Search Results for Data encryption (Computer science) - Narrowed by: EnglishSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ps$003d300$0026isd$003dtrue?dt=list2024-05-14T06:00:00ZAdvances of DNA computing in cryptographyent://SD_ILS/0/SD_ILS:8823842024-05-14T06:00:00Z2024-05-14T06:00:00Zby Namasudra, Suyel, editor<br/>Author Namasudra, Suyel, editor, Deka, Ganesh Chandra, 1969- editor<br/>Format: Books<br/>Call Number QA76.9 .A25 A378 2019<br/>Publication Date 2019<br/>ISBN 9780815385325<br/>A comparative study on image encryption based on 2D Chaotic Mapent://SD_ILS/0/SD_ILS:8825562024-05-14T06:00:00Z2024-05-14T06:00:00Zby Nik Nur Syahirah Nik Rahim, 1996-, author<br/>Author Nik Nur Syahirah Nik Rahim, 1996-, author, Rashidah Kadir, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 N55 2019 raf<br/>Publication Date 2019<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian Dan Keselamatan)) - Universiti Teknologi Malaysia, 2019<br/>Cryptoken wallet systement://SD_ILS/0/SD_ILS:8825912024-05-14T06:00:00Z2024-05-14T06:00:00Zby Syafiq Shamsuddin, 1996-, author<br/>Author Syafiq Shamsuddin, 1996-, author, Mohd. Yazid Idris, 1973-, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number QA76.9.B56 S93 2019 raf<br/>Publication Date 2019<br/>Project Paper (Sarjana Muda Sains Komputer (Kejuruteraan Perisian)) - Universiti Teknologi Malaysia, 2019<br/>Cryptoken wallet systement://SD_ILS/0/SD_ILS:8825932024-05-14T06:00:00Z2024-05-14T06:00:00Zby Syafiq Shamsuddin, 1996-, author<br/>Author Syafiq Shamsuddin, 1996-, author, Mohd. Yazid Idris, 1973-, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Electronic Resources<br/>Call Number CP 082916 ra<br/>Publication Date 2019<br/>Project Paper (Sarjana Muda Sains Komputer (Kejuruteraan Perisian)) - Universiti Teknologi Malaysia, 2019<br/>VLSI design of present encryption algorithment://SD_ILS/0/SD_ILS:8831202024-05-14T06:00:00Z2024-05-14T06:00:00Zby Siti Maisara Murniyati Muin, 1996-, author<br/>Author Siti Maisara Murniyati Muin, 1996-, author, Shaikh Nasir Shaikh Husin, supervisor, Fakulti Kejuruteraan. Sekolah Kejuruteraan Elektrik<br/>Format: Electronic Resources<br/>Call Number CP 083065 ra<br/>Publication Date 2019<br/>Thesis (Sarjana Muda Kejuruteraan (Elektrik – Elektronik)) - Universiti Teknologi Malaysia, 2019<br/>CRYPTOLOGY : Classical and Modernent://SD_ILS/0/SD_ILS:8823292024-05-14T06:00:00Z2024-05-14T06:00:00Zby Klima, Richard E., author<br/>Author Klima, Richard E., author, Sigmon, Neil, author<br/>Format: Books<br/>Call Number TK5102.94 K55 2019<br/>Edition Second Edition<br/>Publication Date 2019<br/>ISBN 9781138047624<br/>A comparative study on image encryption based on 2D Chaotic Mapent://SD_ILS/0/SD_ILS:8825582024-05-14T06:00:00Z2024-05-14T06:00:00Zby Nik Nur Syahirah Nik Rahim, 1996-, author<br/>Author Nik Nur Syahirah Nik Rahim, 1996-, author, Rashidah Kadir, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Electronic Resources<br/>Call Number CP 082943 ra<br/>Publication Date 2019<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian Dan Keselamatan)) - Universiti Teknologi Malaysia, 2019<br/>VLSI design of present encryption algorithment://SD_ILS/0/SD_ILS:8831162024-05-14T06:00:00Z2024-05-14T06:00:00Zby Siti Maisara Murniyati Muin, 1996-, author<br/>Author Siti Maisara Murniyati Muin, 1996-, author, Shaikh Nasir Shaikh Husin, supervisor, Fakulti Kejuruteraan. Sekolah Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TK7874.75 S58 2019 raf<br/>Publication Date 2019<br/>Thesis (Sarjana Muda Kejuruteraan (Elektrik – Elektronik)) - Universiti Teknologi Malaysia, 2019<br/>QR parking system for disableent://SD_ILS/0/SD_ILS:8833332024-05-14T06:00:00Z2024-05-14T06:00:00Zby Muhammad Safwan Rashid, 1995-, author<br/>Author Muhammad Safwan Rashid, 1995-, author, Salinda Buyamin, supervisor, Fakulti Kejuruteraan. Sekolah Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TK5102.94 M84 2019 raf<br/>Publication Date 2019<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik – Mekatronik)) - Universiti Teknologi Malaysia, 2019<br/>QR parking system for disableent://SD_ILS/0/SD_ILS:8833342024-05-14T06:00:00Z2024-05-14T06:00:00Zby Muhammad Safwan Rashid, 1995-, author<br/>Author Muhammad Safwan Rashid, 1995-, author, Salinda Buyamin, supervisor, Fakulti Kejuruteraan. Sekolah Kejuruteraan Elektrik<br/>Format: Electronic Resources<br/>Call Number CP 083136 ra<br/>Publication Date 2019<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik – Mekatronik)) - Universiti Teknologi Malaysia, 2019<br/>Selective colour image encryption based on texture features using enhanced blowfish algorithment://SD_ILS/0/SD_ILS:8635052024-05-14T06:00:00Z2024-05-14T06:00:00Zby Lahieb Mohammed Jawad, 1978-, author<br/>Author Lahieb Mohammed Jawad, 1978-, author, Ghazali Sulong, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number XX(863505.2)<br/>Publication Date 2016<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/>Selective colour image encryption based on texture features using enhanced blowfish algorithment://SD_ILS/0/SD_ILS:8684842024-05-14T06:00:00Z2024-05-14T06:00:00Zby Lahieb Mohammed Jawad, 1978-, author<br/>Author Lahieb Mohammed Jawad, 1978-, author, Ghazali Sulong, supervisor, Fakulti Komputeran<br/>Format: Electronic Resources<br/>Call Number CP 064628 ra<br/>Publication Date 2016<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/>Steganografi berkapasiti tinggi menggunakan penggantian bit terkurang bererti dan pengesanan pinggir hibrident://SD_ILS/0/SD_ILS:8514822024-05-14T06:00:00Z2024-05-14T06:00:00Zby Harja Santana Purba, 1963- , author<br/>Author Harja Santana Purba, 1963- , author<br/>Format: Books<br/>Call Number CP 054777 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Practical cryptography: algorithms and implementations using C++ent://SD_ILS/0/SD_ILS:8351442024-05-14T06:00:00Z2024-05-14T06:00:00Zby Azad, Saiful<br/>Author Azad, Saiful, Pathan, Al-Sakib Khan editor<br/>Format: Books<br/>Call Number QA76.9 A25 P725 2015<br/>Publisher CRC Press/Taylor & Francis,<br/>Publication Date 2015<br/>ISBN 9781482228892<br/>Information hiding in speech signals for secure communicationent://SD_ILS/0/SD_ILS:8410382024-05-14T06:00:00Z2024-05-14T06:00:00Zby Wu, Zhijun<br/>Author Wu, Zhijun<br/>Format: Books<br/>Call Number TK7882.S65 W8 2015<br/>Publisher Syngress ,<br/>Publication Date 2015<br/>ISBN 9780128013281<br/>Steganografi berkapasiti tinggi menggunakan penggantian bit terkurang bererti dan pengesanan pinggir hibrident://SD_ILS/0/SD_ILS:8493462024-05-14T06:00:00Z2024-05-14T06:00:00Zby Harja Santana Purba, 1963- , author<br/>Author Harja Santana Purba, 1963- , author, Ghazali Sulong, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number XX(849346.1)<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Integration of verification in otp cryptography for highly critical embedded systement://SD_ILS/0/SD_ILS:8593802024-05-14T06:00:00Z2024-05-14T06:00:00Zby Muhammad Maharoff, 1980- , author<br/>Author Muhammad Maharoff, 1980- , author, Saiful Adli Ismail, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 M846 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Kejuruteraan Sistem Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Gray-scale image steganography using LSB insertion and fibonaccient://SD_ILS/0/SD_ILS:8603692024-05-14T06:00:00Z2024-05-14T06:00:00Zby Toh, Pui Ling, 1991-<br/>Author Toh, Pui Ling, 1991-, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number TA1636 T64 2015raf<br/>Publication Date 2015<br/>Project Paper (Sarjana Muda Sains Komputer (Grafik dan Perisian Multimedia)) - Universiti Teknologi Malaysia, 2015<br/>Integration of verification in otp cryptography for highly critical embedded systement://SD_ILS/0/SD_ILS:8596252024-05-14T06:00:00Z2024-05-14T06:00:00Zby Muhammad Maharoff, 1980- , author<br/>Author Muhammad Maharoff, 1980- , author, Saiful Adli Ismail, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034740 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Kejuruteraan Sistem Komputer))-Universiti Teknologi Malaysia, 2015<br/>Gray-scale image steganography using LSB insertion and fibonaccient://SD_ILS/0/SD_ILS:8603732024-05-14T06:00:00Z2024-05-14T06:00:00Zby Toh, Pui Ling, 1991-<br/>Author Toh, Pui Ling, 1991-, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 061116 ra<br/>Publication Date 2015<br/>Project Paper (Sarjana Muda Sains Komputer (Grafik dan Perisian Multimedia)) - Universiti Teknologi Malaysia, 2015<br/>Facial blurring using henon mapent://SD_ILS/0/SD_ILS:8606142024-05-14T06:00:00Z2024-05-14T06:00:00Zby Loh, Shuet Han, 1991-<br/>Author Loh, Shuet Han, 1991-, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number XX(860614.1)<br/>Publication Date 2015<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafik dan Multimedia)) - Universiti Teknologi Malaysia, 2015<br/>Facial blurring using henon mapent://SD_ILS/0/SD_ILS:8606372024-05-14T06:00:00Z2024-05-14T06:00:00Zby Loh, Shuet Han, 1991-<br/>Author Loh, Shuet Han, 1991-, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 061223 ra<br/>Publication Date 2015<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafik dan Multimedia)) - Universiti Teknologi Malaysia, 2015<br/>Image encryption : a communication perspectiveent://SD_ILS/0/SD_ILS:8289342024-05-14T06:00:00Z2024-05-14T06:00:00Zby Abd el-Samie, Fathi E.<br/>Author Abd el-Samie, Fathi E., Ahmed, Hossam Eldin H., author, Elashry, Ibrahim F., author, Shahieen, Mai H., author, Faragallah, Osama S., author<br/>Format: Books<br/>Call Number TA1637 A23 2014<br/>Publisher CRC Press, Tayllor & Francis Group,<br/>Publication Date 2014<br/>ISBN 9781466576988<br/>Multi-facial blurring using improved henon mapent://SD_ILS/0/SD_ILS:8433742024-05-14T06:00:00Z2024-05-14T06:00:00Zby Muhammed Ahmed Saleh, 1983-<br/>Author Muhammed Ahmed Saleh, 1983-, Ghazali Sulong, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 M845 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2014<br/>Multi-facial blurring using improved henon mapent://SD_ILS/0/SD_ILS:8436372024-05-14T06:00:00Z2024-05-14T06:00:00Zby Muhammed Ahmed Saleh, 1983-<br/>Author Muhammed Ahmed Saleh, 1983-, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 052050 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2014<br/>A robust image watermarking technique based on Cox 's DCT to against rotation attackent://SD_ILS/0/SD_ILS:8438682024-05-14T06:00:00Z2024-05-14T06:00:00Zby Seyed Mohamad Bagher Shafieinasab Langeroudi, 1982-<br/>Author Seyed Mohamad Bagher Shafieinasab Langeroudi, 1982-, Mazdak Zamani, Dr., Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 S494 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>A robust image watermarking technique based on Cox 's DCT to against rotation attackent://SD_ILS/0/SD_ILS:8438692024-05-14T06:00:00Z2024-05-14T06:00:00Zby Seyed Mohamad Bagher Shafieinasab Langeroudi, 1982-<br/>Author Seyed Mohamad Bagher Shafieinasab Langeroudi, 1982-, Mazdak Zamani, Dr., Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034204 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>A new colour image steganography using LSB approach with halftoning determination embedding positionent://SD_ILS/0/SD_ILS:8439832024-05-14T06:00:00Z2024-05-14T06:00:00Zby Reband Jamil Hassan, 1982- author<br/>Author Reband Jamil Hassan, 1982- author, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 R434 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2014<br/>A new colour image steganography using LSB approach with halftoning determination embedding positionent://SD_ILS/0/SD_ILS:8439882024-05-14T06:00:00Z2024-05-14T06:00:00Zby Reband Jamil Hassan, 1982- author<br/>Author Reband Jamil Hassan, 1982- author, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 052326 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2014<br/>Databased encrytpion/decryption using AES/DESent://SD_ILS/0/SD_ILS:8440002024-05-14T06:00:00Z2024-05-14T06:00:00Zby Abdul Kadir Abukar Sufi, 1985- author<br/>Author Abdul Kadir Abukar Sufi, 1985- author, Ismail Fauzi Isnin, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 A23 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Optimize perceptuality of digital image from encryption based on quadtreeent://SD_ILS/0/SD_ILS:8440962024-05-14T06:00:00Z2024-05-14T06:00:00Zby Hussein A. Hussein, 1983- author<br/>Author Hussein A. Hussein, 1983- author, Dzulkifli Mohamed, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 052393 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2014<br/>Introduction to computer and network security : navigating shades of grayent://SD_ILS/0/SD_ILS:8052892024-05-14T06:00:00Z2024-05-14T06:00:00Zby Brooks, Richard R.