Azman Samsudin

Orcid: 0000-0001-9981-7958

According to our database1, Azman Samsudin authored at least 42 papers between 1997 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The rise of website fingerprinting on Tor: Analysis on techniques and assumptions.
J. Netw. Comput. Appl., March, 2023

2021
Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey.
Sensors, 2021

An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain.
IEEE Access, 2021

Using Blockchain in Cloud Computing to Enhance Relational Database Security.
IEEE Access, 2021

A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence.
IEEE Access, 2021

2020
Integrity verification for digital Holy Quran verses using cryptographic hash function and compression.
J. King Saud Univ. Comput. Inf. Sci., 2020

Enhanced digital chaotic maps based on bit reversal with applications in random bit generators.
Inf. Sci., 2020

A post-processing method for true random number generators based on hyperchaos with applications in audio-based generators.
Frontiers Comput. Sci., 2020

2019
An image encryption scheme based on hybridizing digital chaos and finite state machine.
Signal Process., 2019

A new hybrid digital chaotic system with applications in image encryption.
Signal Process., 2019

Digital Cosine Chaotic Map for Cryptographic Applications.
IEEE Access, 2019

Enhancing One-Dimensional Chaotic Map Based on Bitstream Dividing Model.
Proceedings of the 8th International Conference on Software and Computer Applications, 2019

2018
Quantum reversible circuit of AES-128.
Quantum Inf. Process., 2018

Quantum Grover Attack on the Simplified-AES.
Proceedings of the 7th International Conference on Software and Computer Applications, 2018

2017
Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks.
IEEE Trans. Computers, 2017

A Chaos-Based Authenticated Cipher with Associated Data.
Secur. Commun. Networks, 2017

Ciphertext Policy-Attribute Based Homomorphic Encryption (CP-ABHER-LWE) Scheme: A Fine-Grained Access Control on Outsourced Cloud Data Computation.
J. Inf. Sci. Eng., 2017

2016
A Survey of Homomorphic Encryption for Outsourced Big Data Computation.
KSII Trans. Internet Inf. Syst., 2016

Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Elliptic-curve scalar multiplication algorithm using ZOT structure.
Secur. Commun. Networks, 2015

Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map.
J. Inf. Process. Syst., 2015

2014
Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications.
J. Appl. Math., 2014

Parallel method for computing elliptic curve scalar multiplication based on MOF.
Int. Arab J. Inf. Technol., 2014

2013
Image encryption based on the Jacobian elliptic maps.
J. Syst. Softw., 2013

An Improved Version of the Visual Digital Signature Scheme.
Int. Arab J. Inf. Technol., 2013

A novel parallel hash function based on 3D chaotic map.
EURASIP J. Adv. Signal Process., 2013

Fuzzy Based Diagnostics System for Identifying Network Traffic Flow Anomalies
CoRR, 2013

A Hybrid Rule Based Fuzzy-Neural Expert System For Passive Network Monitoring
CoRR, 2013

2012
ROSS: Low-Cost Self-Securing VoIP Communication Framework.
KSII Trans. Internet Inf. Syst., 2012

2011
A symmetric image encryption scheme based on combination of nonlinear chaotic maps.
J. Frankl. Inst., 2011

LTSC-128: Stream Cipher Based on the Intractable Shortest Vector Problem in Lattice.
J. Digit. Inf. Manag., 2011

A novel dynamic model of pseudo random number generator.
J. Comput. Appl. Math., 2011

2004
Enhance Performance of Secure Image Using Wavelet Compression.
Proceedings of the International Conference on Computational Intelligence, 2004

2003
Secure Groups Communication Using Mobile Agents Technologies.
Proceedings of the 3th International Conference on IT in Asia, 2003

2002
Data Storage and Retrieval for Video-on-Demand Servers.
Proceedings of the 4th International Symposium on Multimedia Software Engineering, 2002

Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network.
Proceedings of the Information Security, 5th International Conference, 2002

Data Storage for Video on Demand Servers.
Proceedings of the IASTED International Conference on Communications, 2002

2000
Aesthetic Measures for Assessing Graphic Screens.
J. Inf. Sci. Eng., 2000

1999
Local and Global Considerations in Line Drawing Interpretations of Partially Occluded Patterns.
Proceedings of the Signal and Image Processing (SIP), 1999

1998
nD-dBPN: New Self-Routing Permutation Networks Based On the de Bruijn Digraphs.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998

1997
KautzNet: Multihop Lightwave Networks.
Proceedings of the IASTED International Conference on Parallel and Distributed Systems, 1997

Inverse de Bruijn and Inverse Kautz Optical Networks.
Proceedings of the IASTED International Conference on Parallel and Distributed Systems, 1997


  Loading...