Showing 1 - 20 results of 21 for search 'Ibrahim, Subariah', query time: 0.03s
Refine Results
-
1
Risk analysis of cyber-campus modules (security guidelines of electronic academic assets) by Ibrahim, Subariah
Published 2002
Monograph -
2
Diffusion analysis of EFN-MDS structure by Ibrahim, Subariah
Published 2006
Conference or Workshop Item -
3
Security guidelines of electronic academic assets by Ibrahim, Subariah, Salleh, Mazleena
Published 2002Conference or Workshop Item -
4
Recommended guidelines of electronic academic assets by Ibrahim, Subariah, Salleh, Mazleena
Published 2002
Monograph -
5
Diffusion analysis of EFN-MDS structure by Ibrahim, Subariah, Maarof, Mohd. Aizaini
Published 2006
Conference or Workshop Item -
6
Symmetric Key Size for Different Level of Information Classification by Ibrahim, Subariah, Maarof, Mohd. Aizaini
Published 2006
Conference or Workshop Item -
7
A Review on Biological Inspired Computation in Cryptology by Ibrahim, Subariah, Maarof, Mohd Aizaini
Published 2005
Article -
8
Modified key size determination models for symmetric ciphers by Ibrahim, Subariah, Maarof, Mohd. Aizaini
Published 2005Conference or Workshop Item -
9
Diffusion analysis af a scalable fiestel network by Ibrahim, Subariah, Maarof, Mohd. Aizaini
Published 2005Conference or Workshop Item -
10
Enhanced chaotic image encryption algorithm based on Baker's map by Salleh, Mazleena, Ibrahim, Subariah, lsnin, Fauz
Published 2003
Article -
11
Electronic Voting System: Preliminary Study by Ibrahim, Subariah, Salleh, Mazleena, Kamat, Maznah
Published 2000
Article -
12
-
13
Image encryption algorithm based on chaotic mapping by Salleh, Mazleena, Ibrahim, Subariah, Isnin, Ismail Fauzi
Published 2003
Article -
14
Avalanche Analysis of Extended Feistel Network by Ibrahim, Subariah, Maarof, Mohd. Aizaini, Idris, Norbik Bashah
Published 2005
Conference or Workshop Item -
15
-
16
Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan
Published 2003
Monograph -
17
Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan
Published 2003
Conference or Workshop Item -
18
Steganography : random LSB insertion using discrete logarithm by Mohamed Amin, Muhalim, Salleh, Mazleena, Ibrahim, Subariah, Katmin, Mohd. Rozi
Published 2003Conference or Workshop Item -
19
Information hiding using steganography by Mohamed Amin, Muhalim, Ibrahim, Subariah, Salleh, Mazleena, Katmin, Mohd. Rozi
Published 2003
Monograph -
20
Cryptanalysis in cryptographic algorithm design by Z'aba, Muhammad Reza, Ahmad, Badrisham, Ibrahim, Subariah, Maarof, Mohd. Aizaini
Published 2006Conference or Workshop Item