<br/>Author Brooks, Richard R.<br/>Format: Books<br/>Call Number QA76.9.A25 B76 2014<br/>Publisher Chapman and Hall/CRC,<br/>Publication Date 2014 2013<br/>ISBN 9781439860717<br/>Cryptography and network security : principles and practiceent://SD_ILS/0/SD_ILS:8211522024-05-14T06:00:00Z2024-05-14T06:00:00Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S713 2014<br/>Edition 6th ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2014 2011<br/>ISBN 9780133354690<br/>Medical image encryption using PWLCM with digital singnatureent://SD_ILS/0/SD_ILS:8254532024-05-14T06:00:00Z2024-05-14T06:00:00Zby Hazhar Mohammed Ahmed, 1982-<br/>Author Hazhar Mohammed Ahmed, 1982-, Subariah Ibrahim, Fakulti Komputeran<br/>Format: Books<br/>Call Number TA1637 H39 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Medical image encryption using PWLCM with digital singnatureent://SD_ILS/0/SD_ILS:8254812024-05-14T06:00:00Z2024-05-14T06:00:00Zby Hazhar Mohammed Ahmed, 1982-<br/>Author Hazhar Mohammed Ahmed, 1982-, Subariah Ibrahim<br/>Format: Books<br/>Call Number CP 050455 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>An index based searchable encryption scheme with IND-CCA securityent://SD_ILS/0/SD_ILS:8255782024-05-14T06:00:00Z2024-05-14T06:00:00Zby Majid Nateghizad, 1986-<br/>Author Majid Nateghizad, 1986-, Mohd. Aizaini Maarof, supervisor, Majid Bakhtiari, Dr., Fakulti Komputeran<br/>Format: Books<br/>Call Number QA 76.9 .A25 M357 2014 raf c.1<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>An index based searchable encryption scheme with IND-CCA securityent://SD_ILS/0/SD_ILS:8256732024-05-14T06:00:00Z2024-05-14T06:00:00Zby Majid Nateghizad, 1986-<br/>Author Majid Nateghizad, 1986-, Mohd. Aizaini Maarof, supervisor, Majid Bakhtiari, Dr.<br/>Format: Books<br/>Call Number CP 050732 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Optimize perceptuality of digital image from encryption based on quadtreeent://SD_ILS/0/SD_ILS:8440952024-05-14T06:00:00Z2024-05-14T06:00:00Zby Hussein A. Hussein, 1983- author<br/>Author Hussein A. Hussein, 1983- author, Dzulkifli Mohamed, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 H87 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2014<br/>A cryptography primer : secrets and promisesent://SD_ILS/0/SD_ILS:8358482024-05-14T06:00:00Z2024-05-14T06:00:00Zby Klein, Philip N., author<br/>Author Klein, Philip N., author<br/>Format: Books<br/>Call Number QA76.9.A25 K545 2014<br/>Publisher Cambridge University Press,<br/>Publication Date 2014<br/>ISBN 9781107017887<br/>Advanced encryption standard (AES) coproessorent://SD_ILS/0/SD_ILS:8463232024-05-14T06:00:00Z2024-05-14T06:00:00Zby Lim, Joo Song, 1970- author<br/>Author Lim, Joo Song, 1970- author, Mohamed Khalil Hani, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number QA76.9.A25 L56 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2014<br/>Flat role based access control and encryption scheme for database securityent://SD_ILS/0/SD_ILS:8034762024-05-14T06:00:00Z2024-05-14T06:00:00Zby Al Farissi, 1985-<br/>Author Al Farissi, 1985-<br/>Format: Books<br/>Call Number CP 032498 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Enhancing the security of high payload image steganography using chaosent://SD_ILS/0/SD_ILS:8037482024-05-14T06:00:00Z2024-05-14T06:00:00Zby Rezza Moieni, 1979-<br/>Author Rezza Moieni, 1979-, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5102.94 R49<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Enhancing the security of high payload image steganography using chaosent://SD_ILS/0/SD_ILS:8041482024-05-14T06:00:00Z2024-05-14T06:00:00Zby Rezza Moieni, 1979-<br/>Author Rezza Moieni, 1979-<br/>Format: Books<br/>Call Number CP 029976 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Grey scale image steganography using Exploiting Modification Direction (EMD) methodent://SD_ILS/0/SD_ILS:8075402024-05-14T06:00:00Z2024-05-14T06:00:00Zby Tan, Mei Lian, 1989-, author<br/>Author Tan, Mei Lian, 1989-, author, Ghazali Sulong, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 T368 2013 raf<br/>Publication Date 2013 2012<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafk Dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/>Grey scale image steganography using Exploiting Modification Direction (EMD) methodent://SD_ILS/0/SD_ILS:8075412024-05-14T06:00:00Z2024-05-14T06:00:00Zby Tan, Mei Lian, 1989-, author<br/>Author Tan, Mei Lian, 1989-, author<br/>Format: Books<br/>Call Number CP 082475 ra<br/>Publication Date 2013<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafk Dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/>Analysis of S-Box in Rijndael -Aes algorithm and formulation of enhanced S-Boxent://SD_ILS/0/SD_ILS:8116192024-05-14T06:00:00Z2024-05-14T06:00:00Zby Gaithuru, Juliet Nyokabi, 1985-<br/>Author Gaithuru, Juliet Nyokabi, 1985-<br/>Format: Books<br/>Call Number CP 031144 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Computational number theory and modern cryptographyent://SD_ILS/0/SD_ILS:8211672024-05-14T06:00:00Z2024-05-14T06:00:00Zby Yan, Song Y.<br/>Author Yan, Song Y.<br/>Format: Books<br/>Call Number QA76.9.A25 Y36 2013<br/>Publisher Wiley,<br/>Publication Date 2013<br/>ISBN 9781118188583<br/>Flat role based access control and encryption scheme for database securityent://SD_ILS/0/SD_ILS:8034752024-05-14T06:00:00Z2024-05-14T06:00:00Zby Al Farissi, 1985-<br/>Author Al Farissi, 1985-, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.D314 A44 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Cryptography : Infosec pro guideent://SD_ILS/0/SD_ILS:8073712024-05-14T06:00:00Z2024-05-14T06:00:00Zby Oriyano, Sean-Philip<br/>Author Oriyano, Sean-Philip<br/>Format: Books<br/>Call Number TK5102.94 O75 2013<br/>Publisher McGraw-Hill Education,<br/>Publication Date 2013<br/>ISBN 9780071794251<br/>Computational number theoryent://SD_ILS/0/SD_ILS:8074572024-05-14T06:00:00Z2024-05-14T06:00:00Zby Das, Abhijit, 1968-<br/>Author Das, Abhijit, 1968-<br/>Format: Books<br/>Call Number QA241 D374 2013<br/>Publisher Chapman and Hall/CRC,<br/>Publication Date 2013<br/>ISBN 9781439866153<br/>Efficiency key generation management in a big organization for symmetric cryptography systement://SD_ILS/0/SD_ILS:8112622024-05-14T06:00:00Z2024-05-14T06:00:00Zby Atefeh Mirzaee, 1986-<br/>Author Atefeh Mirzaee, 1986-, Majid Bakhtiari, Dr., Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 A844 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Efficiency key generation management in a big organization for symmetric cryptography systement://SD_ILS/0/SD_ILS:8112642024-05-14T06:00:00Z2024-05-14T06:00:00Zby Atefeh Mirzaee, 1986-<br/>Author Atefeh Mirzaee, 1986-<br/>Format: Books<br/>Call Number CP 030847 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Analysis of S-Box in Rijndael -Aes algorithm and formulation of enhanced S-Boxent://SD_ILS/0/SD_ILS:8116142024-05-14T06:00:00Z2024-05-14T06:00:00Zby Gaithuru, Juliet Nyokabi, 1985-<br/>Author Gaithuru, Juliet Nyokabi, 1985-, Majid Bakhtiari, Dr., Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 G35 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Secure multi-party computationent://SD_ILS/0/SD_ILS:8137162024-05-14T06:00:00Z2024-05-14T06:00:00Zby Prabhakaran, Manoj, 1979-, editor<br/>Author Prabhakaran, Manoj, 1979-, editor, Sahai, Amit, editor<br/>Format: Books<br/>Call Number QA76.9.A25 S43 2013<br/>Publisher IOS Press,<br/>Publication Date 2013<br/>ISBN 9781614991687<br/>Multimedia information hiding technologies and methodologies for controlling dataent://SD_ILS/0/SD_ILS:8200742024-05-14T06:00:00Z2024-05-14T06:00:00Zby Kondo, Kazuhiro<br/>Author Kondo, Kazuhiro<br/>Format: Books<br/>Call Number QA76.575 M832 2013<br/>Publisher Information Science Reference,<br/>Publication Date 2013<br/>ISBN 9781466622173<br/>New directions of modern cryptographyent://SD_ILS/0/SD_ILS:8372922024-05-14T06:00:00Z2024-05-14T06:00:00Zby Cao, Zhenfu, author<br/>Author Cao, Zhenfu, author<br/>Format: Books<br/>Call Number TK5102.94 C36 2013<br/>Publisher CRC Press, Taylor & Francis Group,<br/>Publication Date 2013<br/>ISBN 9781466501386<br/>Security and performance benchmarking of lightweight encryption algorithms for secure RFID systemsent://SD_ILS/0/SD_ILS:7864272024-05-14T06:00:00Z2024-05-14T06:00:00Zby Mojtaba Ali Zadeh, 1983-<br/>Author Mojtaba Ali Zadeh, 1983-, Mazleena Salleh, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M65 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Security and performance benchmarking of lightweight encryption algorithms for secure RFID systemsent://SD_ILS/0/SD_ILS:7864322024-05-14T06:00:00Z2024-05-14T06:00:00Zby Mojtaba Ali Zadeh, 1983-<br/>Author Mojtaba Ali Zadeh, 1983-, Mazleena Salleh<br/>Format: Books<br/>Call Number CP 027765 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Machine learning in image steganalysisent://SD_ILS/0/SD_ILS:7998192024-05-14T06:00:00Z2024-05-14T06:00:00Zby Schaathun, Hans Georg<br/>Author Schaathun, Hans Georg<br/>Format: Books<br/>Call Number Q325.5 S34 2012<br/>Publisher Wiley,<br/>Publication Date 2012<br/>ISBN 9780470663059<br/>Encryption implementation enhancement of AES-CCMP in 802.11Ient://SD_ILS/0/SD_ILS:7784012024-05-14T06:00:00Z2024-05-14T06:00:00Zby Iman Saberi, 1984-<br/>Author Iman Saberi, 1984-, Mazleena Salleh, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 I434 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Encryption implementation enhancement of AES-CCMP in 802.11Ient://SD_ILS/0/SD_ILS:7784052024-05-14T06:00:00Z2024-05-14T06:00:00Zby Iman Saberi, 1984-<br/>Author Iman Saberi, 1984-<br/>Format: Books<br/>Call Number CP 027521 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memoryent://SD_ILS/0/SD_ILS:7786672024-05-14T06:00:00Z2024-05-14T06:00:00Zby Nordiana Rahim, 1987-<br/>Author Nordiana Rahim, 1987-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 N675 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memoryent://SD_ILS/0/SD_ILS:7786682024-05-14T06:00:00Z2024-05-14T06:00:00Zby Nordiana Rahim, 1987-<br/>Author Nordiana Rahim, 1987-<br/>Format: Books<br/>Call Number CP 027499 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Visual cryptography and secret image sharingent://SD_ILS/0/SD_ILS:7811922024-05-14T06:00:00Z2024-05-14T06:00:00Zby Cimato, Stelvio<br/>Author Cimato, Stelvio, Yang, Ching-Nung<br/>Format: Books<br/>Call Number TA1637 V57 2012<br/>Publisher CRC Press,<br/>Publication Date 2012<br/>ISBN 9781439837214<br/>Least significant bit image steganography using particle swarm optimization and optical pixel adjustmentent://SD_ILS/0/SD_ILS:7902772024-05-14T06:00:00Z2024-05-14T06:00:00Zby