinasab Langeroudi, 1982-<br/>Author&#160;Seyed Mohamad Bagher Shafieinasab Langeroudi, 1982-,&#160;Mazdak Zamani, Dr.,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034204 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> A new colour image steganography using LSB approach with halftoning determination embedding position ent://SD_ILS/0/SD_ILS:843983 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Reband Jamil Hassan, 1982- author<br/>Author&#160;Reband Jamil Hassan, 1982- author,&#160;Ghazali Sulong,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R434 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2014<br/> A new colour image steganography using LSB approach with halftoning determination embedding position ent://SD_ILS/0/SD_ILS:843988 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Reband Jamil Hassan, 1982- author<br/>Author&#160;Reband Jamil Hassan, 1982- author,&#160;Ghazali Sulong,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;CP 052326 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2014<br/> Databased encrytpion/decryption using AES/DES ent://SD_ILS/0/SD_ILS:844000 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Abdul Kadir Abukar Sufi, 1985- author<br/>Author&#160;Abdul Kadir Abukar Sufi, 1985- author,&#160;Ismail Fauzi Isnin, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A23 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Optimize perceptuality of digital image from encryption based on quadtree ent://SD_ILS/0/SD_ILS:844096 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Hussein A. Hussein, 1983- author<br/>Author&#160;Hussein A. Hussein, 1983- author,&#160;Dzulkifli Mohamed, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;CP 052393 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2014<br/> Introduction to computer and network security : navigating shades of gray ent://SD_ILS/0/SD_ILS:805289 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Brooks, Richard R.<br/>Author&#160;Brooks, Richard R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B76 2014<br/>Publisher&#160;Chapman and Hall/CRC,<br/>Publication Date&#160;2014&#160;2013<br/>ISBN&#160;9781439860717<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:821152 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S713 2014<br/>Edition&#160;6th ed.<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2014&#160;2011<br/>ISBN&#160;9780133354690<br/> Medical image encryption using PWLCM with digital singnature ent://SD_ILS/0/SD_ILS:825453 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Hazhar Mohammed Ahmed, 1982-<br/>Author&#160;Hazhar Mohammed Ahmed, 1982-,&#160;Subariah Ibrahim,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;TA1637 H39 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Medical image encryption using PWLCM with digital singnature ent://SD_ILS/0/SD_ILS:825481 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Hazhar Mohammed Ahmed, 1982-<br/>Author&#160;Hazhar Mohammed Ahmed, 1982-,&#160;Subariah Ibrahim<br/>Format:&#160;Books<br/>Call Number&#160;CP 050455 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> An index based searchable encryption scheme with IND-CCA security ent://SD_ILS/0/SD_ILS:825578 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Majid Nateghizad, 1986-<br/>Author&#160;Majid Nateghizad, 1986-,&#160;Mohd. Aizaini Maarof, supervisor,&#160;Majid Bakhtiari, Dr.,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA 76.9 .A25 M357 2014 raf c.1<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> An index based searchable encryption scheme with IND-CCA security ent://SD_ILS/0/SD_ILS:825673 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Majid Nateghizad, 1986-<br/>Author&#160;Majid Nateghizad, 1986-,&#160;Mohd. Aizaini Maarof, supervisor,&#160;Majid Bakhtiari, Dr.<br/>Format:&#160;Books<br/>Call Number&#160;CP 050732 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Optimize perceptuality of digital image from encryption based on quadtree ent://SD_ILS/0/SD_ILS:844095 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Hussein A. Hussein, 1983- author<br/>Author&#160;Hussein A. Hussein, 1983- author,&#160;Dzulkifli Mohamed, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H87 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2014<br/> A cryptography primer : secrets and promises ent://SD_ILS/0/SD_ILS:835848 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Klein, Philip N., author<br/>Author&#160;Klein, Philip N., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K545 2014<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781107017887<br/> Advanced encryption standard (AES) coproessor ent://SD_ILS/0/SD_ILS:846323 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Lim, Joo Song, 1970- author<br/>Author&#160;Lim, Joo Song, 1970- author,&#160;Mohamed Khalil Hani, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L56 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2014<br/> Flat role based access control and encryption scheme for database security ent://SD_ILS/0/SD_ILS:803476 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Al Farissi, 1985-<br/>Author&#160;Al Farissi, 1985-<br/>Format:&#160;Books<br/>Call Number&#160;CP 032498 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Enhancing the security of high payload image steganography using chaos ent://SD_ILS/0/SD_ILS:803748 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Rezza Moieni, 1979-<br/>Author&#160;Rezza Moieni, 1979-,&#160;Subariah Ibrahim,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 R49<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Enhancing the security of high payload image steganography using chaos ent://SD_ILS/0/SD_ILS:804148 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Rezza Moieni, 1979-<br/>Author&#160;Rezza Moieni, 1979-<br/>Format:&#160;Books<br/>Call Number&#160;CP 029976 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Grey scale image steganography using Exploiting Modification Direction (EMD) method ent://SD_ILS/0/SD_ILS:807540 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Tan, Mei Lian, 1989-, author<br/>Author&#160;Tan, Mei Lian, 1989-, author,&#160;Ghazali Sulong, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T368 2013 raf<br/>Publication Date&#160;2013&#160;2012<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafk Dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/> Grey scale image steganography using Exploiting Modification Direction (EMD) method ent://SD_ILS/0/SD_ILS:807541 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Tan, Mei Lian, 1989-, author<br/>Author&#160;Tan, Mei Lian, 1989-, author<br/>Format:&#160;Books<br/>Call Number&#160;CP 082475 ra<br/>Publication Date&#160;2013<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafk Dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/> Analysis of S-Box in Rijndael -Aes algorithm and formulation of enhanced S-Box ent://SD_ILS/0/SD_ILS:811619 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Gaithuru, Juliet Nyokabi, 1985-<br/>Author&#160;Gaithuru, Juliet Nyokabi, 1985-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031144 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Computational number theory and modern cryptography ent://SD_ILS/0/SD_ILS:821167 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Yan, Song Y.<br/>Author&#160;Yan, Song Y.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Y36 2013<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781118188583<br/> Flat role based access control and encryption scheme for database security ent://SD_ILS/0/SD_ILS:803475 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Al Farissi, 1985-<br/>Author&#160;Al Farissi, 1985-,&#160;Subariah Ibrahim,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 A44 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Cryptography : Infosec pro guide ent://SD_ILS/0/SD_ILS:807371 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Oriyano, Sean-Philip<br/>Author&#160;Oriyano, Sean-Philip<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 O75 2013<br/>Publisher&#160;McGraw-Hill Education,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780071794251<br/> Computational number theory ent://SD_ILS/0/SD_ILS:807457 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Das, Abhijit, 1968-<br/>Author&#160;Das, Abhijit, 1968-<br/>Format:&#160;Books<br/>Call Number&#160;QA241 D374 2013<br/>Publisher&#160;Chapman and Hall/CRC,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781439866153<br/> Efficiency key generation management in a big organization for symmetric cryptography system ent://SD_ILS/0/SD_ILS:811262 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Atefeh Mirzaee, 1986-<br/>Author&#160;Atefeh Mirzaee, 1986-,&#160;Majid Bakhtiari, Dr.,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A844 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Efficiency key generation management in a big organization for symmetric cryptography system ent://SD_ILS/0/SD_ILS:811264 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Atefeh Mirzaee, 1986-<br/>Author&#160;Atefeh Mirzaee, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 030847 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Analysis of S-Box in Rijndael -Aes algorithm and formulation of enhanced S-Box ent://SD_ILS/0/SD_ILS:811614 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Gaithuru, Juliet Nyokabi, 1985-<br/>Author&#160;Gaithuru, Juliet Nyokabi, 1985-,&#160;Majid Bakhtiari, Dr.,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G35 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Secure multi-party computation ent://SD_ILS/0/SD_ILS:813716 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Prabhakaran, Manoj, 1979-, editor<br/>Author&#160;Prabhakaran, Manoj, 1979-, editor,&#160;Sahai, Amit, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S43 2013<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781614991687<br/> Multimedia information hiding technologies and methodologies for controlling data ent://SD_ILS/0/SD_ILS:820074 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Kondo, Kazuhiro<br/>Author&#160;Kondo, Kazuhiro<br/>Format:&#160;Books<br/>Call Number&#160;QA76.575 M832 2013<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466622173<br/> New directions of modern cryptography ent://SD_ILS/0/SD_ILS:837292 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Cao, Zhenfu, author<br/>Author&#160;Cao, Zhenfu, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 C36 2013<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466501386<br/> Security and performance benchmarking of lightweight encryption algorithms for secure RFID systems ent://SD_ILS/0/SD_ILS:786427 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Mojtaba Ali Zadeh, 1983-<br/>Author&#160;Mojtaba Ali Zadeh, 1983-,&#160;Mazleena Salleh,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M65 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Security and performance benchmarking of lightweight encryption algorithms for secure RFID systems ent://SD_ILS/0/SD_ILS:786432 