Showing
1 - 20
results of
21
for search '
Yasin, Sharifah
'
Skip to content
Toggle navigation
Home
Feedback
我的帐户
Back
我的帐户
最爱
被借出的项目
持有和召回
罚款
档案
您保存的搜索
退出
登录
语言
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Search:
全文检索
题名
作者
主题
索引号
ISBN/ISSN
标签
检索
高级检索
作者
Yasin, Sharifah
Showing
1 - 20
results of
21
for search '
Yasin, Sharifah
'
, 查询时间: 0.03s
Refine Results
排序
相关性排序
日期递增
日期递增
索书号排序
作者排序
标题
选择页 | 与选定的:
电子邮件
导出
打印
保存
Select result number 1
1
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
由
Md
Yasin
,
Sharifah
出版 2011
获取全文
Thesis
加到收藏夹
Saved in:
Select result number 2
2
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
由
Md
Yasin
,
Sharifah
出版 2011
获取全文
Thesis
加到收藏夹
Saved in:
Select result number 3
3
Tripling formulae of elliptic curve over binary field in Lopez-Dahab model
由
Md
Yasin
,
Sharifah
,
Muda, Zaiton
出版 2015
获取全文
Article
加到收藏夹
Saved in:
Select result number 4
4
Email spam filtering technique: challenges and solutions
由
Md
Yasin
,
Sharifah
,
Hadi Azmi, Iqbal
出版 2023
Article
加到收藏夹
Saved in:
Select result number 5
5
Improve cloud computing security using RSA encryption with Fermat's little theorem
由
Mohamed Shereek, Balkees
,
Muda, Zaiton
,
Yasin
,
Sharifah
出版 2014
获取全文
Article
加到收藏夹
Saved in:
Select result number 6
6
New key expansion function of rijndael 128-bit resistance to the related-key attacks
由
Hussien, Hassan Mansur
,
Muda, Zaiton
,
Md
Yasin
,
Sharifah
出版 2018
获取全文
Article
加到收藏夹
Saved in:
Select result number 7
7
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits
由
Hussien, Hassan Mansour
,
Muda, Zaiton
,
Md.
Yasin
,
Sharifah
出版 2017
获取全文
Conference or Workshop Item
加到收藏夹
Saved in:
Select result number 8
8
Systematic review of intrusion detection system based on machine learning techniques for internet of things
由
Idris, Muhammad
,
Md
Yasin
,
Sharifah
,
Audi, Giade Hamza
出版 2023
Article
加到收藏夹
Saved in:
Select result number 9
9
Performance analysis of signed digit {0,1,3}-NAF scalar multiplication algorithm in Lopez Dahab model
由
Md.
Yasin
,
Sharifah
,
Mahmod, Ramlan
,
Nor, Rozi Nor Haizan
出版 2015
Article
加到收藏夹
Saved in:
Select result number 10
10
Comparison of ECC and RSA algorithms in IOT devices
由
Vahdati, Zeinab
,
Md
Yasin
,
Sharifah
,
Nesheli, Ali Ghasempour
,
Salehi, Mohammad
出版 2019
获取全文
Article
加到收藏夹
Saved in:
Select result number 11
11
{0, 1, 3}-NAF representation and algorithms for lightweight elliptic curve cryptosystem in Lopez Dahab model
由
Md.
Yasin
,
Sharifah
,
Nor, Rozi Nor Haizan
,
Din, Jamilah
,
Muda, Zaiton
出版 2014
获取全文
Article
加到收藏夹
Saved in:
Select result number 12
12
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
由
Hussien, Hassan Mansur
,
Md
Yasin
,
Sharifah
,
Muda, Zaiton
,
Udzir, Nur Izura
出版 2019
获取全文
Article
加到收藏夹
Saved in:
Select result number 13
13
New DNA based dynamical S-Box for block cipher
由
Chng, Chern Wei
,
Md.
Yasin
,
Sharifah
,
Abdullah, Mohd. Taufik
,
Udzir, Nur Izura
出版 2018
获取全文
Article
加到收藏夹
Saved in:
Select result number 14
14
Blockchain-based access control scheme for secure shared personal health records over decentralised storage
由
Hussien, Hassan Mansur
,
Md
Yasin
,
Sharifah
,
Udzir, Nur Izura
,
Ninggal, Mohd Izuan Hafez
出版 2021
Article
加到收藏夹
Saved in:
Select result number 15
15
Graphical user authentication algorithm for mobile banking user
由
Ugochukwu, Ejike Ekeke Kingsley
,
Jusoh, Yusmadi Yah
,
Md
Yasin
,
Sharifah
,
Abdullah, Azizol
,
Abdullah, Salfarina
出版 2018
获取全文
Article
加到收藏夹
Saved in:
Select result number 16
16
Improving the performance of {0,1,3}-NAF recoding algorithm for elliptic curve scalar multiplication
由
Abdul Raheem, Waleed K.
,
Md
Yasin
,
Sharifah
,
Udzir, Nur Izura
,
Kamel Ariffin, Muhammad Rezal
出版 2019
获取全文
Article
加到收藏夹
Saved in:
Select result number 17
17
CSNTSteg: color spacing normalization text steganography model to improve capacity and invisibility of hidden data
由
Thabit, Reema
,
Udzir, Nur Izura
,
Md
Yasin
,
Sharifah
,
Asmawi, Aziah
,
Abdul-Aziz Gutub, Adnan
出版 2022
Article
加到收藏夹
Saved in:
Select result number 18
18
Blockchain technology in the healthcare industry: trends and opportunities
由
Hussien, Hassan Mansur
,
Md
Yasin
,
Sharifah
,
Udzir, Nur Izura
,
Ninggal, Mohd Izuan Hafez
,
Salman, Sadeq
出版 2021
Article
加到收藏夹
Saved in:
Select result number 19
19
Key dependent dynamic S-Boxes on 3D cellular automata for block cipher
由
Md
Yasin
,
Sharifah
,
Hamid, Ayman Majid
,
Udzir, Nur Izura
,
Turaev, Sherzod
,
Kamel Ariffin, Muhammad Rezal
出版 2020
获取全文
Article
加到收藏夹
Saved in:
Select result number 20
20
New quintupling point arithmetic 5P formulas for Lŏpez-Dahab coordinate over binary elliptic curve cryptography
由
Abdul Raheem, Waleed Khalid Amin
,
Md
Yasin
,
Sharifah
,
Udzir, Nur Izura
,
Kamel Ariffin, Muhammad Rezal
出版 2019
获取全文
Article
加到收藏夹
Saved in:
选择页 | 与选定的:
电子邮件
导出
打印
保存
1
2
下一个 »
[2]
检索工具:
得到RSS订阅
—
推荐此搜索
—
×
载入...