Parisa Gerami, 1994-<br/>Author Parisa Gerami, 1994-, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 P37 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) – Universiti Teknologi Malaysia, 2012<br/>Performance analysis of steganography algorithms based for JPEG Imagesent://SD_ILS/0/SD_ILS:7901562024-05-14T06:00:00Z2024-05-14T06:00:00Zby Areej Abdulmalik Rosmmani, 1985-<br/>Author Areej Abdulmalik Rosmmani, 1985-, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A744 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) – Universiti Teknologi Malaysia, 2012<br/>Performance analysis of steganography algorithms based for JPEG Imagesent://SD_ILS/0/SD_ILS:7901572024-05-14T06:00:00Z2024-05-14T06:00:00Zby Areej Abdulmalik Rosmmani, 1985-<br/>Author Areej Abdulmalik Rosmmani, 1985-<br/>Format: Books<br/>Call Number CP 028331 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) – Universiti Teknologi Malaysia, 2012<br/>Enhancing statistical properties of chaos based image encryption using PWLCMent://SD_ILS/0/SD_ILS:7901612024-05-14T06:00:00Z2024-05-14T06:00:00Zby Leyla Roohi, 1977-<br/>Author Leyla Roohi, 1977-, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TA1637 L49 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Enhancing statistical properties of chaos based image encryption using PWLCMent://SD_ILS/0/SD_ILS:7901622024-05-14T06:00:00Z2024-05-14T06:00:00Zby Leyla Roohi, 1977-<br/>Author Leyla Roohi, 1977-<br/>Format: Books<br/>Call Number CP 028302 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Least significant bit image steganography using particle swarm optimization and optical pixel adjustmentent://SD_ILS/0/SD_ILS:7902802024-05-14T06:00:00Z2024-05-14T06:00:00Zby Parisa Gerami, 1994-<br/>Author Parisa Gerami, 1994-<br/>Format: Books<br/>Call Number CP 027550 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) – Universiti Teknologi Malaysia, 2012<br/>A2-Tier data hiding technique using an improved exploiting modification direction method and huffman codingent://SD_ILS/0/SD_ILS:7932382024-05-14T06:00:00Z2024-05-14T06:00:00Zby Ali M-Ahmad, 1980-<br/>Author Ali M-Ahmad, 1980-, Ghazali Sulong, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A456 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>A2-Tier data hiding technique using an improved exploiting modification direction method and huffman codingent://SD_ILS/0/SD_ILS:7932412024-05-14T06:00:00Z2024-05-14T06:00:00Zby Ali M-Ahmad, 1980-<br/>Author Ali M-Ahmad, 1980-<br/>Format: Books<br/>Call Number CP 028758 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Image steganography using least significant bit approach enhanced with compression and encryptionent://SD_ILS/0/SD_ILS:7932642024-05-14T06:00:00Z2024-05-14T06:00:00Zby Morteza Bashardoost, 1983-<br/>Author Morteza Bashardoost, 1983-, Ghazali Sulong, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M67 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Image steganography using least significant bit approach enhanced with compression and encryptionent://SD_ILS/0/SD_ILS:7932652024-05-14T06:00:00Z2024-05-14T06:00:00Zby Morteza Bashardoost, 1983-<br/>Author Morteza Bashardoost, 1983-<br/>Format: Books<br/>Call Number CP 028728 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Burdens of proof : cryptographic culture and evidence law in the age of electronic documentsent://SD_ILS/0/SD_ILS:7964902024-05-14T06:00:00Z2024-05-14T06:00:00Zby Blanchette, Jean-François<br/>Author Blanchette, Jean-François<br/>Format: Books<br/>Call Number K2269.5 B53 2012<br/>Publisher MIT Press,<br/>Publication Date 2012<br/>ISBN 9780262017510<br/>Applied cryptography for cyber security and defense : information encryption and cypheringent://SD_ILS/0/SD_ILS:6303042024-05-14T06:00:00Z2024-05-14T06:00:00Zby Nemati, Hamid R., 1958-<br/>Author Nemati, Hamid R., 1958-, Yang, Li, 1974 Oct. 29-<br/>Format: Books<br/>Call Number TK5102.94 A67 2011 f<br/>Publisher Information Science Reference,<br/>Publication Date 2011<br/>ISBN 9781615207831 9781615207848<br/>Chaos synchronization and cryptography for secure communications : applications for encryptionent://SD_ILS/0/SD_ILS:6304542024-05-14T06:00:00Z2024-05-14T06:00:00Zby Banerjee, Santo, 1976-<br/>Author Banerjee, Santo, 1976-<br/>Format: Books<br/>Call Number TK5102.94 C43 2011 f<br/>Publisher Information Science Reference,<br/>Publication Date 2011<br/>ISBN 9781615207374 9781615207381<br/>Enhanced SVD watermarking algorithmsent://SD_ILS/0/SD_ILS:7566072024-05-14T06:00:00Z2024-05-14T06:00:00Zby Iman Omidvar Tehrani<br/>Author Iman Omidvar Tehrani, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 I43 2011 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2011<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/>Enhanced SVD watermarking algorithmsent://SD_ILS/0/SD_ILS:7566082024-05-14T06:00:00Z2024-05-14T06:00:00Zby Iman Omidvar Tehrani<br/>Author Iman Omidvar Tehrani, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 025519 ra<br/>Publication Date 2011<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/>Information security, coding theory and related combinatorics : information coding and combinatoricsent://SD_ILS/0/SD_ILS:7727612024-05-14T06:00:00Z2024-05-14T06:00:00Zby Proceeding of the NATO Advanced Study Institute "Information Security and Related Combinatorics" (2010 : Opatija, Croatia)<br/>Author Proceeding of the NATO Advanced Study Institute "Information Security and Related Combinatorics" (2010 : Opatija, Croatia), Crnkovic, Dean, Tonchev, Vladimir<br/>Format: Books<br/>Call Number QA404.7 P76 2010<br/>Publisher IOS Press,<br/>Publication Date 2011<br/>ISBN 9781607506621 9781607506638<br/>Introduction to cryptography with mathematical foundations and computer implementationsent://SD_ILS/0/SD_ILS:7566672024-05-14T06:00:00Z2024-05-14T06:00:00Zby Stanoyevitch, Alexander.<br/>Author Stanoyevitch, Alexander.<br/>Format: Books<br/>Call Number QA268 S73 2011<br/>Publisher Chapman & Hall/CRC,<br/>Publication Date 2011<br/>ISBN 9781439817636<br/>Cryptography and network security : principles and practiceent://SD_ILS/0/SD_ILS:7582562024-05-14T06:00:00Z2024-05-14T06:00:00Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S713 2011<br/>Edition 5th ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2011<br/>ISBN 9780136097044<br/>Introduction to cryptography with open-source softwareent://SD_ILS/0/SD_ILS:7891252024-05-14T06:00:00Z2024-05-14T06:00:00Zby McAndrew, Alasdair<br/>Author McAndrew, Alasdair<br/>Format: Books<br/>Call Number QA76.9 .A25 M398 2011<br/>Publisher CRC Press,<br/>Publication Date 2011<br/>ISBN 9781439825709<br/>Analysis and detection of P2P botnet based on node behaviourent://SD_ILS/0/SD_ILS:8359952024-05-14T06:00:00Z2024-05-14T06:00:00Zby Mohammad Reza Rostami<br/>Author Mohammad Reza Rostami, Bharanidharan Shanmugam, Dr., Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M6436 2011 raf<br/>Publication Date 2011<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2011<br/>Detecting plaintext recovery attack in secure shell (SSH)ent://SD_ILS/0/SD_ILS:6041102024-05-14T06:00:00Z2024-05-14T06:00:00Zby Zaid Mujaiyid Putra Ahmad Baidowi, 1980-<br/>Author Zaid Mujaiyid Putra Ahmad Baidowi, 1980-<br/>Format: Computer file<br/>Call Number CP 025106 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Komputer Sains-Keselamaatn maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Hashing in computer science : fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:6396362024-05-14T06:00:00Z2024-05-14T06:00:00Zby Konheim, Alan G., 1934-<br/>Author Konheim, Alan G., 1934-<br/>Format: Books<br/>Call Number QA76.9.H36 K65 2010<br/>Publisher John Wiley & Sons,<br/>Publication Date 2010<br/>ISBN 9780470344736<br/>Relation based access controlent://SD_ILS/0/SD_ILS:6378232024-05-14T06:00:00Z2024-05-14T06:00:00Zby Zhang, Rui<br/>Author Zhang, Rui<br/>Format: Books<br/>Call Number QA76.9.A25 Z43 2010<br/>Publisher IOS Pr.,<br/>Publication Date 2010<br/>ISBN 9783898386265<br/>Understanding cryptography : a textbook for students and practitionersent://SD_ILS/0/SD_ILS:8192492024-05-14T06:00:00Z2024-05-14T06:00:00Zby Paar, Christof, 1963-<br/>Author Paar, Christof, 1963-, Pelzl, Jan<br/>Format: Books<br/>Call Number Z104 P33 2010<br/>Publisher Springer,<br/>Publication Date 2010<br/>ISBN 9783642041006<br/>2D barcode application in authenticating genuine goods product through a mobile deviceent://SD_ILS/0/SD_ILS:7592652024-05-14T06:00:00Z2024-05-14T06:00:00Zby Asvhini Subramaniam, 1985-<br/>Author Asvhini Subramaniam, 1985-, Mazleena Salleh, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A884 2010 raf<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Sistem pengesanan penumpang kapal terbang melalui tiket menggunakan teknologi RFID dan SMSent://SD_ILS/0/SD_ILS:7594022024-05-14T06:00:00Z2024-05-14T06:00:00Zby Azzaharul Hamdi Abdul Aziz<br/>Author Azzaharul Hamdi Abdul Aziz, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A99 2010 raf<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Broadband quantum cryptographyent://SD_ILS/0/SD_ILS:7647602024-05-14T06:00:00Z2024-05-14T06:00:00Zby Rogers, Daniel J.<br/>Author Rogers, Daniel J.<br/>Format: Books<br/>Call Number QA76.9.A25 R64 2010<br/>Publisher Morgan & Claypool Publishers,<br/>Publication Date 2010<br/>ISBN 9781608450596<br/>Genetic based substitution techniques for audio steganographyent://SD_ILS/0/SD_ILS:7561922024-05-14T06:00:00Z2024-05-14T06:00:00Zby Mazdak Zamani, 1979-<br/>Author Mazdak Zamani, 1979-, Azizah Abdul Manaf, Rabiah Ahmad, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M396 2010 raf<br/>Publication Date 2010<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Genetic based substitution techniques for audio steganographyent://SD_ILS/0/SD_ILS:7561942024-05-14T06:00:00Z2024-05-14T06:00:00Zby Mazdak Zamani, 1979-<br/>Author Mazdak Zamani, 1979-<br/>Format: Books<br/>Call Number CP 021720 ra<br/>Publication Date 2010<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Steganography in digital media : principles, algorithms, and applicationsent://SD_ILS/0/SD_ILS:7583262024-05-14T06:00:00Z2024-05-14T06:00:00Zby Fridrich, Jessica<br/>Author Fridrich, Jessica<br/>Format: Books<br/>Call Number QA76.9.A25 F75 2010<br/>Publisher Cambridge University Press,<br/>Publication Date 2010<br/>ISBN 9780521190190<br/>2D barcode application in authenticating genuine goods product through a mobile deviceent://SD_ILS/0/SD_ILS:7592682024-05-14T06:00:00Z2024-05-14T06:00:00Zby Asvhini Subramaniam, 1985-<br/>Author Asvhini Subramaniam, 1985-<br/>Format: Books<br/>Call Number CP 024821 ra<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Sistem pengesanan penumpang kapal terbang melalui tiket menggunakan teknologi RFID dan SMSent://SD_ILS/0/SD_ILS:7594062024-05-14T06:00:00Z2024-05-14T06:00:00Zby Azzaharul Hamdi Abdul Aziz<br/>Author Azzaharul Hamdi Abdul Aziz<br/>Format: Books<br/>Call Number CP 024809 ra<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Preventing web defacement using encryption techniqueent://SD_ILS/0/SD_ILS:7602912024-05-14T06:00:00Z2024-05-14T06:00:00Zby Mazuin Nihar Noor Ali, 1987-<br/>Author Mazuin Nihar Noor Ali, 1987-, Mazleena Salleh, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M397 2010 raf<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Preventing web defacement using encryption techniqueent://SD_ILS/0/SD_ILS:7602922024-05-14T06:00:00Z2024-05-14T06:00:00Zby Mazuin Nihar Noor Ali, 1987-<br/>Author Mazuin Nihar Noor Ali, 1987-<br/>Format: Books<br/>Call Number CP 026487 ra<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/>DIGITAL IMAGE WATERMARKING SYSTEM FOR CHECK IMAGE AUTHENTICITY BASED-ON DWT TECHNIQUESent://SD_ILS/0/SD_ILS:8361762024-05-14T06:00:00Z2024-05-14T06:00:00Zby Abdalrahman Salem Alfagi, 1977-, author<br/>Author Abdalrahman Salem Alfagi, 1977-, author, Azizah Abd. Manaf, Prof.Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034122 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2010<br/>Thesis (Sarjana) - Universiti Teknologi Malaysia, 2010<br/>Detecting plaintext recovery attack in secure shell (SSH)ent://SD_ILS/0/SD_ILS:3967172024-05-14T06:00:00Z2024-05-14T06:00:00Zby Zaid Mujaiyid Putra Ahmad Baidowi, 1980-<br/>Author Zaid Mujaiyid Putra Ahmad Baidowi, 1980-, Shukor Abd. Razak, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 Z35 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>The robust steganography technique based on location look-up table (LLUT)ent://SD_ILS/0/SD_ILS:8397562024-05-14T06:00:00Z2024-05-14T06:00:00Zby Abdulrashid Abba Ali<br/>Author Abdulrashid Abba Ali, Azizah Abdul Manaf, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A238 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>A secure and enhanced high embeding capacity steganography based on pixel indicator algorithment://SD_ILS/0/SD_ILS:6010992024-05-14T06:00:00Z2024-05-14T06:00:00Zby Fouziah Saleh Abdullah Aleidan, 1983-<br/>Author Fouziah Saleh Abdullah Aleidan, 1983-<br/>Format: Computer file<br/>Call Number CP 027139 ra<br/>Publication Date 2009<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>Next generation SSH2 implementation : securing data in motionent://SD_ILS/0/SD_ILS:2820242024-05-14T06:00:00Z2024-05-14T06:00:00Zby Liu, Dale<br/>Author Liu, Dale<br/>Format: Books<br/>Call Number QA76.9.A25 L58 2009<br/>Publisher Syngress,<br/>Publication Date 2009<br/>ISBN 9781597492836<br/>Security of information and communication networksent://SD_ILS/0/SD_ILS:2821112024-05-14T06:00:00Z2024-05-14T06:00:00Zby Kartalopoulos, Stamatios V.<br/>Author Kartalopoulos, Stamatios V.<br/>Format: Books<br/>Call Number TK5105.59 K37 2009<br/>Publisher Wiley-IEEE Press,<br/>Publication Date 2009<br/>ISBN 9780470290255<br/>Multimedia forensics and securityent://SD_ILS/0/SD_ILS:2828552024-05-14T06:00:00Z2024-05-14T06:00:00Zby Li, Chang-Tsun<br/>Author Li, Chang-Tsun<br/>Format: Books<br/>Call Number QA76.575 M94 2009<br/>Publisher Information Science Reference,<br/>Publication Date 2009<br/>ISBN 9781599048697<br/>Cryptographic engineeringent://SD_ILS/0/SD_ILS:2924152024-05-14T06:00:00Z2024-05-14T06:00:00Zby Koc, Cetin Kaya<br/>Author Koc, Cetin Kaya<br/>Format: Books<br/>Call Number TK7895.E42 C79 2009<br/>Publisher Springer,<br/>Publication Date 2009<br/>ISBN 9780387718163<br/>A secure and enhanced high embeding capacity steganography based on pixel indicator algorithment://SD_ILS/0/SD_ILS:3717932024-05-14T06:00:00Z2024-05-14T06:00:00Zby Fouziah Saleh Abdullah Aleidan, 1983-<br/>Author Fouziah Saleh Abdullah Aleidan, 1983-, Azizah Abdul Manaf, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 F68 2009 raf<br/>Publication Date 2009<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>Multimedia content encryption : techniques and applicationsent://SD_ILS/0/SD_ILS:3281822024-05-14T06:00:00Z2024-05-14T06:00:00Zby Lian, Shiguo<br/>Author Lian, Shiguo<br/>Format: Books<br/>Call Number QA76.575 L52 2009<br/>Publisher CRC Press,<br/>Publication Date 2009<br/>ISBN 9781420065275<br/>Identity-based cryptographyent://SD_ILS/0/SD_ILS:3349812024-05-14T06:00:00Z2024-05-14T06:00:00Zby Joye, Marc, 1969-<br/>Author Joye, Marc, 1969-<br/>Format: Books<br/>Call Number QA76.9.A25 I33 2009<br/>Publisher IOS Press,<br/>Publication Date 2009<br/>ISBN 9781586039479<br/>Introduction to identity-based encryptionent://SD_ILS/0/SD_ILS:2322882024-05-14T06:00:00Z2024-05-14T06:00:00Zby Martin, Luther<br/>Author Martin, Luther<br/>Format: Books<br/>Call Number QA76.9.A25 M377 2008<br/>Publisher Artech House Publishers,<br/>Publication Date 2008<br/>ISBN 9781596932388<br/>Comprehensive possible attacks on RSAent://SD_ILS/0/SD_ILS:5882922024-05-14T06:00:00Z2024-05-14T06:00:00Zby Majid Bakhtiari, 1961-<br/>Author Majid Bakhtiari, 1961-, Rabiah Ahmad, supervisor, Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 016838<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2008 20<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/>Modern cryptanalysis : techniques for advanced code breakingent://SD_ILS/0/SD_ILS:2873252024-05-14T06:00:00Z2024-05-14T06:00:00Zby Swenson, Christopher<br/>Author Swenson, Christopher<br/>Format: Books<br/>Call Number QA76.9.A25 S932 2008<br/>Publisher Wiley Publishing,<br/>Publication Date 2008<br/>ISBN 9780470135938<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:3538042024-05-14T06:00:00Z2024-05-14T06:00:00Zby Kahate, Atul<br/>Author Kahate, Atul<br/>Format: Books<br/>Call Number TK5105.59 K33 2008<br/>Edition 2nd ed.,<br/>Publisher Tata McGraw-Hill,<br/>Publication Date 2008<br/>ISBN 9780070648234<br/>Quantum bits and quantum secrets : how quantum physics is revolutionizing codes and computersent://SD_ILS/0/SD_ILS:3301552024-05-14T06:00:00Z2024-05-14T06:00:00Zby Morsch, Oliver<br/>Author Morsch, Oliver<br/>Format: Books<br/>Call Number QA76.889 M67 2008<br/>Publisher Wiley-VCH,<br/>Publication Date 2008<br/>ISBN 9783527407101<br/>Comprehensive possible attacks on RSAent://SD_ILS/0/SD_ILS:3069042024-05-14T06:00:00Z2024-05-14T06:00:00Zby Majid Bakhtiari, 1961-<br/>Author Majid Bakhtiari, 1961-, Rabiah Ahmad, supervisor, Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 M23 2008 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2008<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/>Securing information and communications systems : principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:2637952024-05-14T06:00:00Z2024-05-14T06:00:00Zby Furnell, Steven M.<br/>Author Furnell, Steven M.<br/>Format: Books<br/>Call Number QA76.9.A25 S4244 2008<br/>Publisher Artech House Publishers,<br/>Publication Date 2008<br/>ISBN 9781596932289<br/>Cryptanalytic attacks on RSAent://SD_ILS/0/SD_ILS:2640162024-05-14T06:00:00Z2024-05-14T06:00:00Zby Yan, Song Y.<br/>Author Yan, Song Y.<br/>Format: Books<br/>Call Number QA76.9.A25 Y36 2008<br/>Publisher Springer,<br/>Publication Date 2008<br/>ISBN 9780387487410<br/>Encryption and decryption for JPEG - Lossless, targa & bitmap image file format using blowfish & SEF algorithment://SD_ILS/0/SD_ILS:1961022024-05-14T06:00:00Z2024-05-14T06:00:00Zby Then, Siaw Cheik<br/>Author Then, Siaw Cheik, Samura Ali, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TK5105.59 T44 2007 raf<br/>Publication Date 2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2007<br/>Intelligent multimedia data hiding : new directionsent://SD_ILS/0/SD_ILS:1968062024-05-14T06:00:00Z2024-05-14T06:00:00Zby Pan, Jeng-Shyang<br/>Author Pan, Jeng-Shyang<br/>Format: Books<br/>Call Number QA76.9.A25 I578 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540711681<br/><a href="http://dx.doi.org/10.1007/978-3-540-71169-8">Fulltext</a><br/>Subkey generation method for symmetric - key block cryptogaphy using a chaotic mapent://SD_ILS/0/SD_ILS:2037712024-05-14T06:00:00Z2024-05-14T06:00:00Zby Niki Anis Ab. Karim<br/>Author Niki Anis Ab. Karim<br/>Format: Books<br/>Call Number QA76.76.P76 N54 2007<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Project Paper (Sarjana Muda Sains (Matematik)) - Universiti Teknologi Malaysia, 2007<br/>Applied cryptanalysis : breaking ciphers in the real worldent://SD_ILS/0/SD_ILS:1558932024-05-14T06:00:00Z2024-05-14T06:00:00Zby Stamp, Mark<br/>Author Stamp, Mark, Low, Richard M., 1967-<br/>Format: Books<br/>Call Number QA76.9.A25 S68 2007<br/>Publisher Wiley-IEEE Press,<br/>Publication Date 2007<br/>ISBN 9780470114865<br/>Multi - choices image encryption and decryption systement://SD_ILS/0/SD_ILS:1851012024-05-14T06:00:00Z2024-05-14T06:00:00Zby Ng, Pei Ling<br/>Author Ng, Pei Ling, Samura Ali, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TK5102.9 N475 2007 raf<br/>Publication Date 2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2007<br/>A customizable cryptographic service provider for an embedded cryptohardware systement://SD_ILS/0/SD_ILS:1420962024-05-14T06:00:00Z2024-05-14T06:00:00Zby Illiasaak Ahmad<br/>Author Illiasaak Ahmad<br/>Format: Books<br/>Call Number TK7895.E42 I44 2007<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2007<br/>Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5178852024-05-14T06:00:00Z2024-05-14T06:00:00Zby ACNS 2007 (2007 : Zhuhai, China)<br/>Author ACNS 2007 (2007 : Zhuhai, China), Katz, Jonathan, Yung, Moti, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001015<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540727385 9783540727378<br/><a href="http://dx.doi.org/10.1007/978-3-540-72738-5">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Foundations of Security What Every Programmer Needs to Knowent://SD_ILS/0/SD_ILS:5180332024-05-14T06:00:00Z2024-05-14T06:00:00Zby Daswani, Neil<br/>Author Daswani, Neil, Kern, Christoph, Kesavan, Anita, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000669<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9781430203773 9781590597842<br/><a href="http://dx.doi.org/10.1007/978-1-4302-0377-3">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Multi - choices image encryption and decryption systement://SD_ILS/0/SD_ILS:5745652024-05-14T06:00:00Z2024-05-14T06:00:00Zby Ng, Pei Ling<br/>Author Ng, Pei Ling, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number CP 018644 ra<br/>Publication Date 2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2007<br/>Encryption and decryption for JPEG - Lossless, targa & bitmap image file format using blowfish & SEF algorithment://SD_ILS/0/SD_ILS:5765092024-05-14T06:00:00Z2024-05-14T06:00:00Zby Then, Siaw Cheik<br/>Author Then, Siaw Cheik, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number CP 018975 ra<br/>Publication Date 2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2007<br/>Subkey generation method for symmetric - key block cryptogaphy using a chaotic mapent://SD_ILS/0/SD_ILS:5778482024-05-14T06:00:00Z2024-05-14T06:00:00Zby Niki Anis Ab. Karim<br/>Author Niki Anis Ab. Karim<br/>Format: Computer file<br/>Call Number CP 013744<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Project Paper (Sarjana Muda Sains (Matematik)) - Universiti Teknologi Malaysia, 2007<br/>Intelligent multimedia data hiding new directionsent://SD_ILS/0/SD_ILS:5799312024-05-14T06:00:00Z2024-05-14T06:00:00Zby Pan, Jeng-Shyang<br/>Author Pan, Jeng-Shyang<br/>Format: Computer file<br/>Call Number CP 11487<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540711681<br/>A customizable cryptographic service provider for an embedded cryptohardware systement://SD_ILS/0/SD_ILS:5668212024-05-14T06:00:00Z2024-05-14T06:00:00Zby Illiasaak Ahmad<br/>Author Illiasaak Ahmad<br/>Format: Computer file<br/>Call Number CP 013421<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2007<br/>Encryption/decryption of heart sound signal for telemedicine applicationent://SD_ILS/0/SD_ILS:5980832024-05-14T06:00:00Z2024-05-14T06:00:00Zby Chua, Aun Geong<br/>Author Chua, Aun Geong, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number CP 019064 ra<br/>Publication Date 2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Komputer)) - Universiti Teknologi Malaysia, 2007<br/>Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007: Proceedingsent://SD_ILS/0/SD_ILS:6256302024-05-14T06:00:00Z2024-05-14T06:00:00Zby European PKI Workshop (4th : 2007 : Palma de Mallorca, Spain)<br/>Author European PKI Workshop (4th : 2007 : Palma de