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Mojtaba Ali Zadeh, 1983-<br/>Author&#160;Mojtaba Ali Zadeh, 1983-,&#160;Mazleena Salleh<br/>Format:&#160;Books<br/>Call Number&#160;CP 027765 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Machine learning in image steganalysis ent://SD_ILS/0/SD_ILS:799819 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Schaathun, Hans Georg<br/>Author&#160;Schaathun, Hans Georg<br/>Format:&#160;Books<br/>Call Number&#160;Q325.5 S34 2012<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780470663059<br/> Encryption implementation enhancement of AES-CCMP in 802.11I ent://SD_ILS/0/SD_ILS:778401 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Iman Saberi, 1984-<br/>Author&#160;Iman Saberi, 1984-,&#160;Mazleena Salleh,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I434 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Encryption implementation enhancement of AES-CCMP in 802.11I ent://SD_ILS/0/SD_ILS:778405 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Iman Saberi, 1984-<br/>Author&#160;Iman Saberi, 1984-<br/>Format:&#160;Books<br/>Call Number&#160;CP 027521 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory ent://SD_ILS/0/SD_ILS:778667 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Nordiana Rahim, 1987-<br/>Author&#160;Nordiana Rahim, 1987-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N675 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory ent://SD_ILS/0/SD_ILS:778668 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Nordiana Rahim, 1987-<br/>Author&#160;Nordiana Rahim, 1987-<br/>Format:&#160;Books<br/>Call Number&#160;CP 027499 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Visual cryptography and secret image sharing ent://SD_ILS/0/SD_ILS:781192 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Cimato, Stelvio<br/>Author&#160;Cimato, Stelvio,&#160;Yang, Ching-Nung<br/>Format:&#160;Books<br/>Call Number&#160;TA1637 V57 2012<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781439837214<br/> Least significant bit image steganography using particle swarm optimization and optical pixel adjustment ent://SD_ILS/0/SD_ILS:790277 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Parisa Gerami, 1994-<br/>Author&#160;Parisa Gerami, 1994-,&#160;Subariah Ibrahim,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P37 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) &ndash; Universiti Teknologi Malaysia, 2012<br/> Performance analysis of steganography algorithms based for JPEG Images ent://SD_ILS/0/SD_ILS:790156 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Areej Abdulmalik Rosmmani, 1985-<br/>Author&#160;Areej Abdulmalik Rosmmani, 1985-,&#160;Subariah Ibrahim,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A744 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) &ndash; Universiti Teknologi Malaysia, 2012<br/> Performance analysis of steganography algorithms based for JPEG Images ent://SD_ILS/0/SD_ILS:790157 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Areej Abdulmalik Rosmmani, 1985-<br/>Author&#160;Areej Abdulmalik Rosmmani, 1985-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028331 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) &ndash; Universiti Teknologi Malaysia, 2012<br/> Enhancing statistical properties of chaos based image encryption using PWLCM ent://SD_ILS/0/SD_ILS:790161 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Leyla Roohi, 1977-<br/>Author&#160;Leyla Roohi, 1977-,&#160;Subariah Ibrahim,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TA1637 L49 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Enhancing statistical properties of chaos based image encryption using PWLCM ent://SD_ILS/0/SD_ILS:790162 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Leyla Roohi, 1977-<br/>Author&#160;Leyla Roohi, 1977-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028302 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Least significant bit image steganography using particle swarm optimization and optical pixel adjustment ent://SD_ILS/0/SD_ILS:790280 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Parisa Gerami, 1994-<br/>Author&#160;Parisa Gerami, 1994-<br/>Format:&#160;Books<br/>Call Number&#160;CP 027550 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) &ndash; Universiti Teknologi Malaysia, 2012<br/> A2-Tier data hiding technique using an improved exploiting modification direction method and huffman coding ent://SD_ILS/0/SD_ILS:793238 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Ali M-Ahmad, 1980-<br/>Author&#160;Ali M-Ahmad, 1980-,&#160;Ghazali Sulong,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A456 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> A2-Tier data hiding technique using an improved exploiting modification direction method and huffman coding ent://SD_ILS/0/SD_ILS:793241 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Ali M-Ahmad, 1980-<br/>Author&#160;Ali M-Ahmad, 1980-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028758 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Image steganography using least significant bit approach enhanced with compression and encryption ent://SD_ILS/0/SD_ILS:793264 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Morteza Bashardoost, 1983-<br/>Author&#160;Morteza Bashardoost, 1983-,&#160;Ghazali Sulong,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M67 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Image steganography using least significant bit approach enhanced with compression and encryption ent://SD_ILS/0/SD_ILS:793265 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Morteza Bashardoost, 1983-<br/>Author&#160;Morteza Bashardoost, 1983-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028728 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Burdens of proof : cryptographic culture and evidence law in the age of electronic documents ent://SD_ILS/0/SD_ILS:796490 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Blanchette, Jean-Fran&ccedil;ois<br/>Author&#160;Blanchette, Jean-Fran&ccedil;ois<br/>Format:&#160;Books<br/>Call Number&#160;K2269.5 B53 2012<br/>Publisher&#160;MIT Press,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780262017510<br/> Applied cryptography for cyber security and defense : information encryption and cyphering ent://SD_ILS/0/SD_ILS:630304 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Nemati, Hamid R., 1958-<br/>Author&#160;Nemati, Hamid R., 1958-,&#160;Yang, Li, 1974 Oct. 29-<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 A67 2011 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781615207831&#160;9781615207848<br/> Chaos synchronization and cryptography for secure communications : applications for encryption ent://SD_ILS/0/SD_ILS:630454 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Banerjee, Santo, 1976-<br/>Author&#160;Banerjee, Santo, 1976-<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 C43 2011 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781615207374&#160;9781615207381<br/> Enhanced SVD watermarking algorithms ent://SD_ILS/0/SD_ILS:756607 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Iman Omidvar Tehrani<br/>Author&#160;Iman Omidvar Tehrani,&#160;Subariah Ibrahim,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I43 2011 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2011<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/> Enhanced SVD watermarking algorithms ent://SD_ILS/0/SD_ILS:756608 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Iman Omidvar Tehrani<br/>Author&#160;Iman Omidvar Tehrani,&#160;Subariah Ibrahim,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 025519 ra<br/>Publication Date&#160;2011<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/> Information security, coding theory and related combinatorics : information coding and combinatorics ent://SD_ILS/0/SD_ILS:772761 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Proceeding of the NATO Advanced Study Institute &quot;Information Security and Related Combinatorics&quot; (2010 : Opatija, Croatia)<br/>Author&#160;Proceeding of the NATO Advanced Study Institute &quot;Information Security and Related Combinatorics&quot; (2010 : Opatija, Croatia),&#160;Crnkovic, Dean,&#160;Tonchev, Vladimir<br/>Format:&#160;Books<br/>Call Number&#160;QA404.7 P76 2010<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781607506621&#160;9781607506638<br/> Introduction to cryptography with mathematical foundations and computer implementations ent://SD_ILS/0/SD_ILS:756667 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Stanoyevitch, Alexander.<br/>Author&#160;Stanoyevitch, Alexander.<br/>Format:&#160;Books<br/>Call Number&#160;QA268 S73 2011<br/>Publisher&#160;Chapman &amp; Hall/CRC,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781439817636<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:758256 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S713 2011<br/>Edition&#160;5th ed.<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780136097044<br/> Introduction to cryptography with open-source software ent://SD_ILS/0/SD_ILS:789125 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;McAndrew, Alasdair<br/>Author&#160;McAndrew, Alasdair<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 .A25 M398 2011<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781439825709<br/> Analysis and detection of P2P botnet based on node behaviour ent://SD_ILS/0/SD_ILS:835995 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Mohammad Reza Rostami<br/>Author&#160;Mohammad Reza Rostami,&#160;Bharanidharan Shanmugam, Dr.,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M6436 2011 raf<br/>Publication Date&#160;2011<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2011<br/> Detecting plaintext recovery attack in secure shell (SSH) ent://SD_ILS/0/SD_ILS:604110 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Zaid Mujaiyid Putra Ahmad Baidowi, 1980-<br/>Author&#160;Zaid Mujaiyid Putra Ahmad Baidowi, 1980-<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 025106 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Komputer Sains-Keselamaatn maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Hashing in computer science : fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:639636 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Konheim, Alan G., 1934-<br/>Author&#160;Konheim, Alan G., 1934-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.H36 K65 2010<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780470344736<br/> Relation based access control ent://SD_ILS/0/SD_ILS:637823 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Zhang, Rui<br/>Author&#160;Zhang, Rui<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z43 2010<br/>Publisher&#160;IOS Pr.,<br/>Publication Date&#160;2010<br/>ISBN&#160;9783898386265<br/> Understanding cryptography : a textbook for students and practitioners ent://SD_ILS/0/SD_ILS:819249 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Paar, Christof, 1963-<br/>Author&#160;Paar, Christof, 1963-,&#160;Pelzl, Jan<br/>Format:&#160;Books<br/>Call Number&#160;Z104 P33 2010<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2010<br/>ISBN&#160;9783642041006<br/> 2D barcode application in authenticating genuine goods product through a mobile device ent://SD_ILS/0/SD_ILS:759265 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Asvhini Subramaniam, 1985-<br/>Author&#160;Asvhini Subramaniam, 1985-,&#160;Mazleena Salleh,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A884 2010 raf<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Sistem pengesanan penumpang kapal terbang melalui tiket menggunakan teknologi RFID dan SMS ent://SD_ILS/0/SD_ILS:759402 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Azzaharul Hamdi Abdul Aziz<br/>Author&#160;Azzaharul Hamdi Abdul Aziz,&#160;Subariah Ibrahim,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A99 2010 raf<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Broadband quantum cryptography ent://SD_ILS/0/SD_ILS:764760 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Rogers, Daniel J.