-
1
Development of Android/iPhone application for image processing and searching
Published 2016“…With the WeChat API, the application realize the function of comparing the captured photo with the data library for the result of target MD5 code and use the code as an index obtain the specific name of the logo in the taken photo. …”
Get full text
Thesis -
2
Demonstration (web-based) of cryptographic hashing
Published 2018“…In this report, various cryptographic hashing algorithms will be explored and the implementation of the simulator for SHA-512 and MD5 using JavaScript will be explained.…”
Get full text
Final Year Project (FYP) -
3
Preimage security evaluations on Rijndael-based hashing: a comprehensive study
Published 2023“…The Meet-in-the-Middle (MITM) attack is one of the most powerful cryptanalysis techniques, as seen by its use in preimage attacks on MD4, MD5, Tiger, HAVAL, and Haraka-512 v2 hash functions and key recovery for full-round KTANTAN. …”
Get full text
Final Year Project (FYP) -
4
Constructions of relative difference sets with classical parameters and circulant weighing matrices
Published 2009Get full text
Get full text
Journal Article -
5
A sharp exponent bound for McFarland difference sets with p=2
Published 2009Get full text
Get full text
Journal Article -
6
-
7
New hadamard matrices of order 4p^2 obtained from Jacobi sums of order 16
Published 2009Get full text
Get full text
Journal Article -
8
In search of query patterns : a case study of a university OPAC
Published 2010Get full text
Get full text
Journal Article -
9
Efficacy of integrating Chinese and modern medicine in the treatment of Sjogren’s syndrome: a systematic review and meta-analysis
Published 2022“…In addition, the improvements in tear secretion function [MD=1.48, 95%CI(1.06,1.90), p<0.00001], salivary flow rate [MD=0.46, 95%CI(0.25,0.68), p<0.0001], ESR levels [MD=-5.95, 95%CI(-7.96,-3.94), p<0.0001], CRP levels [MD=-3.45, 95%CI(-4.90,-2.01), p<0.0001], and IgG levels [MD=-2.45, 95%CI(-3.80,-1.27), p<0.001] were better than the control group. …”
Get full text
Final Year Project (FYP) -
10
On organizing and accessing geospatial and georeferenced web resources using the G-portal system
Published 2010Get full text
Get full text
Journal Article -
11
GeogDL : a Web-based approach to geography examination revision
Published 2010Get full text
Get full text
Journal Article -
12
Java-based digital library portal for geography education
Published 2010Get full text
Get full text
Journal Article -
13
Automatic search of Meet-in-the-Middle preimage attacks on AES-like hashing
Published 2022“…The Meet-in-the-Middle (MITM) preimage attack is highly effective in breaking the preimage resistance of many hash functions, including but not limited to the full MD5, HAVAL, and Tiger, and reduced SHA-0/1/2. It was also shown to be a threat to hash functions built on block ciphers like AES by Sasaki in 2011. …”
Get full text
Conference Paper