Mallorca, Spain), Lopez, Javier, Ferrer, Josep L., Samarati, Pierangela, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001274<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540734086<br/><a href="http://dx.doi.org/10.1007/978-3-540-73408-6">http://dx.doi.org/10.1007/978-3-540-73408-6</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papersent://SD_ILS/0/SD_ILS:6260652024-05-14T06:00:00Z2024-05-14T06:00:00Zby SAC 2006 (2006 : Montreal, Quebec)<br/>Author SAC 2006 (2006 : Montreal, Quebec), Biham, Eli, Youssef, Amr M., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001320<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540744627<br/><a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Fast Software Encryption 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:6263782024-05-14T06:00:00Z2024-05-14T06:00:00Zby FSE 2007 (2007 : Luxembourg, Luxembourg)<br/>Author FSE 2007 (2007 : Luxembourg, Luxembourg), Biryukov, Alex, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001333<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540746195<br/><a href="http://dx.doi.org/10.1007/978-3-540-74619-5">http://dx.doi.org/10.1007/978-3-540-74619-5</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Economics of identity theft: avoidance, causes and possible curesent://SD_ILS/0/SD_ILS:5155712024-05-14T06:00:00Z2024-05-14T06:00:00Zby Camp, L. Jean<br/>Author Camp, L. Jean, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000637<br/>Publisher Springer Science+Business Media, LLC,<br/>Publication Date 2007<br/>ISBN 9780387686141 9780387345895<br/><a href="http://dx.doi.org/10.1007/978-0-387-68614-1">Full Text</a><br/>Accessible within UTM campus<br/>Encryption/decryption of heart sound signal for telemedicine applicationent://SD_ILS/0/SD_ILS:3628562024-05-14T06:00:00Z2024-05-14T06:00:00Zby Chua, Aun Geong<br/>Author Chua, Aun Geong, Sheikh Hussain Shaikh Salleh, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TK5105.59 C48 2007 raf<br/>Publication Date 2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Komputer)) - Universiti Teknologi Malaysia, 2007<br/>Security with noisy data : on private biometrics, secure key storage and anti-counterfeitingent://SD_ILS/0/SD_ILS:2620892024-05-14T06:00:00Z2024-05-14T06:00:00Zby Tuyls, Pim<br/>Author Tuyls, Pim, Skoric, Boris, Kevenaar, Thomas Andreas Maria, 1961-<br/>Format: Books<br/>Call Number TK7867.5 S42 2007<br/>Publisher Springer-Verlag,<br/>Publication Date 2007<br/>ISBN 9781846289835<br/>Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, revised selected papersent://SD_ILS/0/SD_ILS:2829432024-05-14T06:00:00Z2024-05-14T06:00:00Zby Adams, Carlisle 1961-<br/>Author Adams, Carlisle 1961-, Miri, Ali, Wiener, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 S45 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540773597<br/>Cryptography and security services : mechanisms and applicationsent://SD_ILS/0/SD_ILS:2853262024-05-14T06:00:00Z2024-05-14T06:00:00Zby Mogollon, Manuel<br/>Author Mogollon, Manuel<br/>Format: Books<br/>Call Number QA76.9.A25 M634 2007<br/>Publisher CyberTech Publishing,<br/>Publication Date 2007<br/>ISBN 9781599048376<br/>Encryption application on mobile phoneent://SD_ILS/0/SD_ILS:3083302024-05-14T06:00:00Z2024-05-14T06:00:00Zby Ong, Wai Yip<br/>Author Ong, Wai Yip, Samura Ali, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TK5103.2 O55 2007 raf<br/>Publication Date 2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2007<br/>Multimedia encryption and authentication techniques and applicationsent://SD_ILS/0/SD_ILS:1039582024-05-14T06:00:00Z2024-05-14T06:00:00Zby Furht, Borko<br/>Author Furht, Borko, Kirovski, Darko<br/>Format: Books<br/>Call Number QA76.575 M83185 2006<br/>Publisher Auerbach Publications,<br/>Publication Date 2006<br/>ISBN 9780849372124<br/>Cryptography and network security : principles and practicesent://SD_ILS/0/SD_ILS:1096022024-05-14T06:00:00Z2024-05-14T06:00:00Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S713 2006<br/>Edition 4th. ed.<br/>Publisher Pearson,<br/>Publication Date 2006<br/>ISBN 9780131873162<br/>Data protection using advanced encryption standard (AES)ent://SD_ILS/0/SD_ILS:1099172024-05-14T06:00:00Z2024-05-14T06:00:00Zby Siti Dhalia Adzim Muhamod Adzim<br/>Author Siti Dhalia Adzim Muhamod Adzim<br/>Format: Books<br/>Call Number QA76.9.A25 S34 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2006<br/>Design and implementation of the advanced encryption standard (AES) using field programmable gate arrays (FPGA)ent://SD_ILS/0/SD_ILS:1118162024-05-14T06:00:00Z2024-05-14T06:00:00Zby Syaiful Anuar Zakaria<br/>Author Syaiful Anuar Zakaria<br/>Format: Books<br/>Call Number QA76.9.A25 S94 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2006<br/>e-secure file transfer system (based on secure examination paper preparation case study )ent://SD_ILS/0/SD_ILS:1119612024-05-14T06:00:00Z2024-05-14T06:00:00Zby Yee, Thee Gee<br/>Author Yee, Thee Gee<br/>Format: Books<br/>Call Number QA76.9.A25 Y43 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Komputer)) - Universiti Teknologi Malaysia, 2006<br/>Algebraic aspects of the Advanced Encryption Standardent://SD_ILS/0/SD_ILS:1578372024-05-14T06:00:00Z2024-05-14T06:00:00Zby Cid, Carlos<br/>Author Cid, Carlos, Murphy, Sean, Robshaw, Matthew<br/>Format: Books<br/>Call Number QA76.9.A25 C52 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387243634<br/>Multivariate public key cryptosystemsent://SD_ILS/0/SD_ILS:1581642024-05-14T06:00:00Z2024-05-14T06:00:00Zby Ding, Jintai<br/>Author Ding, Jintai, Gower, Jason E., Schmidt, Dieter S.<br/>Format: Books<br/>Call Number QA76.9.A25 D56 2006<br/>Publisher Springer-Verlag,<br/>Publication Date 2006<br/>ISBN 9780387322292<br/>Trusted platform module basics : using TPM in embedded systemsent://SD_ILS/0/SD_ILS:1610272024-05-14T06:00:00Z2024-05-14T06:00:00Zby Kinney, Steven<br/>Author Kinney, Steven<br/>Format: Books<br/>Call Number TK7895.E42 K56 2006<br/>Publisher Newnes,<br/>Publication Date 2006<br/>ISBN 9780750679602 9780750679527<br/>CryptoGraphics : exploiting graphics cards for securityent://SD_ILS/0/SD_ILS:1875592024-05-14T06:00:00Z2024-05-14T06:00:00Zby Cook, Debra L.<br/>Author Cook, Debra L., Keromytis, Angelos<br/>Format: Books<br/>Call Number QA76.9.D314 C66 2006<br/>Publisher Springer-Verlag,<br/>Publication Date 2006<br/>ISBN 9780387290157<br/>Quantum cryptography and secret-key distillationent://SD_ILS/0/SD_ILS:1349382024-05-14T06:00:00Z2024-05-14T06:00:00Zby Van Assche, Gilles<br/>Author Van Assche, Gilles<br/>Format: Books<br/>Call Number QA76.9.A25 V36 2006<br/>Publisher Cambridge University Press,<br/>Publication Date 2006<br/>ISBN 9780521864855<br/>Encryption using Triple DES, new DES and DES-X algorithment://SD_ILS/0/SD_ILS:1266032024-05-14T06:00:00Z2024-05-14T06:00:00Zby Thilakan Krishanansamy<br/>Author Thilakan Krishanansamy<br/>Format: Books<br/>Call Number QA76.9.A25 T74 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Elektronik)) - Universiti Teknologi Malaysia, 2006<br/>A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systemsent://SD_ILS/0/SD_ILS:6175732024-05-14T06:00:00Z2024-05-14T06:00:00Zby Arul Paniandi<br/>Author Arul Paniandi<br/>Format: Computer file<br/>Call Number CP 11872<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2006<br/>A classical introduction to cryptography exercise bookent://SD_ILS/0/SD_ILS:5154122024-05-14T06:00:00Z2024-05-14T06:00:00Zby Baigeneres, Thomas<br/>Author Baigeneres, Thomas, Junod, Pascal, Lu, Yi, Monnerat, Jean, Vaudenay, Serge<br/>Format: Computer file<br/>Call Number EB 000051<br/>Publisher Springer Science+Business Media, Inc.<br/>Publication Date 2006<br/>ISBN 9780387288352<br/><a href="http://dx.doi.org/10.1007/0-387-28835-X">Full Text</a><br/>Accessible within UTM campus<br/>Trusted platform module basics using TPM in embedded systemsent://SD_ILS/0/SD_ILS:5709302024-05-14T06:00:00Z2024-05-14T06:00:00Zby Kinney, Steven<br/>Author Kinney, Steven<br/>Format: Computer file<br/>Call Number CP 8937<br/>Publisher Newnes,<br/>Publication Date 2006<br/>ISBN 9780750679602 9780750679527<br/>A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systemsent://SD_ILS/0/SD_ILS:4700962024-05-14T06:00:00Z2024-05-14T06:00:00Zby Arul Paniandi<br/>Author Arul Paniandi<br/>Format: Books<br/>Call Number QA76.9.A25 A78 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=46297">Preview</a><br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2006<br/>Hybrid encryption technology : a performance analysisent://SD_ILS/0/SD_ILS:4716492024-05-14T06:00:00Z2024-05-14T06:00:00Zby Shakirah Abdul Karim<br/>Author Shakirah Abdul Karim<br/>Format: Books<br/>Call Number QA76.9.A25 S324 2006 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2006<br/>Authentification codes and combinatorial designsent://SD_ILS/0/SD_ILS:1432222024-05-14T06:00:00Z2024-05-14T06:00:00Zby Pei, Dingyi<br/>Author Pei, Dingyi<br/>Format: Books<br/>Call Number QA76.9.A25 P446 2006<br/>Publisher Chapman & Hall/CRC,<br/>Publication Date 2006<br/>ISBN 9781584864738 9781584884736<br/>Concurrent zero knowledgeent://SD_ILS/0/SD_ILS:946722024-05-14T06:00:00Z2024-05-14T06:00:00Zby Rosen, Alon<br/>Author Rosen, Alon, Goldreich, Oded<br/>Format: Books<br/>Call Number QA76.9.A25 R674 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9783540329381<br/>Quantum communications and cryptographyent://SD_ILS/0/SD_ILS:4908772024-05-14T06:00:00Z2024-05-14T06:00:00Zby Sergienko, Alexander V.<br/>Author Sergienko, Alexander V.<br/>Format: Books<br/>Call Number TK5102.94 Q36 2005<br/>Publisher CRC Press,<br/>Publication Date 2006<br/>ISBN 9780849336843<br/>Codes : the guide to secrecy from ancient to modern timesent://SD_ILS/0/SD_ILS:1539512024-05-14T06:00:00Z2024-05-14T06:00:00Zby Mollin, Richard A., 1947-<br/>Author Mollin, Richard A., 1947-<br/>Format: Books<br/>Call Number QA76.9.A25 M64 2005<br/>Publisher Chapman & Hall/CRC,<br/>Publication Date 2005<br/>ISBN 9781584884705<br/>Proceedings of first international conference on cryptology in Malaysia : progress in cryptology :Mycrypt 2005, September 28-30, 2005, Kuala Lumpur, Malaysiaent://SD_ILS/0/SD_ILS:8458472024-05-14T06:00:00Z2024-05-14T06:00:00Zby International Conference on Cryptology in Malaysia (1st : 2005 : Kuala Lumpur, Malaysia)<br/>Author International Conference on Cryptology in Malaysia (1st : 2005 : Kuala Lumpur, Malaysia), Dawson, Ed (Edward) editor, Vaudenay, Serge, editor<br/>Format: Books<br/>Call Number QA76.9.A25 I554 2005<br/>Publisher Springer,<br/>Publication Date 2005<br/>ISBN 9783540289388<br/>Restricted to SpringerLink subscribers
<a href=" http://www.loc.gov/catdir/enhancements/fy0663/2005932807-d.html"> http://www.loc.gov/catdir/enhancements/fy0663/2005932807-d.html</a>