<br/>Author&#160;Rogers, Daniel J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R64 2010<br/>Publisher&#160;Morgan &amp; Claypool Publishers,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781608450596<br/> Genetic based substitution techniques for audio steganography ent://SD_ILS/0/SD_ILS:756192 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Mazdak Zamani, 1979-<br/>Author&#160;Mazdak Zamani, 1979-,&#160;Azizah Abdul Manaf,&#160;Rabiah Ahmad, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M396 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Genetic based substitution techniques for audio steganography ent://SD_ILS/0/SD_ILS:756194 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Mazdak Zamani, 1979-<br/>Author&#160;Mazdak Zamani, 1979-<br/>Format:&#160;Books<br/>Call Number&#160;CP 021720 ra<br/>Publication Date&#160;2010<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Steganography in digital media : principles, algorithms, and applications ent://SD_ILS/0/SD_ILS:758326 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Fridrich, Jessica<br/>Author&#160;Fridrich, Jessica<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F75 2010<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780521190190<br/> 2D barcode application in authenticating genuine goods product through a mobile device ent://SD_ILS/0/SD_ILS:759268 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Asvhini Subramaniam, 1985-<br/>Author&#160;Asvhini Subramaniam, 1985-<br/>Format:&#160;Books<br/>Call Number&#160;CP 024821 ra<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Sistem pengesanan penumpang kapal terbang melalui tiket menggunakan teknologi RFID dan SMS ent://SD_ILS/0/SD_ILS:759406 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Azzaharul Hamdi Abdul Aziz<br/>Author&#160;Azzaharul Hamdi Abdul Aziz<br/>Format:&#160;Books<br/>Call Number&#160;CP 024809 ra<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Preventing web defacement using encryption technique ent://SD_ILS/0/SD_ILS:760291 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Mazuin Nihar Noor Ali, 1987-<br/>Author&#160;Mazuin Nihar Noor Ali, 1987-,&#160;Mazleena Salleh,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M397 2010 raf<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Sains (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Preventing web defacement using encryption technique ent://SD_ILS/0/SD_ILS:760292 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Mazuin Nihar Noor Ali, 1987-<br/>Author&#160;Mazuin Nihar Noor Ali, 1987-<br/>Format:&#160;Books<br/>Call Number&#160;CP 026487 ra<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Sains (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/> DIGITAL IMAGE WATERMARKING SYSTEM FOR CHECK IMAGE AUTHENTICITY BASED-ON DWT TECHNIQUES ent://SD_ILS/0/SD_ILS:836176 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Abdalrahman Salem Alfagi, 1977-, author<br/>Author&#160;Abdalrahman Salem Alfagi, 1977-, author,&#160;Azizah Abd. Manaf, Prof.Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034122 ra<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2010<br/>Thesis (Sarjana) - Universiti Teknologi Malaysia, 2010<br/> Detecting plaintext recovery attack in secure shell (SSH) ent://SD_ILS/0/SD_ILS:396717 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Zaid Mujaiyid Putra Ahmad Baidowi, 1980-<br/>Author&#160;Zaid Mujaiyid Putra Ahmad Baidowi, 1980-,&#160;Shukor Abd. Razak, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z35 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> The robust steganography technique based on location look-up table (LLUT) ent://SD_ILS/0/SD_ILS:839756 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Abdulrashid Abba Ali<br/>Author&#160;Abdulrashid Abba Ali,&#160;Azizah Abdul Manaf,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A238 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> A secure and enhanced high embeding capacity steganography based on pixel indicator algorithm ent://SD_ILS/0/SD_ILS:601099 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Fouziah Saleh Abdullah Aleidan, 1983-<br/>Author&#160;Fouziah Saleh Abdullah Aleidan, 1983-<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 027139 ra<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> Next generation SSH2 implementation : securing data in motion ent://SD_ILS/0/SD_ILS:282024 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Liu, Dale<br/>Author&#160;Liu, Dale<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L58 2009<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781597492836<br/> Security of information and communication networks ent://SD_ILS/0/SD_ILS:282111 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Kartalopoulos, Stamatios V.<br/>Author&#160;Kartalopoulos, Stamatios V.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K37 2009<br/>Publisher&#160;Wiley-IEEE Press,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780470290255<br/> Multimedia forensics and security ent://SD_ILS/0/SD_ILS:282855 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Li, Chang-Tsun<br/>Author&#160;Li, Chang-Tsun<br/>Format:&#160;Books<br/>Call Number&#160;QA76.575 M94 2009<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781599048697<br/> Cryptographic engineering ent://SD_ILS/0/SD_ILS:292415 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Koc, Cetin Kaya<br/>Author&#160;Koc, Cetin Kaya<br/>Format:&#160;Books<br/>Call Number&#160;TK7895.E42 C79 2009<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780387718163<br/> A secure and enhanced high embeding capacity steganography based on pixel indicator algorithm ent://SD_ILS/0/SD_ILS:371793 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Fouziah Saleh Abdullah Aleidan, 1983-<br/>Author&#160;Fouziah Saleh Abdullah Aleidan, 1983-,&#160;Azizah Abdul Manaf,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F68 2009 raf<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> Multimedia content encryption : techniques and applications ent://SD_ILS/0/SD_ILS:328182 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Lian, Shiguo<br/>Author&#160;Lian, Shiguo<br/>Format:&#160;Books<br/>Call Number&#160;QA76.575 L52 2009<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781420065275<br/> Identity-based cryptography ent://SD_ILS/0/SD_ILS:334981 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Joye, Marc, 1969-<br/>Author&#160;Joye, Marc, 1969-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I33 2009<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781586039479<br/> Introduction to identity-based encryption ent://SD_ILS/0/SD_ILS:232288 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Martin, Luther<br/>Author&#160;Martin, Luther<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M377 2008<br/>Publisher&#160;Artech House Publishers,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781596932388<br/> Comprehensive possible attacks on RSA ent://SD_ILS/0/SD_ILS:588292 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Majid Bakhtiari, 1961-<br/>Author&#160;Majid Bakhtiari, 1961-,&#160;Rabiah Ahmad, supervisor,&#160;Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 016838<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2008&#160;20<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/> Modern cryptanalysis : techniques for advanced code breaking ent://SD_ILS/0/SD_ILS:287325 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Swenson, Christopher<br/>Author&#160;Swenson, Christopher<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S932 2008<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470135938<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:353804 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Kahate, Atul<br/>Author&#160;Kahate, Atul<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K33 2008<br/>Edition&#160;2nd ed.,<br/>Publisher&#160;Tata McGraw-Hill,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780070648234<br/> Quantum bits and quantum secrets : how quantum physics is revolutionizing codes and computers ent://SD_ILS/0/SD_ILS:330155 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Morsch, Oliver<br/>Author&#160;Morsch, Oliver<br/>Format:&#160;Books<br/>Call Number&#160;QA76.889 M67 2008<br/>Publisher&#160;Wiley-VCH,<br/>Publication Date&#160;2008<br/>ISBN&#160;9783527407101<br/> Comprehensive possible attacks on RSA ent://SD_ILS/0/SD_ILS:306904 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Majid Bakhtiari, 1961-<br/>Author&#160;Majid Bakhtiari, 1961-,&#160;Rabiah Ahmad, supervisor,&#160;Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M23 2008 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2008<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/> Securing information and communications systems : principles, technologies, and applications ent://SD_ILS/0/SD_ILS:263795 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Furnell, Steven M.<br/>Author&#160;Furnell, Steven M.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S4244 2008<br/>Publisher&#160;Artech House Publishers,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781596932289<br/> Cryptanalytic attacks on RSA ent://SD_ILS/0/SD_ILS:264016 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Yan, Song Y.<br/>Author&#160;Yan, Song Y.