Showing
1 - 9
results of
9
for search '
Mat Kiah, M.L.
'
Skip to content
AUNILO IRDS | AUNILO Institutional Repository Discovery Service
FAQs
|
Search Tips
|
Feedback
Your Account
Log Out
Login
Theme
Bootstrap
Aunilo
Language
English
中文(繁體)
اللغة العربية
Toggle navigation
Home
Search/Browse Options
Search History
Advanced Search
About
About AUNILO IRDS
Content Sources
Statistics
Technical Team
Disclaimer
Privacy & Security Policy
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Mat Kiah, M.L.
Showing
1 - 9
results of
9
for search '
Mat Kiah, M.L.
'
, query time: 0.18s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael
by
Al-Bakri, S.H.
,
Mat
Kiah
,
M.L
.
Published 2010
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
2
Impact of data privacy and confidentiality on developing telemedicine applications: a review participates opinion and expert concerns
by
Zaidan, B.B.
,
Zaidan, A.A.
,
Mat
Kiah
,
M.L
.
Published 2011
Get full text
Get full text
Article
Save to List
Saved in:
3
Towards secure mobile cloud computing: a survey
by
Khan, A.N.
,
Mat
Kiah
,
M.L
.
,
Khan, S.U.
,
Madani, S.A.
Published 2012
Get full text
Get full text
Article
Save to List
Saved in:
4
Robust Pornography Classification Solving the Image Size Variation Problem Based on Multi-Agent Learning
by
Zaidan, A.A.
,
Karim, H.A.
,
Ahmad, N.N.
,
Zaidan, B.B.
,
Mat
Kiah
,
M.L
.
Published 2015
Get full text
Get full text
Article
Save to List
Saved in:
5
Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: analytical study
by
Alam, G.M.
,
Mat
Kiah
,
M.L
.
,
Zaidan, B.B.
,
Zaidan, A.A.
,
Alanazi, H.O.
Published 2010
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
6
Secure topology for electronic medical record transmissions
by
Alanazi, H.O.
,
Mat
Kiah
,
M.L
.
,
Zaidan, A.A.
,
Zaidan, B.B.
,
Alam, G.M.
Published 2010
Get full text
Get full text
Article
Save to List
Saved in:
7
Securing peer-to-peer mobile communications using public key cryptography: new security strategy
by
Al- Bakri, S.H.
,
Mat
Kiah
,
M.L
.
,
Zaidan , A. A.
,
Zaidan, B.B.
,
Alam, Gazi Mahabubul
Published 2011
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
8
A review of audio based steganography and digital watermarking
by
Mat
Kiah
,
M.L
.
,
Zaidan, B.B.
,
Zaidan, A.A.
,
Mohammed Ahmed, A.
,
Al-Bakri, S.H.
Published 2011
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
9
Securing peer-to-peer mobile communications using public key cryptography: New security strategy
by
Al-Bakri, S.H.
,
Mat
Kiah
,
M.L
.
,
Zaidan, A.A.
,
Zaidan, B.B.
,
Alam, G.M.
Published 2011
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
Search Tools:
Get RSS Feed
—
Email this Search
—
×
Loading...