<a href=" http://www.loc.gov/catdir/enhancements/fy1401/2005932807-t.html"> http://www.loc.gov/catdir/enhancements/fy1401/2005932807-t.html</a><br/>An embedded cryptossystem implementing symmetric cipher and public-key crypto algorithms in hardwareent://SD_ILS/0/SD_ILS:6108692024-05-14T06:00:00Z2024-05-14T06:00:00Zby Hau, Yuan Wen, 1980-<br/>Author Hau, Yuan Wen, 1980-<br/>Format: Computer file<br/>Call Number CP 10721<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2005<br/>An embedded cryptossystem implementing symmetric cipher and public-key crypto algorithms in hardwareent://SD_ILS/0/SD_ILS:4406342024-05-14T06:00:00Z2024-05-14T06:00:00Zby Hau, Yuan Wen, 1980-<br/>Author Hau, Yuan Wen, 1980-<br/>Format: Books<br/>Call Number TK5102.94 H38 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=41359">Preview</a><br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2005<br/>Estimations on the security aspect of brand's electronic cash schemeent://SD_ILS/0/SD_ILS:4016972024-05-14T06:00:00Z2024-05-14T06:00:00Zby Chang, Yu Cheng<br/>Author Chang, Yu Cheng, Jasmy Yunus, Kamaruzzaman Seman, The IEE International Conference on Advanced Information Networking and Applications (19th : 2005 : Taiwan)<br/>Format: Books<br/>Call Number HG1710 C425 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Brute force : cracking the data encryption standardent://SD_ILS/0/SD_ILS:2716242024-05-14T06:00:00Z2024-05-14T06:00:00Zby Curtin, Matt<br/>Author Curtin, Matt<br/>Format: Books<br/>Call Number QA76.9.A25 C88 2005<br/>Publisher Springer,<br/>Publication Date 2005<br/>ISBN 9780387201092<br/>Information hiding : 7th international workshop, IH 2005, Barcelona, Spain, June 6-8, 2005 : revised selected papersent://SD_ILS/0/SD_ILS:1433312024-05-14T06:00:00Z2024-05-14T06:00:00Zby IH 2005 ( 2005 : Barcelona, Spain)<br/>Author IH 2005 ( 2005 : Barcelona, Spain), Barni, Mauro<br/>Format: Books<br/>Call Number QA76.9.A25 I534 2005<br/>Publisher Springer,<br/>Publication Date 2005<br/>ISBN 9783540290391<br/>Synchronizing e-securityent://SD_ILS/0/SD_ILS:3702172024-05-14T06:00:00Z2024-05-14T06:00:00Zby Williams, Godfried<br/>Author Williams, Godfried<br/>Format: Books<br/>Call Number TK5105.875.I57 W54 2004<br/>Publisher Kluwer Academic Pubs,<br/>Publication Date 2004<br/>ISBN 9781402076466<br/>Secure E-mail system with cryptography using microsoft visual C# and pretty good privacy (PGP)ent://SD_ILS/0/SD_ILS:3794092024-05-14T06:00:00Z2024-05-14T06:00:00Zby Chee, Wing Fai<br/>Author Chee, Wing Fai<br/>Format: Books<br/>Call Number HE6239.E54 C43 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2004<br/>RSA Securitys official guide to cryptographyent://SD_ILS/0/SD_ILS:6150192024-05-14T06:00:00Z2024-05-14T06:00:00Zby Burnett, Steve<br/>Author Burnett, Steve, Paine, Stephen, RSA Security<br/>Format: Computer file<br/>Call Number CP 6691<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2004<br/>ISBN 9780072254969<br/>Secure E-mail system with cryptography using microsoft visual C# and pretty good privacy (PGP)ent://SD_ILS/0/SD_ILS:6020232024-05-14T06:00:00Z2024-05-14T06:00:00Zby Chee, Wing Fai<br/>Author Chee, Wing Fai<br/>Format: Computer file<br/>Call Number CP 013139<br/>Publisher Universiti Teknology Malaysia,<br/>Publication Date 2004<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2004<br/>RSA Securitys official guide to cryptographyent://SD_ILS/0/SD_ILS:4371442024-05-14T06:00:00Z2024-05-14T06:00:00Zby Burnett, Steve<br/>Author Burnett, Steve, Paine, Stephen, RSA Security<br/>Format: Books<br/>Call Number TK5105.59 B87 2004<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2004<br/>ISBN 9780072254952<br/>Data hiding fundamentals and applications : content security in digital mediaent://SD_ILS/0/SD_ILS:3974472024-05-14T06:00:00Z2024-05-14T06:00:00Zby Sencar, Husrev T.<br/>Author Sencar, Husrev T., Ramkumar, Mahalingam, Akansu, Ali N., 1958-<br/>Format: Books<br/>Call Number QA76.575 S46 2004<br/>Publisher Elsevier Academic Press,<br/>Publication Date 2004<br/>ISBN 9780120471447<br/>Outsourcing information securityent://SD_ILS/0/SD_ILS:4253622024-05-14T06:00:00Z2024-05-14T06:00:00Zby Axelrod, C. Warren<br/>Author Axelrod, C. Warren<br/>Format: Books<br/>Call Number QA76.9.A25 A93 2004<br/>Publisher Artech House,<br/>Publication Date 2004<br/>ISBN 9781580535311<br/>Implementing SSH : strategies for optimizing the Secure Shellent://SD_ILS/0/SD_ILS:4423382024-05-14T06:00:00Z2024-05-14T06:00:00Zby Dwivedi, Himanshu<br/>Author Dwivedi, Himanshu<br/>Format: Books<br/>Call Number QA76.76.O63 D844 2004<br/>Publisher Wiley,<br/>Publication Date 2004<br/>ISBN 9780471458807<br/>Estimation on the security aspect of brand's electronic chas schemeent://SD_ILS/0/SD_ILS:3965362024-05-14T06:00:00Z2024-05-14T06:00:00Zby Chang, Yu Cheng<br/>Author Chang, Yu Cheng, Jasmy Yunus, Kamaruzzaman Seman, Australian Telecommunications Networks and Applications Conference (2004 : Sydney, Australia)<br/>Format: Books<br/>Call Number HG1710 C424 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Cryptography for dummiesent://SD_ILS/0/SD_ILS:3992162024-05-14T06:00:00Z2024-05-14T06:00:00Zby Cobb, Chey<br/>Author Cobb, Chey<br/>Format: Books<br/>Call Number QA76.9 .M35 C37 2004<br/>Publisher Wiley Pubs,<br/>Publication Date 2004<br/>ISBN 9780764541889<br/>Watermarking systems engineering : enabling digital assets security and other applicationsent://SD_ILS/0/SD_ILS:4184102024-05-14T06:00:00Z2024-05-14T06:00:00Zby Barni, Mauro<br/>Author Barni, Mauro, Bartolini, Franco, 1965-2004<br/>Format: Books<br/>Call Number QA76.9.A25 B37 2004<br/>Publisher Marcel Dekker,<br/>Publication Date 2004<br/>ISBN 9780824748067<br/>Medium voltage (3.3-40.5kV, 630-2000A) switchgear testing laboratoryent://SD_ILS/0/SD_ILS:69652024-05-14T06:00:00Z2024-05-14T06:00:00Zby Denise Marie Westerhout<br/>Author Denise Marie Westerhout<br/>Format: Visual Materials<br/>Call Number MFL 13182<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2003<br/>Convolutional Codec IP coreent://SD_ILS/0/SD_ILS:69662024-05-14T06:00:00Z2024-05-14T06:00:00Zby Azlina Zainuddin<br/>Author Azlina Zainuddin<br/>Format: Visual Materials<br/>Call Number MFL 13039<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Kejuruteraan Elektrik (Komputer) - Universiti Teknologi Malaysia, 2003<br/>Secured messaging systement://SD_ILS/0/SD_ILS:81662024-05-14T06:00:00Z2024-05-14T06:00:00ZFormat: Visual Materials<br/>Call Number MFL 13177<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2003<br/>Video encryption in real time using secret key crytographyent://SD_ILS/0/SD_ILS:82742024-05-14T06:00:00Z2024-05-14T06:00:00Zby Pushpan, Anthony Devadason<br/>Author Pushpan, Anthony Devadason<br/>Format: Visual Materials<br/>Call Number MFL 12887<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains komputer) - Universiti Teknologi Malaysia, 2003<br/>Digital design of the encryption hardware based on twofish algorithment://SD_ILS/0/SD_ILS:3571162024-05-14T06:00:00Z2024-05-14T06:00:00Zby Firdaus Kamarudin<br/>Author Firdaus Kamarudin<br/>Format: Books<br/>Call Number QA76.9.A25 F57 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Kejuruteraan Elektrik (Komputer)) - Universiti Teknologi Malaysia, 2003<br/>Secured messaging systement://SD_ILS/0/SD_ILS:3830422024-05-14T06:00:00Z2024-05-14T06:00:00Zby Abd. Rahim Mat Sidek<br/>Author Abd. Rahim Mat Sidek<br/>Format: Books<br/>Call Number TK5105.59 A72 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=58370">Full text</a><br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2003<br/>Hardware Implementation of RC6 algorithm using VHDLent://SD_ILS/0/SD_ILS:6032972024-05-14T06:00:00Z2024-05-14T06:00:00Zby Muniswaran Krishnan<br/>Author Muniswaran Krishnan<br/>Format: Computer file<br/>Call Number CP 6604<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik Elektronik)) - Universiti Teknologi Malaysia, 2003<br/>Image encryption algorithm based on chaotic mappingent://SD_ILS/0/SD_ILS:6062282024-05-14T06:00:00Z2024-05-14T06:00:00Zby Mazleena Salleh<br/>Author Mazleena Salleh, Subariah Ibrahim, Ismail Fauzi Isnin<br/>Format: Computer file<br/>Publication Date 2003<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?id=15503">Full text</a><br/>Secured messaging systement://SD_ILS/0/SD_ILS:6024532024-05-14T06:00:00Z2024-05-14T06:00:00Zby Abd. Rahim Mat Sidek<br/>Author Abd. Rahim Mat Sidek<br/>Format: Computer file<br/>Call Number CP 5835<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2003<br/>System-on-chip architectures and implementations for private-key data encryptionent://SD_ILS/0/SD_ILS:4093912024-05-14T06:00:00Z2024-05-14T06:00:00Zby McLoone, Maire<br/>Author McLoone, Maire, McCanny, J. V.<br/>Format: Books<br/>Call Number QA76.9.A25 M564 2003<br/>Publisher Kluwer Academic/Plenum Publishers,<br/>Publication Date 2003<br/>ISBN 9780306478826<br/>Hardware implementation of RC6 algorithm using VHDLent://SD_ILS/0/SD_ILS:3888812024-05-14T06:00:00Z2024-05-14T06:00:00Zby Muniswaran Krishnan<br/>Author Muniswaran Krishnan<br/>Format: Books<br/>Call Number Z103 M86 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik Elektronik)) - Universiti Teknologi Malaysia, 2003<br/>Undang-undang siber Malaysia : (hingga 20hb. Disember 2003)ent://SD_ILS/0/SD_ILS:4009512024-05-14T06:00:00Z2024-05-14T06:00:00Zby Lembaga Penyelidikan Undang-Undang<br/>Author Lembaga Penyelidikan Undang-Undang<br/>Format: Books<br/>Call Number KPG1066 U52 2003<br/>Publisher International Law Book Services,<br/>Publication Date 2003<br/>ISBN 9789678913287<br/>Financial cryptography : 6th International Conference, FC 2002 Southampton, Bermuda, March 11-14, 2002 : revised papersent://SD_ILS/0/SD_ILS:3971822024-05-14T06:00:00Z2024-05-14T06:00:00Zby International conference Financial cryptography, (6th : 2002 : Southamton, Bermuda Islands)<br/>Author International conference Financial cryptography, (6th : 2002 : Southamton, Bermuda Islands), Blaze, Matt<br/>Format: Books<br/>Call Number HG1710 F56 2003<br/>Publisher Springer-Verlag,<br/>Publication Date 2003<br/>ISBN 9783540006466<br/>Multimedia data hidingent://SD_ILS/0/SD_ILS:3463582024-05-14T06:00:00Z2024-05-14T06:00:00Zby Wu, Min, 1974-<br/>Author Wu, Min, 1974-, Liu, Bede<br/>Format: Books<br/>Call Number QA76.575 W85 2003<br/>Publisher Springer Verlag,<br/>Publication Date 2003<br/>ISBN 9780387954264<br/>Secure file transfer using twofish encryptionent://SD_ILS/0/SD_ILS:3593602024-05-14T06:00:00Z2024-05-14T06:00:00Zby Mohd. Azlishah Othman<br/>Author Mohd. Azlishah Othman<br/>Format: Books<br/>Call Number QA76.9.A25 M394 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Bachelor of Electrical Engineering (Telecommunication)) - Universiti Teknologi Malaysia, 2003<br/>Internet security : cryptographic principles, algorithms, and protocolsent://SD_ILS/0/SD_ILS:3402352024-05-14T06:00:00Z2024-05-14T06:00:00Zby Rhee, Man Young<br/>Author Rhee, Man Young<br/>Format: Books<br/>Call Number TK5105.875.I57 R44 2003<br/>Publisher J. Wiley,<br/>Publication Date 2003<br/>ISBN 9780470852859<br/>Cryptography and network security : principles and practicesent://SD_ILS/0/SD_ILS:3402402024-05-14T06:00:00Z2024-05-14T06:00:00Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S713 2003<br/>Edition 3rd ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2003<br/>ISBN 9780130914293<br/>Graphical password for symmetric encryptionent://SD_ILS/0/SD_ILS:3448992024-05-14T06:00:00Z2024-05-14T06:00:00Zby Sagathevan Sundrarajoo<br/>Author Sagathevan Sundrarajoo<br/>Format: Books<br/>Call Number QA76.9.A25 S24 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:3548532024-05-14T06:00:00Z2024-05-14T06:00:00Zby Kahate, Atul<br/>Author Kahate, Atul<br/>Format: Books<br/>Call Number TK5105.59 K33 2003<br/>Publisher Tata McGraw-Hill,<br/>Publication Date 2003<br/>ISBN 9780070494831<br/>Secure E-voting with blind signatureent://SD_ILS/0/SD_ILS:3274562024-05-14T06:00:00Z2024-05-14T06:00:00Zby Subariah Ibrahim<br/>Author Subariah Ibrahim, Maznah Kamat, 1960-, Mazleena Salleh, Shah Rizan Abdul Aziz, National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 S424 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Simulation and analysis of six-phase power transmission faultent://SD_ILS/0/SD_ILS:71692024-05-14T06:00:00Z2024-05-14T06:00:00Zby Goh, Alvin Shing Chye<br/>Author Goh, Alvin Shing Chye<br/>Format: Visual Materials<br/>Call Number MFL 12802<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2003<br/>Virtual optical laboratory (transmission of signal through an optical