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Y36 2008<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780387487410<br/> Encryption and decryption for JPEG - Lossless, targa &amp; bitmap image file format using blowfish &amp; SEF algorithm ent://SD_ILS/0/SD_ILS:196102 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Then, Siaw Cheik<br/>Author&#160;Then, Siaw Cheik,&#160;Samura Ali, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 T44 2007 raf<br/>Publication Date&#160;2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2007<br/> Intelligent multimedia data hiding : new directions ent://SD_ILS/0/SD_ILS:196806 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Pan, Jeng-Shyang<br/>Author&#160;Pan, Jeng-Shyang<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I578 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540711681<br/><a href="http://dx.doi.org/10.1007/978-3-540-71169-8">Fulltext</a><br/> Subkey generation method for symmetric - key block cryptogaphy using a chaotic map ent://SD_ILS/0/SD_ILS:203771 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Niki Anis Ab. Karim<br/>Author&#160;Niki Anis Ab. Karim<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.P76 N54 2007<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2007<br/>Project Paper (Sarjana Muda Sains (Matematik)) - Universiti Teknologi Malaysia, 2007<br/> Applied cryptanalysis : breaking ciphers in the real world ent://SD_ILS/0/SD_ILS:155893 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Stamp, Mark<br/>Author&#160;Stamp, Mark,&#160;Low, Richard M., 1967-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S68 2007<br/>Publisher&#160;Wiley-IEEE Press,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780470114865<br/> Multi - choices image encryption and decryption system ent://SD_ILS/0/SD_ILS:185101 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Ng, Pei Ling<br/>Author&#160;Ng, Pei Ling,&#160;Samura Ali, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.9 N475 2007 raf<br/>Publication Date&#160;2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2007<br/> A customizable cryptographic service provider for an embedded cryptohardware system ent://SD_ILS/0/SD_ILS:142096 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Illiasaak Ahmad<br/>Author&#160;Illiasaak Ahmad<br/>Format:&#160;Books<br/>Call Number&#160;TK7895.E42 I44 2007<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2007<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2007<br/> Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings ent://SD_ILS/0/SD_ILS:517885 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;ACNS 2007 (2007 : Zhuhai, China)<br/>Author&#160;ACNS 2007 (2007 : Zhuhai, China),&#160;Katz, Jonathan,&#160;Yung, Moti,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001015<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540727385&#160;9783540727378<br/><a href="http://dx.doi.org/10.1007/978-3-540-72738-5">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Foundations of Security What Every Programmer Needs to Know ent://SD_ILS/0/SD_ILS:518033 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Daswani, Neil<br/>Author&#160;Daswani, Neil,&#160;Kern, Christoph,&#160;Kesavan, Anita,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000669<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781430203773&#160;9781590597842<br/><a href="http://dx.doi.org/10.1007/978-1-4302-0377-3">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Multi - choices image encryption and decryption system ent://SD_ILS/0/SD_ILS:574565 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Ng, Pei Ling<br/>Author&#160;Ng, Pei Ling,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;CP 018644 ra<br/>Publication Date&#160;2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2007<br/> Encryption and decryption for JPEG - Lossless, targa &amp; bitmap image file format using blowfish &amp; SEF algorithm ent://SD_ILS/0/SD_ILS:576509 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Then, Siaw Cheik<br/>Author&#160;Then, Siaw Cheik,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;CP 018975 ra<br/>Publication Date&#160;2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2007<br/> Subkey generation method for symmetric - key block cryptogaphy using a chaotic map ent://SD_ILS/0/SD_ILS:577848 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Niki Anis Ab. Karim<br/>Author&#160;Niki Anis Ab. Karim<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 013744<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2007<br/>Project Paper (Sarjana Muda Sains (Matematik)) - Universiti Teknologi Malaysia, 2007<br/> Intelligent multimedia data hiding new directions ent://SD_ILS/0/SD_ILS:579931 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Pan, Jeng-Shyang<br/>Author&#160;Pan, Jeng-Shyang<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 11487<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540711681<br/> A customizable cryptographic service provider for an embedded cryptohardware system ent://SD_ILS/0/SD_ILS:566821 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Illiasaak Ahmad<br/>Author&#160;Illiasaak Ahmad<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 013421<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2007<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2007<br/> Encryption/decryption of heart sound signal for telemedicine application ent://SD_ILS/0/SD_ILS:598083 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Chua, Aun Geong<br/>Author&#160;Chua, Aun Geong,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;CP 019064 ra<br/>Publication Date&#160;2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Komputer)) - Universiti Teknologi Malaysia, 2007<br/> Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007: Proceedings ent://SD_ILS/0/SD_ILS:625630 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;European PKI Workshop (4th : 2007 : Palma de Mallorca, Spain)<br/>Author&#160;European PKI Workshop (4th : 2007 : Palma de Mallorca, Spain),&#160;Lopez, Javier,&#160;Ferrer, Josep L.,&#160;Samarati, Pierangela,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001274<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540734086<br/><a href="http://dx.doi.org/10.1007/978-3-540-73408-6">http://dx.doi.org/10.1007/978-3-540-73408-6</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:626065 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;SAC 2006 (2006 : Montreal, Quebec)<br/>Author&#160;SAC 2006 (2006 : Montreal, Quebec),&#160;Biham, Eli,&#160;Youssef, Amr M.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001320<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540744627<br/><a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Fast Software Encryption 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:626378 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;FSE 2007 (2007 : Luxembourg, Luxembourg)<br/>Author&#160;FSE 2007 (2007 : Luxembourg, Luxembourg),&#160;Biryukov, Alex,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001333<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540746195<br/><a href="http://dx.doi.org/10.1007/978-3-540-74619-5">http://dx.doi.org/10.1007/978-3-540-74619-5</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Economics of identity theft: avoidance, causes and possible cures ent://SD_ILS/0/SD_ILS:515571 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Camp, L. Jean<br/>Author&#160;Camp, L. Jean,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000637<br/>Publisher&#160;Springer Science+Business Media, LLC,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387686141&#160;9780387345895<br/><a href="http://dx.doi.org/10.1007/978-0-387-68614-1">Full Text</a><br/>Accessible within UTM campus<br/> Encryption/decryption of heart sound signal for telemedicine application ent://SD_ILS/0/SD_ILS:362856 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Chua, Aun Geong<br/>Author&#160;Chua, Aun Geong,&#160;Sheikh Hussain Shaikh Salleh, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C48 2007 raf<br/>Publication Date&#160;2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Komputer)) - Universiti Teknologi Malaysia, 2007<br/> Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting ent://SD_ILS/0/SD_ILS:262089 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Tuyls, Pim<br/>Author&#160;Tuyls, Pim,&#160;Skoric, Boris,&#160;Kevenaar, Thomas Andreas Maria, 1961-<br/>Format:&#160;Books<br/>Call Number&#160;TK7867.5 S42 2007<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781846289835<br/> Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, revised selected papers ent://SD_ILS/0/SD_ILS:282943 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Adams, Carlisle 1961-<br/>Author&#160;Adams, Carlisle 1961-,&#160;Miri, Ali,&#160;Wiener, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S45 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540773597<br/> Cryptography and security services : mechanisms and applications ent://SD_ILS/0/SD_ILS:285326 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Mogollon, Manuel<br/>Author&#160;Mogollon, Manuel<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M634 2007<br/>Publisher&#160;CyberTech Publishing,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781599048376<br/> Encryption application on mobile phone ent://SD_ILS/0/SD_ILS:308330 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Ong, Wai Yip<br/>Author&#160;Ong, Wai Yip,&#160;Samura Ali, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 O55 2007 raf<br/>Publication Date&#160;2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2007<br/> Multimedia encryption and authentication techniques and applications ent://SD_ILS/0/SD_ILS:103958 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Furht, Borko<br/>Author&#160;Furht, Borko,&#160;Kirovski, Darko<br/>Format:&#160;Books<br/>Call Number&#160;QA76.575 M83185 2006<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780849372124<br/> Cryptography and network security : principles and practices ent://SD_ILS/0/SD_ILS:109602 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S713 2006<br/>Edition&#160;4th. ed.<br/>Publisher&#160;Pearson,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780131873162<br/> Data protection using advanced encryption standard (AES) ent://SD_ILS/0/SD_ILS:109917 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Siti Dhalia Adzim Muhamod Adzim<br/>Author&#160;Siti Dhalia Adzim Muhamod Adzim<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S34 2006<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2006<br/> Design and implementation of the advanced encryption standard (AES) using field programmable gate arrays (FPGA) ent://SD_ILS/0/SD_ILS:111816 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Syaiful Anuar Zakaria<br/>Author&#160;Syaiful Anuar Zakaria<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S94 2006<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2006<br/> e-secure file transfer system (based on secure examination paper preparation case study ) ent://SD_ILS/0/SD_ILS:111961 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Yee, Thee Gee<br/>Author&#160;Yee, Thee Gee<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Y43 2006<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Komputer)) - Universiti Teknologi Malaysia, 2006<br/> Algebraic aspects of the Advanced Encryption Standard ent://SD_ILS/0/SD_ILS:157837 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Cid, Carlos<br/>Author&#160;Cid, Carlos,&#160;Murphy, Sean,&#160;Robshaw, Matthew<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C52 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387243634<br/> Multivariate public key cryptosystems ent://SD_ILS/0/SD_ILS:158164 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Ding, Jintai<br/>Author&#160;Ding, Jintai,&#160;Gower, Jason E.,&#160;Schmidt, Dieter S.