-
1by Reaz, Mamun Bin Ibne, Ibrahimy, Muhammad Ibn, Mohd-Yasin, Faisal, C., S. Wei, Kamada, Masaru“…The growth of the Internet as a vehicle for secure communication has resulted in Data Encryption…”
Published 2007
Get full text
Get full text
Get full text
-
2by Abidi, M.Ebrahim, Asnawi, Ani Liza, Mohamed Azmin, Nor Fadhillah, Jusoh, Ahmad Zamani, Ibrahim, Siti Noorjannah, Mohd Ramli, Huda Adibah, Abdul Malek, NorunSubjects: “…TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices…”
Published 2018
Get full text
Get full text
Get full text
Get full text
Get full text
-
3Subjects: “…TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices…”
Get full text
Get full text
Get full text
Get full text
-
4by Mubarak, Mohd Faizal“… Platform Module (TPM) as a tamper proof hardware to protect the integrity of RFID system. The proposed…”
Published 2010
Get full text
Get full text
-
5
-
6
-
7A new technical framework for security, trust and privacy (STP) of RFID system / Mohd Faizal Mubarakby Mubarak, Mohd Faizal“… security and privacy threats. In this thesis, we investigate how the integration and interconnection…”
Published 2015
Get full text
Get full text
-
8
-
9
-
10
-
11
-
12by Adnan, Lukman Hakim“… to that is to use embedded microprocessors with built-in security module, which implements functions similar…”
Published 2013
Get full text
Get full text
-
13by Abd Razak, Muhammad Ab. Basith“… types of wireless data transmission such as Frequency Modulation (FM), Amplitude Modulation (AM…”
Published 2008
Get full text
Get full text
-
14by Ibrahimy, Muhammad Ibn“…The growth of the Internet as a vehicle for secure communication has resulted in Data Encryption…”
Published 2007
Get full text
Get full text
Get full text
-
15by Khok, Jess Lyn“…. The resultant hardware is two sets of identical cryptography wireless module which are able to perform both…”
Published 2010
Get full text
Get full text
-
16“… the need for human intervention, increase security and energy efficiency. It is still an open research due…”
Get full text
Get full text
Get full text
-
17by Shahid, Anwar, Mohamad Fadli, Zolkipli, Zakira, Inayat, Jasni, Mohamad Zain, Abdullah, Gani, Nor Badrul, Anuar, Khan, Muhammad Khurram, Chang, Victor“… attacks according to the hardware medium they target and exploit, the ways they access the module…”
Published 2017
Get full text
Get full text
Get full text
Get full text
Get full text
-
18“… be integrated into an existing home appliances to reduce the need for human intervention, increase security…”
Get full text
Get full text
Get full text
Get full text
-
19“… in designing secure lightweight cryptographic modules is required. This paper meant to be a reference…”
Get full text
Get full text
Get full text
-
20by Reaz, Mamun Bin Ibne Ibne, Ibrahimy, Muhammad Ibn, Mohd-Yasin, F., Tan, SiewLin, Tan, HungKhoon“… FLEX10K FPGA device that allows for efficient hardware implementation. The compression algorithm…”
Published 2005
Get full text
Get full text
Get full text
Get full text
Get full text