fiber)ent://SD_ILS/0/SD_ILS:135092024-05-14T06:00:00Z2024-05-14T06:00:00Zby Ahmad Syihan Shoib<br/>Author Ahmad Syihan Shoib<br/>Format: Visual Materials<br/>Call Number MFL 12321 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Bachelor of Electrical Engineering (Telecommunication)) - Universiti Teknologi Malaysia, 2002<br/>Investigation on the performance of protective equipment under application of switching impulse and high voltage alternating currentent://SD_ILS/0/SD_ILS:213442024-05-14T06:00:00Z2024-05-14T06:00:00Zby Chitaram Shathasivam<br/>Author Chitaram Shathasivam<br/>Format: Visual Materials<br/>Call Number MFL 12335<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2002<br/>Database encrytion schemes : a comparative studyent://SD_ILS/0/SD_ILS:3515112024-05-14T06:00:00Z2024-05-14T06:00:00Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Norbik Bashah Idris, Harihodin Selamat, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A25 Z34 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Ciphering key of chaos image encryptionent://SD_ILS/0/SD_ILS:3161412024-05-14T06:00:00Z2024-05-14T06:00:00Zby Mazleena Salleh<br/>Author Mazleena Salleh, Subariah Ibrahim, Ismail Fauzi Isnin, International Conference on Artificial Intelligence in Engineering and Technology (2002 : Universiti Malaysia Sabah, Kota Kinabalu)<br/>Format: Books<br/>Call Number TA1630 M39 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Digital certificate service using LDAP directoryent://SD_ILS/0/SD_ILS:3224982024-05-14T06:00:00Z2024-05-14T06:00:00Zby Subariah Ibrahim<br/>Author Subariah Ibrahim, Son, Yeo Yiin, Mazleena Salleh, Lui, Yeok Peng, Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number QA76.9.A25 D53 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Virtual encryption driver using blowfish algorithment://SD_ILS/0/SD_ILS:3210332024-05-14T06:00:00Z2024-05-14T06:00:00Zby Tay, Kwai Ping<br/>Author Tay, Kwai Ping<br/>Format: Books<br/>Call Number Z103 T39 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Bachelor of Electrical Engineering (Computer)) - Universiti Teknologi Malaysia, 2002<br/>Speed supervisory control via parallel portent://SD_ILS/0/SD_ILS:71722024-05-14T06:00:00Z2024-05-14T06:00:00Zby Chan, Noel Zen Kim<br/>Author Chan, Noel Zen Kim<br/>Format: Visual Materials<br/>Call Number MFL 12812<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2002<br/>Non-repudiation in electronic commerceent://SD_ILS/0/SD_ILS:3170732024-05-14T06:00:00Z2024-05-14T06:00:00Zby Zhou, Jianying<br/>Author Zhou, Jianying<br/>Format: Books<br/>Call Number HF5548.32 Z49 2001<br/>Publisher Artech House,<br/>Publication Date 2001<br/>ISBN 9781580532471<br/>Electronic payment systems for e-commerceent://SD_ILS/0/SD_ILS:3174712024-05-14T06:00:00Z2024-05-14T06:00:00Zby O'Mahony, Donal, 1961-<br/>Author O'Mahony, Donal, 1961-, Peirce, M. A. (Michael A.)<br/>Format: Books<br/>Call Number HG1710 O45 2001<br/>Edition 2nd ed.<br/>Publisher Artech House,<br/>Publication Date 2001<br/>ISBN 9781580532686<br/>Java application in Data Encryption Standard (DES)ent://SD_ILS/0/SD_ILS:1468802024-05-14T06:00:00Z2024-05-14T06:00:00Zby Khaw, Guat Hoon<br/>Author Khaw, Guat Hoon<br/>Format: Books<br/>Call Number Z103 K32 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2000<br/>Implementation of pipelined data encryption standard (DES) using altera CPLDent://SD_ILS/0/SD_ILS:1354622024-05-14T06:00:00Z2024-05-14T06:00:00Zby Teo, Pock Chueng<br/>Author Teo, Pock Chueng, Zulkarnain Mohd. Yusof, Ahmad Zuri Sha'ameri, International Conference on Intelligent System (2000 : Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A43 T46 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>A traceable proactive anonymous electronic cashent://SD_ILS/0/SD_ILS:1395382024-05-14T06:00:00Z2024-05-14T06:00:00Zby Chang, Yu Cheng<br/>Author Chang, Yu Cheng, Kamaruzzaman Seman, Jasmy Yunus, National Conference on Telecommunication Technology 2000 (2000 : Johor Bahru)<br/>Format: Books<br/>Call Number TK5102.94 C42 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Design of new block and stream cipher encryption algorithms for data securityent://SD_ILS/0/SD_ILS:3357522024-05-14T06:00:00Z2024-05-14T06:00:00Zby Tuan Sabri Tuan Mat @ Tuan Muhammad<br/>Author Tuan Sabri Tuan Mat @ Tuan Muhammad<br/>Format: Books<br/>Call Number QA76.9.A25 T72 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Thesis (Doctor of Philisophy) - Universiti Teknologi Malaysia, 2000<br/>Hard disk monitoring and data encryption on windows based terminalent://SD_ILS/0/SD_ILS:1166972024-05-14T06:00:00Z2024-05-14T06:00:00Zby Lee, Kong Aik<br/>Author Lee, Kong Aik<br/>Format: Books<br/>Call Number TK5105.59 L43 1999 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/>Cryptronic mailent://SD_ILS/0/SD_ILS:1242352024-05-14T06:00:00Z2024-05-14T06:00:00Zby Lim, Poay Siak<br/>Author Lim, Poay Siak<br/>Format: Books<br/>Call Number QA76.9.A25 L55 1999<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/>Web pages/server for medical electronics : medical surgery and emergency ... [et al.]ent://SD_ILS/0/SD_ILS:133002024-05-14T06:00:00Z2024-05-14T06:00:00Zby Lee, Chai Hong<br/>Author Lee, Chai Hong, Lee, Kong Aik, Logeswari M. Shanmugam, Low, Ho Chit, Sivalingam R. Savassamy<br/>Format: Visual Materials<br/>Call Number MFL 9737<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/>Anonymous electronic commerce and micropaymentent://SD_ILS/0/SD_ILS:1118082024-05-14T06:00:00Z2024-05-14T06:00:00Zby Chang, Yu Cheng<br/>Author Chang, Yu Cheng, Kamaruzzaman Seman, Jasmy Yunus<br/>Format: Books<br/>Call Number HG1710 C42<br/>Publisher Universiti Teknologi malaysia,<br/>Publication Date 1999 1998 1997 1996 1995<br/>Field programmable gate array (FPGA) implementation of data encryption standard (DES)ent://SD_ILS/0/SD_ILS:1239262024-05-14T06:00:00Z2024-05-14T06:00:00Zby Kong, Zhi Hui<br/>Author Kong, Zhi Hui<br/>Format: Books<br/>Call Number TK7895.G36 K66 1999<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/>Design of a new stream cipher algorithment://SD_ILS/0/SD_ILS:6063362024-05-14T06:00:00Z2024-05-14T06:00:00Zby Tuan Sabri Tuan Mat<br/>Author Tuan Sabri Tuan Mat, Kamaruzzaman Seman<br/>Format: Computer file<br/>Publication Date 1999<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?id=9699">Full text</a><br/>Windows based file encryption and decryption systement://SD_ILS/0/SD_ILS:1167252024-05-14T06:00:00Z2024-05-14T06:00:00Zby Ling, Hua Lay<br/>Author Ling, Hua Lay<br/>Format: Books<br/>Call Number QA76.9.A25 L56 1999 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologoi Malaysia, 1999<br/>Cryptography and network security : principles and practicesent://SD_ILS/0/SD_ILS:1287472024-05-14T06:00:00Z2024-05-14T06:00:00Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S713 1999<br/>Edition 2nd ed.<br/>Publisher Prentice Hall,<br/>Publication Date 1999<br/>ISBN 9780138690175 9780139738197<br/>Active noise control system ... [et al.]ent://SD_ILS/0/SD_ILS:133072024-05-14T06:00:00Z2024-05-14T06:00:00Zby Lakshmi Venkatarama Subramaniam<br/>Author Lakshmi Venkatarama Subramaniam, Lee, Sen How, Ling, Hua Lay, Mat Nizam Ngathinee, Tan, Kok Kean<br/>Format: Visual Materials<br/>Call Number MFL 9763<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/>Creating and verifying digital certificate in local area networkent://SD_ILS/0/SD_ILS:1136692024-05-14T06:00:00Z2024-05-14T06:00:00Zby Nazar El-Fadil Mohamed Adam Elgazoli<br/>Author Nazar El-Fadil Mohamed Adam Elgazoli<br/>Format: Books<br/>Call Number QA76.9.A25 N395 1997 raf<br/>Publisher UTM,<br/>Publication Date 1997<br/>Thesis (Master of Science (Computer Science)) - Universiti Teknologi Malaysia, 1997<br/>Client / server untuk sistem maklumat sekolah bersepadu menggunakan SQL ... [et al.]ent://SD_ILS/0/SD_ILS:78742024-05-14T06:00:00Z2024-05-14T06:00:00Zby Chandraseegar Krishnan<br/>Author Chandraseegar Krishnan, Liew, Chee Wah, Ong, Yean Hoon, Wan Raina Wan Yusoff, Yusniza Yusoff<br/>Format: Visual Materials<br/>Call Number MFL 9154 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1997<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1988<br/>Digital cash : commerce on the netent://SD_ILS/0/SD_ILS:4681542024-05-14T06:00:00Z2024-05-14T06:00:00Zby Wayner, Peter<br/>Author Wayner, Peter<br/>Format: Books<br/>Call Number HG1710 W39 1997<br/>Edition 2nd ed<br/>Publisher AP Professional,<br/>Publication Date 1997<br/>ISBN 9780127887722<br/>The electronic privacy papers : documents on the battle for privacy in the age of surveillanceent://SD_ILS/0/SD_ILS:4816062024-05-14T06:00:00Z2024-05-14T06:00:00Zby Schneier, Bruce, 1963-<br/>Author Schneier, Bruce, 1963-, Banisar, David<br/>Format: Books<br/>Call Number JC596.2.U5 E44 1997<br/>Publisher Wiley,<br/>Publication Date 1997<br/>ISBN 9780471122975<br/>Internet security for businessent://SD_ILS/0/SD_ILS:1123762024-05-14T06:00:00Z2024-05-14T06:00:00Zby Bernstein, Terry<br/>Author Bernstein, Terry<br/>Format: Books<br/>Call Number HD30.38 I57 1996<br/>Publisher John Wiley,<br/>Publication Date 1996<br/>ISBN 9780471137528<br/>Design an expert system based on rocky for troubleshooting personal computer; VHDL modeling of input/output microprocessor device (UART); Development of a target searcher sensing and searching system; Data encryption using smart card for cryptographic key generation; Digital design automation using PSPICE and PROTEL; High speed modem using MCS 251 : part1 : hardware designent://SD_ILS/0/SD_ILS:212182024-05-14T06:00:00Z2024-05-14T06:00:00Zby Akmarhayu Ramin @ Abd. Rahim<br/>Author Akmarhayu Ramin @ Abd. Rahim, Cik Ahmad Azira Che Mohd. Ayob, Han, Si Kwong, Lee, Joo Aun, Nor Aishah Latip<br/>Format: Visual Materials<br/>Call Number MFL 8750 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1996<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1996<br/>Practical cryptography for data internetworksent://SD_ILS/0/SD_ILS:4528142024-05-14T06:00:00Z2024-05-14T06:00:00Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59.S73 1996<br/>Publisher IEEE Computer Society Press,<br/>Publication Date 1996<br/>ISBN 9780818671401<br/>Data encryption using smart card for cryptographic key generationent://SD_ILS/0/SD_ILS:4134962024-05-14T06:00:00Z2024-05-14T06:00:00Zby Lee, Joo Aun<br/>Author Lee, Joo Aun<br/>Format: Books<br/>Call Number TK7895.S62 L57 1996 raf<br/>Publisher UTM,<br/>Publication Date 1996<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1996<br/>Analysis and design of stream cipher encryption algorithmsent://SD_ILS/0/SD_ILS:6062732024-05-14T06:00:00Z2024-05-14T06:00:00Zby Tuan Sabri Tuan Mat<br/>Author Tuan Sabri Tuan Mat<br/>Format: Computer file<br/>Call Number DSK 1067<br/>Publisher UTM,<br/>Publication Date 1995<br/>The computer privacy handbookent://SD_ILS/0/SD_ILS:4104312024-05-14T06:00:00Z2024-05-14T06:00:00Zby Bacard, Andre<br/>Author Bacard, Andre<br/>Format: Books<br/>Call Number QA76.9.A25 B32 1995<br/>Publisher Peachpit Press,<br/>Publication Date 1995<br/>ISBN 9781566091718<br/>Analysis and design of stream cipher encryption algorithmsent://SD_ILS/0/SD_ILS:4234582024-05-14T06:00:00Z2024-05-14T06:00:00Zby Tuan Sabri Tuan Mat<br/>Author Tuan Sabri Tuan Mat<br/>Format: Books<br/>Call Number TK5105 T82 1995<br/>Publisher UTM,<br/>Publication Date 1995<br/>Thesis (Master of Electrical Engineering) - Universiti Teknologi Malaysia, 1995<br/>Analysis of modified improved geffe random sequence generatorent://SD_ILS/0/SD_ILS:4049712024-05-14T06:00:00Z2024-05-14T06:00:00Zby Ahmad Zuri Sha'ameri<br/>Author Ahmad Zuri Sha'ameri, Tuan Sabri Tuan Mat, Kamaruzzaman Seman, International Conference on Communication (2nd : 1995 : Langkawi)<br/>Format: Books<br/>Call Number MAK 11944 a<br/>Publisher UTM,<br/>Publication Date 1995<br/>Preliminary study of an s-band radar for rain study in tropical region; Design and implementation of a jukebox machine controller using algorithmic state machines; Analysis and design of stream cipher encryption algorithms; Ray tracing simulation for microcellular environment; Lightning impulse tests on high voltage surge arrestersent://SD_ILS/0/SD_ILS:212352024-05-14T06:00:00Z2024-05-14T06:00:00Zby Md. Lutfor Rahman<br/>Author Md. Lutfor Rahman, Moftah Makhluf Hasan, Tuan Sabri Tuan Mat, Zarina Abdul Hamid, Zulkurnain Abd. Malek<br/>Format: Visual Materials<br/>Call Number MFL 8645 ra<br/>Publisher UTM,<br/>Publication Date 1995<br/>Thesis (Master of Electrical Engineering) - Universiti Teknologi Malaysia, 1995<br/>Cryptologyent://SD_ILS/0/SD_ILS:4105592024-05-14T06:00:00Z2024-05-14T06:00:00Zby Beutelspacher, Albrecht<br/>Author Beutelspacher, Albrecht, Fisher, J. Chris<br/>Format: Books<br/>Call Number Z103 B48 1994<br/>Publisher Mathematical Association of America,<br/>Publication Date 1994<br/>ISBN 9780883855041<br/>Protection of databases using file encryptionent://SD_ILS/0/SD_ILS:3713212024-05-14T06:00:00Z2024-05-14T06:00:00Zby Eriksson, Ragnar<br/>Author Eriksson, Ragnar<br/>Format: Books<br/>Call Number MAK 15395<br/>Publication Date 1983<br/>Large block size AESent://SD_ILS/0/SD_ILS:7877752024-05-14T06:00:00Z2024-05-14T06:00:00Zby Lee, Chun How, 1988-, author<br/>Author Lee, Chun How, 1988-, author, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 L443 2012 raf<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian & Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Large block size AESent://SD_ILS/0/SD_ILS:7877772024-05-14T06:00:00Z2024-05-14T06:00:00Zby Lee, Chun How, 1988-, author<br/>Author Lee, Chun How, 1988-, author, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Electronic Resources<br/>Call Number CP 058453 ra<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian & Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/>DIGITAL IMAGE WATERMARKING SYSTEM FOR CHECK IMAGE AUTHENTICITY BASED-ON DWT TECHNIQUESent://SD_ILS/0/SD_ILS:8361752024-05-14T06:00:00Z2024-05-14T06:00:00Zby Abdalrahman Salem Alfagi, 1977-, author<br/>Author Abdalrahman Salem Alfagi, 1977-, author, Azizah Abd. Manaf, Prof.Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A233 2010 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>ENHANCE KEY GENERATOR OF DATA ENCRYPTION STANDARD (DES)ent://SD_ILS/0/SD_ILS:8378642024-05-14T06:00:00Z2024-05-14T06:00:00Zby Mahan Niknafskermani, 1982-, author<br/>Author Mahan Niknafskermani, 1982-, author, Norbik Bashah Idris, Dato’ Prof. Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M343 2012 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>Analysis and enhancement of elliptic curve cryptographyent://SD_ILS/0/SD_ILS:8390972024-05-14T06:00:00Z2024-05-14T06:00:00Zby Saeid Bakhtiari, 1987-, author<br/>Author Saeid Bakhtiari, 1987-, author, Azizah Abd. Manaf, Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 S245 2012 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>Analysis and enhancement of elliptic curve cryptographyent://SD_ILS/0/SD_ILS:8390992024-05-14T06:00:00Z2024-05-14T06:00:00Zby Saeid Bakhtiari, 1987-, author<br/>Author Saeid Bakhtiari, 1987-, author, Azizah Abd. Manaf, Prof. Dr., Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034055 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>IMPLEMENTATION OF PKCS11 and PKCS12 CRYPTOGRAPHIC FUNCTIONS IN .Net FOR SCAN ASSOCIATESent://SD_ILS/0/SD_ILS:8405532024-05-14T06:00:00Z2024-05-14T06:00:00Zby Pirooz Kiani Kori, 1975-, author<br/>Author Pirooz Kiani Kori, 1975-, author, Suhaimi Ibrahim, Assoc. Prof. Dr., supervisor, Hardiyana Abd. Rahman, supervisor, Sekolah Informatik Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 P57 2010 raf<br/>Thesis Sarjana Kejuruteraan Komputer<br/>IMPLEMENTATION OF PKCS11 and PKCS12 CRYPTOGRAPHIC FUNCTIONS IN.Net FOR SCAN ASSOCIATESent://SD_ILS/0/SD_ILS:8405542024-05-14T06:00:00Z2024-05-14T06:00:00Zby Pirooz Kiani Kori, 1975-, author<br/>Author Pirooz Kiani Kori, 1975-, author, Suhaimi Ibrahim, Assoc. Prof. Dr., supervisor, Hardiyana Abd. Rahman, supervisor, Sekolah Informatik Termaju<br/>Format: Books<br/>Call Number CP 034005 ra<br/>Thesis Sarjana Kejuruteraan Komputer<br/>DBCRYPT : (MANUAL AND TRANSPARENT ENCRYPTION/DECRYPTION)ent://SD_ILS/0/SD_ILS:8417492024-05-14T06:00:00Z2024-05-14T06:00:00Zby Mustafa Ahmed Abdullah Aqel, 1979-, author<br/>Author Mustafa Ahmed Abdullah Aqel, 1979-, author, Mohd. Nazri Kama, 1963-, supervisor, Muhammad Sufyan Basri, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M878 2007 raf<br/>Thesis Sarjana Sains (Sains Komputer - Kejuruteraan Perisian Masa Nyata)<br/>Text compression and encryptionent://SD_ILS/0/SD_ILS:2695172024-05-14T06:00:00Z2024-05-14T06:00:00Zby Luke, Walter<br/>Author Luke, Walter<br/>Format: Books<br/>Call Number MAK 2336<br/>IMPLEMENTING PROTOTYPE METHOD FOR ELECTRONIC PAYMENT FACILITY OF CERTIFICATE SERVICING SYSTEM IN MAA TAKAFULent://SD_ILS/0/SD_ILS:8594082024-05-14T06:00:00Z2024-05-14T06:00:00Zby Priya Kasi, 1979-, author<br/>Author Priya Kasi, 1979-, author, Othman Mohd. Yusop, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number HG1710 P75 2015 raf<br/>Thesis (Sarjana Kejuruteraan Perisian)-Universiti Teknologi Malaysia, 2015<br/>Restricted until 25th June 2018<br/>IMPLEMENTING PROTOTYPE METHOD FOR ELECTRONIC PAYMENT FACILITY OF CERTIFICATE SERVICING SYSTEM IN MAA TAKAFULent://SD_ILS/0/SD_ILS:8594092024-05-14T06:00:00Z2024-05-14T06:00:00Zby Priya Kasi, 1979-, author<br/>Author Priya Kasi, 1979-, author, Othman Mohd. Yusop, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034763 ra<br/>Thesis (Sarjana Kejuruteraan Perisian)-Universiti Teknologi Malaysia, 2015<br/>Restricted until 25th June 2018<br/>VERSATILE ENHANCED ENCRYPTION PROCESS (VEEP) FOR IMPROVED SECURITY IN GENERAL PURPOSE EMBEDDED DEVICE COMMUNICATIONent://SD_ILS/0/SD_ILS:8601922024-05-14T06:00:00Z2024-05-14T06:00:00Zby Muhammad Farhan Abu Bakar, 1985-, author<br/>Author Muhammad Farhan Abu Bakar, 1985-, author, Mohamad Zulkefli Adam, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 M847 2015 raf<br/>Thesis (Sarjana Sains (Kejuruteraan Sistem Komputer))-Universiti Teknologi Malaysia, 2015<br/>NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETSent://SD_ILS/0/SD_ILS:8605712024-05-14T06:00:00Z2024-05-14T06:00:00Zby Ahmad Shukri Samsuddin, 1982-, author<br/>Author Ahmad Shukri Samsuddin, 1982-, author, Azizah Abdul Manaf, Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number HV8079.C65 A363 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>DESIGNING LIGHTWEIGHT CRYPTOGRAPHY ALGORITHM FOR INTERNET OF THINGSent://SD_ILS/0/SD_ILS:8647512024-05-14T06:00:00Z2024-05-14T06:00:00Zby Mohd. Fairus Mustapha, 1980-, author<br/>Author Mohd. Fairus Mustapha, 1980-, author, Majid Bakhtiari, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035068 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>E-MAIL ENCRYPTION FRAMEWORK FOR MALAYSIAN PUBLIC SECTORent://SD_ILS/0/SD_ILS:8657492024-05-14T06:00:00Z2024-05-14T06:00:00Zby Nur Atiqah Muhammad, 1985-, author<br/>Author Nur Atiqah Muhammad, 1985-, author, Ganthan Narayana Samy, Dr., 1977-, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 064001 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/>A METHOD TO ENCRYPT INFORMATION WITH DNA-BASED CRYPTOGRAPHYent://SD_ILS/0/SD_ILS:8360132024-05-14T06:00:00Z2024-05-14T06:00:00Zby Mohammad Reza Najaf Torkaman, 1984-, author<br/>Author Mohammad Reza Najaf Torkaman, 1984-, author, Bharanidharan Shanmugam, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5102.94 M64 2011 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>ENHANCE KEY GENERATOR OF DATA ENCRYPTION STANDARD (DES)ent://SD_ILS/0/SD_ILS:8378662024-05-14T06:00:00Z2024-05-14T06:00:00Zby Mahan Niknafskermani, 1982-, author<br/>Author Mahan Niknafskermani, 1982-, author, Norbik Bashah Idris, Dato’ Prof. Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034145 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>THE DEVELOPMENT OF A KEY GENERATION APPLICATION FOR WIRELESS SECURE MODEM FOR SAPURA TECHNOLOGIES SDN BHDent://SD_ILS/0/SD_ILS:8389722024-05-14T06:00:00Z2024-05-14T06:00:00Zby Mardiana Sulaiman, author<br/>Author Mardiana Sulaiman, author, Azri Azmi, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M373 2004 raf<br/>Thesis Sarjana Sains (Sains Komputer - Kejuruteraan Perisian Masa Nyata)<br/>THE DEVELOPMENT OF A KEY GENERATION APPLICATION FOR WIRELESS SECURE MODEM FOR SAPURA TECHNOLOGIES SDN BHDent://SD_ILS/0/SD_ILS:8389732024-05-14T06:00:00Z2024-05-14T06:00:00Zby Mardiana Sulaiman, author<br/>Author Mardiana Sulaiman, author, Azri Azmi, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034588 ra<br/>Thesis Sarjana Sains (Sains Komputer - Kejuruteraan Perisian Masa Nyata)<br/>Advanced encryption standard (AES) coproessorent://SD_ILS/0/SD_ILS:8463452024-05-14T06:00:00Z2024-05-14T06:00:00Zby Lim, Joo Song, 1970- author<br/>Author Lim, Joo Song, 1970- author<br/>Format: Books<br/>Call Number CP 052861 ra<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2014<br/>VERSATILE ENHANCED ENCRYPTION PROCESS (VEEP) FOR IMPROVED SECURITY IN GENERAL PURPOSE EMBEDDED DEVICE COMMUNICATIONent://SD_ILS/0/SD_ILS:8608642024-05-14T06:00:00Z2024-05-14T06:00:00Zby Muhammad Farhan Abu Bakar, 1985-, author<br/>Author Muhammad Farhan Abu Bakar, 1985-, author, Mohamad Zulkefli Adam, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034799 ra<br/>Thesis (Sarjana Sains (Kejuruteraan Sistem Komputer))-Universiti Teknologi Malaysia, 2015<br/>NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETSent://SD_ILS/0/SD_ILS:8609202024-05-14T06:00:00Z2024-05-14T06:00:00Zby Ahmad Shukri Samsuddin, 1982-, author<br/>Author Ahmad Shukri Samsuddin, 1982-, author, Azizah Abdul Manaf, Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034808 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>DESIGNING LIGHTWEIGHT CRYPTOGRAPHY ALGORITHM FOR INTERNET OF THINGSent://SD_ILS/0/SD_ILS:8646792024-05-14T06:00:00Z2024-05-14T06:00:00Zby Mohd. Fairus Mustapha, 1980-, author<br/>Author Mohd. Fairus Mustapha, 1980-, author, Majid Bakhtiari, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 M6434 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>E-MAIL ENCRYPTION FRAMEWORK FOR MALAYSIAN PUBLIC SECTORent://SD_ILS/0/SD_ILS:8654642024-05-14T06:00:00Z2024-05-14T06:00:00Zby Nur Atiqah Muhammad, 1985-, author<br/>Author Nur Atiqah Muhammad, 1985-, author, Ganthan Narayana Samy, Dr., 1977-, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 N873 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/>Cryptographic and Information Security : Approaches for Images and Videosent://SD_ILS/0/SD_ILS:8822552024-05-14T06:00:00Z2024-05-14T06:00:00Zby Ramakrishnan, S., editor<br/>Author Ramakrishnan, S., editor<br/>Format: Books<br/>Call Number QA76.9.A25 C796 2019<br/>ISBN 9781138563841<br/>Audio Content Security : Attack Analysis on Audio Watermarkingent://SD_ILS/0/SD_ILS:8668992024-05-14T06:00:00Z2024-05-14T06:00:00Zby Sogand Ghorbani, 1988-, author<br/>Author Sogand Ghorbani, 1988-, author, Iraj Sadegh Amiri, 1977-, author<br/>Format: Books<br/>Call Number QA76.9.A25 S643 2016<br/>ISBN 9780128113837<br/>Security, Privacy and Reliability in Computer Communications and Networksent://SD_ILS/0/SD_ILS:8669672024-05-14T06:00:00Z2024-05-14T06:00:00Zby Sha, Kewei<br/>Author Sha, Kewei, Striegel, Aaron, Song, Min<br/>Format: Books<br/>Call Number TK5105.59 S43 2017<br/>ISBN 9788793379893<br/>