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D56 2006<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387322292<br/> Trusted platform module basics : using TPM in embedded systems ent://SD_ILS/0/SD_ILS:161027 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Kinney, Steven<br/>Author&#160;Kinney, Steven<br/>Format:&#160;Books<br/>Call Number&#160;TK7895.E42 K56 2006<br/>Publisher&#160;Newnes,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780750679602&#160;9780750679527<br/> CryptoGraphics : exploiting graphics cards for security ent://SD_ILS/0/SD_ILS:187559 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Cook, Debra L.<br/>Author&#160;Cook, Debra L.,&#160;Keromytis, Angelos<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 C66 2006<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387290157<br/> Quantum cryptography and secret-key distillation ent://SD_ILS/0/SD_ILS:134938 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Van Assche, Gilles<br/>Author&#160;Van Assche, Gilles<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V36 2006<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780521864855<br/> Encryption using Triple DES, new DES and DES-X algorithm ent://SD_ILS/0/SD_ILS:126603 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Thilakan Krishanansamy<br/>Author&#160;Thilakan Krishanansamy<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T74 2006<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Elektronik)) - Universiti Teknologi Malaysia, 2006<br/> A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems ent://SD_ILS/0/SD_ILS:617573 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Arul Paniandi<br/>Author&#160;Arul Paniandi<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 11872<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2006<br/> A classical introduction to cryptography exercise book ent://SD_ILS/0/SD_ILS:515412 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Baigeneres, Thomas<br/>Author&#160;Baigeneres, Thomas,&#160;Junod, Pascal,&#160;Lu, Yi,&#160;Monnerat, Jean,&#160;Vaudenay, Serge<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000051<br/>Publisher&#160;Springer Science+Business Media, Inc.<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387288352<br/><a href="http://dx.doi.org/10.1007/0-387-28835-X">Full Text</a><br/>Accessible within UTM campus<br/> Trusted platform module basics using TPM in embedded systems ent://SD_ILS/0/SD_ILS:570930 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Kinney, Steven<br/>Author&#160;Kinney, Steven<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 8937<br/>Publisher&#160;Newnes,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780750679602&#160;9780750679527<br/> A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems ent://SD_ILS/0/SD_ILS:470096 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Arul Paniandi<br/>Author&#160;Arul Paniandi<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A78 2006<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=46297">Preview</a><br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2006<br/> Hybrid encryption technology : a performance analysis ent://SD_ILS/0/SD_ILS:471649 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Shakirah Abdul Karim<br/>Author&#160;Shakirah Abdul Karim<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S324 2006 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2006<br/> Authentification codes and combinatorial designs ent://SD_ILS/0/SD_ILS:143222 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Pei, Dingyi<br/>Author&#160;Pei, Dingyi<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P446 2006<br/>Publisher&#160;Chapman &amp; Hall/CRC,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781584864738&#160;9781584884736<br/> Concurrent zero knowledge ent://SD_ILS/0/SD_ILS:94672 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Rosen, Alon<br/>Author&#160;Rosen, Alon,&#160;Goldreich, Oded<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R674 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9783540329381<br/> Quantum communications and cryptography ent://SD_ILS/0/SD_ILS:490877 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Sergienko, Alexander V.<br/>Author&#160;Sergienko, Alexander V.<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 Q36 2005<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780849336843<br/> Codes : the guide to secrecy from ancient to modern times ent://SD_ILS/0/SD_ILS:153951 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Mollin, Richard A., 1947-<br/>Author&#160;Mollin, Richard A., 1947-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M64 2005<br/>Publisher&#160;Chapman &amp; Hall/CRC,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781584884705<br/> Proceedings of first international conference on cryptology in Malaysia : progress in cryptology :Mycrypt 2005, September 28-30, 2005, Kuala Lumpur, Malaysia ent://SD_ILS/0/SD_ILS:845847 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;International Conference on Cryptology in Malaysia (1st : 2005 : Kuala Lumpur, Malaysia)<br/>Author&#160;International Conference on Cryptology in Malaysia (1st : 2005 : Kuala Lumpur, Malaysia),&#160;Dawson, Ed (Edward) editor,&#160;Vaudenay, Serge, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I554 2005<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2005<br/>ISBN&#160;9783540289388<br/>Restricted to SpringerLink subscribers <a href=" http://www.loc.gov/catdir/enhancements/fy0663/2005932807-d.html"> http://www.loc.gov/catdir/enhancements/fy0663/2005932807-d.html</a> <a href=" http://www.loc.gov/catdir/enhancements/fy1401/2005932807-t.html"> http://www.loc.gov/catdir/enhancements/fy1401/2005932807-t.html</a><br/> An embedded cryptossystem implementing symmetric cipher and public-key crypto algorithms in hardware ent://SD_ILS/0/SD_ILS:610869 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Hau, Yuan Wen, 1980-<br/>Author&#160;Hau, Yuan Wen, 1980-<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 10721<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2005<br/> An embedded cryptossystem implementing symmetric cipher and public-key crypto algorithms in hardware ent://SD_ILS/0/SD_ILS:440634 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Hau, Yuan Wen, 1980-<br/>Author&#160;Hau, Yuan Wen, 1980-<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 H38 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=41359">Preview</a><br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2005<br/> Estimations on the security aspect of brand's electronic cash scheme ent://SD_ILS/0/SD_ILS:401697 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Chang, Yu Cheng<br/>Author&#160;Chang, Yu Cheng,&#160;Jasmy Yunus,&#160;Kamaruzzaman Seman,&#160;The IEE International Conference on Advanced Information Networking and Applications (19th : 2005 : Taiwan)<br/>Format:&#160;Books<br/>Call Number&#160;HG1710 C425 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/> Brute force : cracking the data encryption standard ent://SD_ILS/0/SD_ILS:271624 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Curtin, Matt<br/>Author&#160;Curtin, Matt<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C88 2005<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780387201092<br/> Information hiding : 7th international workshop, IH 2005, Barcelona, Spain, June 6-8, 2005 : revised selected papers ent://SD_ILS/0/SD_ILS:143331 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;IH 2005 ( 2005 : Barcelona, Spain)<br/>Author&#160;IH 2005 ( 2005 : Barcelona, Spain),&#160;Barni, Mauro<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I534 2005<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2005<br/>ISBN&#160;9783540290391<br/> Synchronizing e-security ent://SD_ILS/0/SD_ILS:370217 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Williams, Godfried<br/>Author&#160;Williams, Godfried<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 W54 2004<br/>Publisher&#160;Kluwer Academic Pubs,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781402076466<br/> Secure E-mail system with cryptography using microsoft visual C# and pretty good privacy (PGP) ent://SD_ILS/0/SD_ILS:379409 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Chee, Wing Fai<br/>Author&#160;Chee, Wing Fai<br/>Format:&#160;Books<br/>Call Number&#160;HE6239.E54 C43 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2004<br/> RSA Securitys official guide to cryptography ent://SD_ILS/0/SD_ILS:615019 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Burnett, Steve<br/>Author&#160;Burnett, Steve,&#160;Paine, Stephen,&#160;RSA Security<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 6691<br/>Publisher&#160;McGraw-Hill/Osborne,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780072254969<br/> Secure E-mail system with cryptography using microsoft visual C# and pretty good privacy (PGP) ent://SD_ILS/0/SD_ILS:602023 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Chee, Wing Fai<br/>Author&#160;Chee, Wing Fai<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 013139<br/>Publisher&#160;Universiti Teknology Malaysia,<br/>Publication Date&#160;2004<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2004<br/> RSA Securitys official guide to cryptography ent://SD_ILS/0/SD_ILS:437144 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Burnett, Steve<br/>Author&#160;Burnett, Steve,&#160;Paine, Stephen,&#160;RSA Security<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B87 2004<br/>Publisher&#160;McGraw-Hill/Osborne,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780072254952<br/> Data hiding fundamentals and applications : content security in digital media ent://SD_ILS/0/SD_ILS:397447 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Sencar, Husrev T.<br/>Author&#160;Sencar, Husrev T.,&#160;Ramkumar, Mahalingam,&#160;Akansu, Ali N., 1958-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.575 S46 2004<br/>Publisher&#160;Elsevier Academic Press,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780120471447<br/> Outsourcing information security ent://SD_ILS/0/SD_ILS:425362 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Axelrod, C. Warren<br/>Author&#160;Axelrod, C. Warren<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A93 2004<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781580535311<br/> Implementing SSH : strategies for optimizing the Secure Shell ent://SD_ILS/0/SD_ILS:442338 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Dwivedi, Himanshu<br/>Author&#160;Dwivedi, Himanshu<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.O63 D844 2004<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780471458807<br/> Estimation on the security aspect of brand's electronic chas scheme ent://SD_ILS/0/SD_ILS:396536 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Chang, Yu Cheng<br/>Author&#160;Chang, Yu Cheng,&#160;Jasmy Yunus,&#160;Kamaruzzaman Seman,&#160;Australian Telecommunications Networks and Applications Conference (2004 : Sydney, Australia)<br/>Format:&#160;Books<br/>Call Number&#160;HG1710 C424 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/> Cryptography for dummies ent://SD_ILS/0/SD_ILS:399216 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Cobb, Chey<br/>Author&#160;Cobb, Chey<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 .M35 C37 2004<br/>Publisher&#160;Wiley Pubs,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780764541889<br/> Watermarking systems engineering : enabling digital assets security and other applications ent://SD_ILS/0/SD_ILS:418410 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Barni, Mauro<br/>Author&#160;Barni, Mauro,&#160;Bartolini, Franco, 1965-2004<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B37 2004<br/>Publisher&#160;Marcel Dekker,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780824748067<br/> Medium voltage (3.3-40.5kV, 630-2000A) switchgear testing laboratory ent://SD_ILS/0/SD_ILS:6965 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Denise Marie Westerhout<br/>Author&#160;Denise Marie Westerhout<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 13182<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2003<br/> Convolutional Codec IP core ent://SD_ILS/0/SD_ILS:6966 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Azlina Zainuddin<br/>Author&#160;Azlina Zainuddin<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 13039<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Kejuruteraan Elektrik (Komputer) - Universiti Teknologi Malaysia, 2003<br/> Secured messaging system ent://SD_ILS/0/SD_ILS:8166 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z Format:&#160;Visual Materials<br/>Call Number&#160;MFL 13177<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2003<br/> Video encryption in real time using secret key crytography ent://SD_ILS/0/SD_ILS:8274 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Pushpan, Anthony Devadason<br/>Author&#160;Pushpan, Anthony Devadason<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12887<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Sains komputer) - Universiti Teknologi Malaysia, 2003<br/> Digital design of the encryption hardware based on twofish algorithm ent://SD_ILS/0/SD_ILS:357116 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Firdaus Kamarudin<br/>Author&#160;Firdaus Kamarudin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F57 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Kejuruteraan Elektrik (Komputer)) - Universiti Teknologi Malaysia, 2003<br/> Secured messaging system ent://SD_ILS/0/SD_ILS:383042 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Abd. Rahim Mat Sidek<br/>Author&#160;Abd. Rahim Mat Sidek<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A72 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=58370">Full text</a><br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2003<br/> Hardware Implementation of RC6 algorithm using VHDL ent://SD_ILS/0/SD_ILS:603297 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Muniswaran Krishnan<br/>Author&#160;Muniswaran Krishnan<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 6604<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik Elektronik)) - Universiti Teknologi Malaysia, 2003<br/> Image encryption algorithm based on chaotic mapping ent://SD_ILS/0/SD_ILS:606228 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Mazleena Salleh<br/>Author&#160;Mazleena Salleh,&#160;Subariah Ibrahim,&#160;Ismail Fauzi Isnin<br/>Format:&#160;Computer file<br/>Publication Date&#160;2003<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?id=15503">Full text</a><br/> Secured messaging system ent://SD_ILS/0/SD_ILS:602453 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Abd. Rahim Mat Sidek<br/>Author&#160;Abd. Rahim Mat Sidek<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 5835<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2003<br/> System-on-chip architectures and implementations for private-key data encryption ent://SD_ILS/0/SD_ILS:409391 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;McLoone, Maire<br/>Author&#160;McLoone, Maire,&#160;McCanny, J. V.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M564 2003<br/>Publisher&#160;Kluwer Academic/Plenum Publishers,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780306478826<br/> Hardware implementation of RC6 algorithm using VHDL ent://SD_ILS/0/SD_ILS:388881 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Muniswaran Krishnan<br/>Author&#160;Muniswaran Krishnan<br/>Format:&#160;Books<br/>Call Number&#160;Z103 M86 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik Elektronik)) - Universiti Teknologi Malaysia, 2003<br/> Undang-undang siber Malaysia : (hingga 20hb. Disember 2003) ent://SD_ILS/0/SD_ILS:400951 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Lembaga Penyelidikan Undang-Undang<br/>Author&#160;Lembaga Penyelidikan Undang-Undang<br/>Format:&#160;Books<br/>Call Number&#160;KPG1066 U52 2003<br/>Publisher&#160;International Law Book Services,<br/>Publication Date&#160;2003<br/>ISBN&#160;9789678913287<br/> Financial cryptography : 6th International Conference, FC 2002 Southampton, Bermuda, March 11-14, 2002 : revised papers ent://SD_ILS/0/SD_ILS:397182 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;International conference Financial cryptography, (6th : 2002 : Southamton, Bermuda Islands)<br/>Author&#160;International conference Financial cryptography, (6th : 2002 : Southamton, Bermuda Islands),&#160;Blaze, Matt<br/>Format:&#160;Books<br/>Call Number&#160;HG1710 F56 2003<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2003<br/>ISBN&#160;9783540006466<br/> Multimedia data hiding ent://SD_ILS/0/SD_ILS:346358 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Wu, Min, 1974-<br/>Author&#160;Wu, Min, 1974-,&#160;Liu, Bede<br/>Format:&#160;Books<br/>Call Number&#160;QA76.575 W85 2003<br/>Publisher&#160;Springer Verlag,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780387954264<br/> Secure file transfer using twofish encryption ent://SD_ILS/0/SD_ILS:359360 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Mohd. Azlishah Othman<br/>Author&#160;Mohd. Azlishah Othman<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M394 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Bachelor of Electrical Engineering (Telecommunication)) - Universiti Teknologi Malaysia, 2003<br/> Internet security : cryptographic principles, algorithms, and protocols ent://SD_ILS/0/SD_ILS:340235 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Rhee, Man Young<br/>Author&#160;Rhee, Man Young<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 R44 2003<br/>Publisher&#160;J. Wiley,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780470852859<br/> Cryptography and network security : principles and practices ent://SD_ILS/0/SD_ILS:340240 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S713 2003<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780130914293<br/> Graphical password for symmetric encryption ent://SD_ILS/0/SD_ILS:344899 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Sagathevan Sundrarajoo<br/>Author&#160;Sagathevan Sundrarajoo<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S24 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:354853 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Kahate, Atul<br/>Author&#160;Kahate, Atul<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K33 2003<br/>Publisher&#160;Tata McGraw-Hill,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780070494831<br/> Secure E-voting with blind signature ent://SD_ILS/0/SD_ILS:327456 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Subariah Ibrahim<br/>Author&#160;Subariah Ibrahim,&#160;Maznah Kamat, 1960-,&#160;Mazleena Salleh,&#160;Shah Rizan Abdul Aziz,&#160;National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S424 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Simulation and analysis of six-phase power transmission fault ent://SD_ILS/0/SD_ILS:7169 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Goh, Alvin Shing Chye<br/>Author&#160;Goh, Alvin Shing Chye<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12802<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2003<br/> Virtual optical laboratory (transmission of signal through an optical fiber) ent://SD_ILS/0/SD_ILS:13509 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Ahmad Syihan Shoib<br/>Author&#160;Ahmad Syihan Shoib<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12321 ra<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Bachelor of Electrical Engineering (Telecommunication)) - Universiti Teknologi Malaysia, 2002<br/> Investigation on the performance of protective equipment under application of switching impulse and high voltage alternating current ent://SD_ILS/0/SD_ILS:21344 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Chitaram Shathasivam<br/>Author&#160;Chitaram Shathasivam<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12335<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2002<br/> Database encrytion schemes : a comparative study ent://SD_ILS/0/SD_ILS:351511 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.,&#160;Norbik Bashah Idris,&#160;Harihodin Selamat,&#160;Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z34 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Ciphering key of chaos image encryption ent://SD_ILS/0/SD_ILS:316141 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Mazleena Salleh<br/>Author&#160;Mazleena Salleh,&#160;Subariah Ibrahim,&#160;Ismail Fauzi Isnin,&#160;International Conference on Artificial Intelligence in Engineering and Technology (2002 : Universiti Malaysia Sabah, Kota Kinabalu)<br/>Format:&#160;Books<br/>Call Number&#160;TA1630 M39 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Digital certificate service using LDAP directory ent://SD_ILS/0/SD_ILS:322498 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Subariah Ibrahim<br/>Author&#160;Subariah Ibrahim,&#160;Son, Yeo Yiin,&#160;Mazleena Salleh,&#160;Lui, Yeok Peng,&#160;Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D53 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Virtual encryption driver using blowfish algorithm ent://SD_ILS/0/SD_ILS:321033 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Tay, Kwai Ping<br/>Author&#160;Tay, Kwai Ping<br/>Format:&#160;Books<br/>Call Number&#160;Z103 T39 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Bachelor of Electrical Engineering (Computer)) - Universiti Teknologi Malaysia, 2002<br/> Speed supervisory control via parallel port ent://SD_ILS/0/SD_ILS:7172 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Chan, Noel Zen Kim<br/>Author&#160;Chan, Noel Zen Kim<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12812<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2002<br/> Non-repudiation in electronic commerce ent://SD_ILS/0/SD_ILS:317073 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Zhou, Jianying<br/>Author&#160;Zhou, Jianying<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 Z49 2001<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2001<br/>ISBN&#160;9781580532471<br/> Electronic payment systems for e-commerce ent://SD_ILS/0/SD_ILS:317471 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;O'Mahony, Donal, 1961-<br/>Author&#160;O'Mahony, Donal, 1961-,&#160;Peirce, M. A. (Michael A.)<br/>Format:&#160;Books<br/>Call Number&#160;HG1710 O45 2001<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2001<br/>ISBN&#160;9781580532686<br/> Java application in Data Encryption Standard (DES) ent://SD_ILS/0/SD_ILS:146880 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Khaw, Guat Hoon<br/>Author&#160;Khaw, Guat Hoon<br/>Format:&#160;Books<br/>Call Number&#160;Z103 K32 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2000<br/> Implementation of pipelined data encryption standard (DES) using altera CPLD ent://SD_ILS/0/SD_ILS:135462 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Teo, Pock Chueng<br/>Author&#160;Teo, Pock Chueng,&#160;Zulkarnain Mohd. Yusof,&#160;Ahmad Zuri Sha'ameri,&#160;International Conference on Intelligent System (2000 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A43 T46 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/> A traceable proactive anonymous electronic cash ent://SD_ILS/0/SD_ILS:139538 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Chang, Yu Cheng<br/>Author&#160;Chang, Yu Cheng,&#160;Kamaruzzaman Seman,&#160;Jasmy Yunus,&#160;National Conference on Telecommunication Technology 2000 (2000 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 C42 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/> Design of new block and stream cipher encryption algorithms for data security ent://SD_ILS/0/SD_ILS:335752 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Tuan Sabri Tuan Mat @ Tuan Muhammad<br/>Author&#160;Tuan Sabri Tuan Mat @ Tuan Muhammad<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T72 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Thesis (Doctor of Philisophy) - Universiti Teknologi Malaysia, 2000<br/> Hard disk monitoring and data encryption on windows based terminal ent://SD_ILS/0/SD_ILS:116697 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Lee, Kong Aik<br/>Author&#160;Lee, Kong Aik<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 L43 1999 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/> Cryptronic mail ent://SD_ILS/0/SD_ILS:124235 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Lim, Poay Siak<br/>Author&#160;Lim, Poay Siak<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L55 1999<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/> Web pages/server for medical electronics : medical surgery and emergency ... [et al.] ent://SD_ILS/0/SD_ILS:13300 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Lee, Chai Hong<br/>Author&#160;Lee, Chai Hong,&#160;Lee, Kong Aik,&#160;Logeswari M. Shanmugam,&#160;Low, Ho Chit,&#160;Sivalingam R. Savassamy<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 9737<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/> Anonymous electronic commerce and micropayment ent://SD_ILS/0/SD_ILS:111808 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Chang, Yu Cheng<br/>Author&#160;Chang, Yu Cheng,&#160;Kamaruzzaman Seman,&#160;Jasmy Yunus<br/>Format:&#160;Books<br/>Call Number&#160;HG1710 C42<br/>Publisher&#160;Universiti Teknologi malaysia,<br/>Publication Date&#160;1999&#160;1998&#160;1997&#160;1996&#160;1995<br/> Field programmable gate array (FPGA) implementation of data encryption standard (DES) ent://SD_ILS/0/SD_ILS:123926 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Kong, Zhi Hui<br/>Author&#160;Kong, Zhi Hui<br/>Format:&#160;Books<br/>Call Number&#160;TK7895.G36 K66 1999<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/> Design of a new stream cipher algorithm ent://SD_ILS/0/SD_ILS:606336 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Tuan Sabri Tuan Mat<br/>Author&#160;Tuan Sabri Tuan Mat,&#160;Kamaruzzaman Seman<br/>Format:&#160;Computer file<br/>Publication Date&#160;1999<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?id=9699">Full text</a><br/> Windows based file encryption and decryption system ent://SD_ILS/0/SD_ILS:116725 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Ling, Hua Lay<br/>Author&#160;Ling, Hua Lay<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L56 1999 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologoi Malaysia, 1999<br/> Cryptography and network security : principles and practices ent://SD_ILS/0/SD_ILS:128747 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S713 1999<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;1999<br/>ISBN&#160;9780138690175&#160;9780139738197<br/> Active noise control system ... [et al.] ent://SD_ILS/0/SD_ILS:13307 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Lakshmi Venkatarama Subramaniam<br/>Author&#160;Lakshmi Venkatarama Subramaniam,&#160;Lee, Sen How,&#160;Ling, Hua Lay,&#160;Mat Nizam Ngathinee,&#160;Tan, Kok Kean<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 9763<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/> Creating and verifying digital certificate in local area network ent://SD_ILS/0/SD_ILS:113669 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Nazar El-Fadil Mohamed Adam Elgazoli<br/>Author&#160;Nazar El-Fadil Mohamed Adam Elgazoli<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N395 1997 raf<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1997<br/>Thesis (Master of Science (Computer Science)) - Universiti Teknologi Malaysia, 1997<br/> Client / server untuk sistem maklumat sekolah bersepadu menggunakan SQL ... [et al.] ent://SD_ILS/0/SD_ILS:7874 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Chandraseegar Krishnan<br/>Author&#160;Chandraseegar Krishnan,&#160;Liew, Chee Wah,&#160;Ong, Yean Hoon,&#160;Wan Raina Wan Yusoff,&#160;Yusniza Yusoff<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 9154 ra<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1997<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1988<br/> Digital cash : commerce on the net ent://SD_ILS/0/SD_ILS:468154 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Wayner, Peter<br/>Author&#160;Wayner, Peter<br/>Format:&#160;Books<br/>Call Number&#160;HG1710 W39 1997<br/>Edition&#160;2nd ed<br/>Publisher&#160;AP Professional,<br/>Publication Date&#160;1997<br/>ISBN&#160;9780127887722<br/> The electronic privacy papers : documents on the battle for privacy in the age of surveillance ent://SD_ILS/0/SD_ILS:481606 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Schneier, Bruce, 1963-<br/>Author&#160;Schneier, Bruce, 1963-,&#160;Banisar, David<br/>Format:&#160;Books<br/>Call Number&#160;JC596.2.U5 E44 1997<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;1997<br/>ISBN&#160;9780471122975<br/> Internet security for business ent://SD_ILS/0/SD_ILS:112376 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Bernstein, Terry<br/>Author&#160;Bernstein, Terry<br/>Format:&#160;Books<br/>Call Number&#160;HD30.38 I57 1996<br/>Publisher&#160;John Wiley,<br/>Publication Date&#160;1996<br/>ISBN&#160;9780471137528<br/> Design an expert system based on rocky for troubleshooting personal computer; VHDL modeling of input/output microprocessor device (UART); Development of a target searcher sensing and searching system; Data encryption using smart card for cryptographic key generation; Digital design automation using PSPICE and PROTEL; High speed modem using MCS 251 : part1 : hardware design ent://SD_ILS/0/SD_ILS:21218 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Akmarhayu Ramin @ Abd. Rahim<br/>Author&#160;Akmarhayu Ramin @ Abd. Rahim,&#160;Cik Ahmad Azira Che Mohd. Ayob,&#160;Han, Si Kwong,&#160;Lee, Joo Aun,&#160;Nor Aishah Latip<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 8750 ra<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1996<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1996<br/> Practical cryptography for data internetworks ent://SD_ILS/0/SD_ILS:452814 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59.S73 1996<br/>Publisher&#160;IEEE Computer Society Press,<br/>Publication Date&#160;1996<br/>ISBN&#160;9780818671401<br/> Data encryption using smart card for cryptographic key generation ent://SD_ILS/0/SD_ILS:413496 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Lee, Joo Aun<br/>Author&#160;Lee, Joo Aun<br/>Format:&#160;Books<br/>Call Number&#160;TK7895.S62 L57 1996 raf<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1996<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1996<br/> Analysis and design of stream cipher encryption algorithms ent://SD_ILS/0/SD_ILS:606273 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Tuan Sabri Tuan Mat<br/>Author&#160;Tuan Sabri Tuan Mat<br/>Format:&#160;Computer file<br/>Call Number&#160;DSK 1067<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1995<br/> The computer privacy handbook ent://SD_ILS/0/SD_ILS:410431 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Bacard, Andre<br/>Author&#160;Bacard, Andre<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B32 1995<br/>Publisher&#160;Peachpit Press,<br/>Publication Date&#160;1995<br/>ISBN&#160;9781566091718<br/> Analysis and design of stream cipher encryption algorithms ent://SD_ILS/0/SD_ILS:423458 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Tuan Sabri Tuan Mat<br/>Author&#160;Tuan Sabri Tuan Mat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105 T82 1995<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1995<br/>Thesis (Master of Electrical Engineering) - Universiti Teknologi Malaysia, 1995<br/> Analysis of modified improved geffe random sequence generator ent://SD_ILS/0/SD_ILS:404971 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Ahmad Zuri Sha'ameri<br/>Author&#160;Ahmad Zuri Sha'ameri,&#160;Tuan Sabri Tuan Mat,&#160;Kamaruzzaman Seman,&#160;International Conference on Communication (2nd : 1995 : Langkawi)<br/>Format:&#160;Books<br/>Call Number&#160;MAK 11944 a<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1995<br/> Preliminary study of an s-band radar for rain study in tropical region; Design and implementation of a jukebox machine controller using algorithmic state machines; Analysis and design of stream cipher encryption algorithms; Ray tracing simulation for microcellular environment; Lightning impulse tests on high voltage surge arresters ent://SD_ILS/0/SD_ILS:21235 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Md. Lutfor Rahman<br/>Author&#160;Md. Lutfor Rahman,&#160;Moftah Makhluf Hasan,&#160;Tuan Sabri Tuan Mat,&#160;Zarina Abdul Hamid,&#160;Zulkurnain Abd. Malek<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 8645 ra<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1995<br/>Thesis (Master of Electrical Engineering) - Universiti Teknologi Malaysia, 1995<br/> Cryptology ent://SD_ILS/0/SD_ILS:410559 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Beutelspacher, Albrecht<br/>Author&#160;Beutelspacher, Albrecht,&#160;Fisher, J. Chris<br/>Format:&#160;Books<br/>Call Number&#160;Z103 B48 1994<br/>Publisher&#160;Mathematical Association of America,<br/>Publication Date&#160;1994<br/>ISBN&#160;9780883855041<br/> Protection of databases using file encryption ent://SD_ILS/0/SD_ILS:371321 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Eriksson, Ragnar<br/>Author&#160;Eriksson, Ragnar<br/>Format:&#160;Books<br/>Call Number&#160;MAK 15395<br/>Publication Date&#160;1983<br/> Large block size AES ent://SD_ILS/0/SD_ILS:787775 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Lee, Chun How, 1988-, author<br/>Author&#160;Lee, Chun How, 1988-, author,&#160;Subariah Ibrahim,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L443 2012 raf<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian &amp; Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Large block size AES ent://SD_ILS/0/SD_ILS:787777 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Lee, Chun How, 1988-, author<br/>Author&#160;Lee, Chun How, 1988-, author,&#160;Subariah Ibrahim,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Electronic Resources<br/>Call Number&#160;CP 058453 ra<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian &amp; Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/> DIGITAL IMAGE WATERMARKING SYSTEM FOR CHECK IMAGE AUTHENTICITY BASED-ON DWT TECHNIQUES ent://SD_ILS/0/SD_ILS:836175 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Abdalrahman Salem Alfagi, 1977-, author<br/>Author&#160;Abdalrahman Salem Alfagi, 1977-, author,&#160;Azizah Abd. Manaf, Prof.Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A233 2010 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> ENHANCE KEY GENERATOR OF DATA ENCRYPTION STANDARD (DES) ent://SD_ILS/0/SD_ILS:837864 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Mahan Niknafskermani, 1982-, author<br/>Author&#160;Mahan Niknafskermani, 1982-, author,&#160;Norbik Bashah Idris, Dato&rsquo; Prof. Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M343 2012 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> Analysis and enhancement of elliptic curve cryptography ent://SD_ILS/0/SD_ILS:839097 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Saeid Bakhtiari, 1987-, author<br/>Author&#160;Saeid Bakhtiari, 1987-, author,&#160;Azizah Abd. Manaf, Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S245 2012 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> Analysis and enhancement of elliptic curve cryptography ent://SD_ILS/0/SD_ILS:839099 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Saeid Bakhtiari, 1987-, author<br/>Author&#160;Saeid Bakhtiari, 1987-, author,&#160;Azizah Abd. Manaf, Prof. Dr.,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034055 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> IMPLEMENTATION OF PKCS11 and PKCS12 CRYPTOGRAPHIC FUNCTIONS IN .Net FOR SCAN ASSOCIATES ent://SD_ILS/0/SD_ILS:840553 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Pirooz Kiani Kori, 1975-, author<br/>Author&#160;Pirooz Kiani Kori, 1975-, author,&#160;Suhaimi Ibrahim, Assoc. Prof. Dr., supervisor,&#160;Hardiyana Abd. Rahman, supervisor,&#160;Sekolah Informatik Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P57 2010 raf<br/>Thesis&#160;Sarjana Kejuruteraan Komputer<br/> IMPLEMENTATION OF PKCS11 and PKCS12 CRYPTOGRAPHIC FUNCTIONS IN.Net FOR SCAN ASSOCIATES ent://SD_ILS/0/SD_ILS:840554 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Pirooz Kiani Kori, 1975-, author<br/>Author&#160;Pirooz Kiani Kori, 1975-, author,&#160;Suhaimi Ibrahim, Assoc. Prof. Dr., supervisor,&#160;Hardiyana Abd. Rahman, supervisor,&#160;Sekolah Informatik Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034005 ra<br/>Thesis&#160;Sarjana Kejuruteraan Komputer<br/> DBCRYPT : (MANUAL AND TRANSPARENT ENCRYPTION/DECRYPTION) ent://SD_ILS/0/SD_ILS:841749 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Mustafa Ahmed Abdullah Aqel, 1979-, author<br/>Author&#160;Mustafa Ahmed Abdullah Aqel, 1979-, author,&#160;Mohd. Nazri Kama, 1963-, supervisor,&#160;Muhammad Sufyan Basri, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M878 2007 raf<br/>Thesis&#160;Sarjana Sains (Sains Komputer - Kejuruteraan Perisian Masa Nyata)<br/> Text compression and encryption ent://SD_ILS/0/SD_ILS:269517 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Luke, Walter<br/>Author&#160;Luke, Walter<br/>Format:&#160;Books<br/>Call Number&#160;MAK 2336<br/> IMPLEMENTING PROTOTYPE METHOD FOR ELECTRONIC PAYMENT FACILITY OF CERTIFICATE SERVICING SYSTEM IN MAA TAKAFUL ent://SD_ILS/0/SD_ILS:859408 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Priya Kasi, 1979-, author<br/>Author&#160;Priya Kasi, 1979-, author,&#160;Othman Mohd. Yusop, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;HG1710 P75 2015 raf<br/>Thesis (Sarjana Kejuruteraan Perisian)-Universiti Teknologi Malaysia, 2015<br/>Restricted until 25th June 2018<br/> IMPLEMENTING PROTOTYPE METHOD FOR ELECTRONIC PAYMENT FACILITY OF CERTIFICATE SERVICING SYSTEM IN MAA TAKAFUL ent://SD_ILS/0/SD_ILS:859409 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Priya Kasi, 1979-, author<br/>Author&#160;Priya Kasi, 1979-, author,&#160;Othman Mohd. Yusop, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034763 ra<br/>Thesis (Sarjana Kejuruteraan Perisian)-Universiti Teknologi Malaysia, 2015<br/>Restricted until 25th June 2018<br/> VERSATILE ENHANCED ENCRYPTION PROCESS (VEEP) FOR IMPROVED SECURITY IN GENERAL PURPOSE EMBEDDED DEVICE COMMUNICATION ent://SD_ILS/0/SD_ILS:860192 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Muhammad Farhan Abu Bakar, 1985-, author<br/>Author&#160;Muhammad Farhan Abu Bakar, 1985-, author,&#160;Mohamad Zulkefli Adam, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M847 2015 raf<br/>Thesis (Sarjana Sains (Kejuruteraan Sistem Komputer))-Universiti Teknologi Malaysia, 2015<br/> NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETS ent://SD_ILS/0/SD_ILS:860571 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Ahmad Shukri Samsuddin, 1982-, author<br/>Author&#160;Ahmad Shukri Samsuddin, 1982-, author,&#160;Azizah Abdul Manaf, Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 A363 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> DESIGNING LIGHTWEIGHT CRYPTOGRAPHY ALGORITHM FOR INTERNET OF THINGS ent://SD_ILS/0/SD_ILS:864751 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Mohd. Fairus Mustapha, 1980-, author<br/>Author&#160;Mohd. Fairus Mustapha, 1980-, author,&#160;Majid Bakhtiari, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 035068 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/> E-MAIL ENCRYPTION FRAMEWORK FOR MALAYSIAN PUBLIC SECTOR ent://SD_ILS/0/SD_ILS:865749 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Nur Atiqah Muhammad, 1985-, author<br/>Author&#160;Nur Atiqah Muhammad, 1985-, author,&#160;Ganthan Narayana Samy, Dr., 1977-, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 064001 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/> A METHOD TO ENCRYPT INFORMATION WITH DNA-BASED CRYPTOGRAPHY ent://SD_ILS/0/SD_ILS:836013 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Mohammad Reza Najaf Torkaman, 1984-, author<br/>Author&#160;Mohammad Reza Najaf Torkaman, 1984-, author,&#160;Bharanidharan Shanmugam, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 M64 2011 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> ENHANCE KEY GENERATOR OF DATA ENCRYPTION STANDARD (DES) ent://SD_ILS/0/SD_ILS:837866 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Mahan Niknafskermani, 1982-, author<br/>Author&#160;Mahan Niknafskermani, 1982-, author,&#160;Norbik Bashah Idris, Dato&rsquo; Prof. Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034145 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> THE DEVELOPMENT OF A KEY GENERATION APPLICATION FOR WIRELESS SECURE MODEM FOR SAPURA TECHNOLOGIES SDN BHD ent://SD_ILS/0/SD_ILS:838972 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Mardiana Sulaiman, author<br/>Author&#160;Mardiana Sulaiman, author,&#160;Azri Azmi, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M373 2004 raf<br/>Thesis&#160;Sarjana Sains (Sains Komputer - Kejuruteraan Perisian Masa Nyata)<br/> THE DEVELOPMENT OF A KEY GENERATION APPLICATION FOR WIRELESS SECURE MODEM FOR SAPURA TECHNOLOGIES SDN BHD ent://SD_ILS/0/SD_ILS:838973 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Mardiana Sulaiman, author<br/>Author&#160;Mardiana Sulaiman, author,&#160;Azri Azmi, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034588 ra<br/>Thesis&#160;Sarjana Sains (Sains Komputer - Kejuruteraan Perisian Masa Nyata)<br/> Advanced encryption standard (AES) coproessor ent://SD_ILS/0/SD_ILS:846345 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Lim, Joo Song, 1970- author<br/>Author&#160;Lim, Joo Song, 1970- author<br/>Format:&#160;Books<br/>Call Number&#160;CP 052861 ra<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2014<br/> VERSATILE ENHANCED ENCRYPTION PROCESS (VEEP) FOR IMPROVED SECURITY IN GENERAL PURPOSE EMBEDDED DEVICE COMMUNICATION ent://SD_ILS/0/SD_ILS:860864 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Muhammad Farhan Abu Bakar, 1985-, author<br/>Author&#160;Muhammad Farhan Abu Bakar, 1985-, author,&#160;Mohamad Zulkefli Adam, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034799 ra<br/>Thesis (Sarjana Sains (Kejuruteraan Sistem Komputer))-Universiti Teknologi Malaysia, 2015<br/> NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETS ent://SD_ILS/0/SD_ILS:860920 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Ahmad Shukri Samsuddin, 1982-, author<br/>Author&#160;Ahmad Shukri Samsuddin, 1982-, author,&#160;Azizah Abdul Manaf, Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034808 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> DESIGNING LIGHTWEIGHT CRYPTOGRAPHY ALGORITHM FOR INTERNET OF THINGS ent://SD_ILS/0/SD_ILS:864679 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Mohd. Fairus Mustapha, 1980-, author<br/>Author&#160;Mohd. Fairus Mustapha, 1980-, author,&#160;Majid Bakhtiari, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M6434 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/> E-MAIL ENCRYPTION FRAMEWORK FOR MALAYSIAN PUBLIC SECTOR ent://SD_ILS/0/SD_ILS:865464 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Nur Atiqah Muhammad, 1985-, author<br/>Author&#160;Nur Atiqah Muhammad, 1985-, author,&#160;Ganthan Narayana Samy, Dr., 1977-, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N873 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/> Cryptographic and Information Security : Approaches for Images and Videos ent://SD_ILS/0/SD_ILS:882255 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Ramakrishnan, S., editor<br/>Author&#160;Ramakrishnan, S., editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C796 2019<br/>ISBN&#160;9781138563841<br/> Audio Content Security : Attack Analysis on Audio Watermarking ent://SD_ILS/0/SD_ILS:866899 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Sogand Ghorbani, 1988-, author<br/>Author&#160;Sogand Ghorbani, 1988-, author,&#160;Iraj Sadegh Amiri, 1977-, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S643 2016<br/>ISBN&#160;9780128113837<br/> Security, Privacy and Reliability in Computer Communications and Networks ent://SD_ILS/0/SD_ILS:866967 2024-05-14T06:00:00Z 2024-05-14T06:00:00Z by&#160;Sha, Kewei<br/>Author&#160;Sha, Kewei,&#160;Striegel, Aaron,&#160;Song, Min<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S43 2017<br/>ISBN&#160;9788793379893<br/>