Azman Samsudin
Orcid: 0000-0001-9981-7958
According to our database1,
Azman Samsudin
authored at least 42 papers
between 1997 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
J. Netw. Comput. Appl., March, 2023
2021
Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey.
Sensors, 2021
An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain.
IEEE Access, 2021
IEEE Access, 2021
2020
Integrity verification for digital Holy Quran verses using cryptographic hash function and compression.
J. King Saud Univ. Comput. Inf. Sci., 2020
Enhanced digital chaotic maps based on bit reversal with applications in random bit generators.
Inf. Sci., 2020
A post-processing method for true random number generators based on hyperchaos with applications in audio-based generators.
Frontiers Comput. Sci., 2020
2019
An image encryption scheme based on hybridizing digital chaos and finite state machine.
Signal Process., 2019
Signal Process., 2019
Proceedings of the 8th International Conference on Software and Computer Applications, 2019
2018
Proceedings of the 7th International Conference on Software and Computer Applications, 2018
2017
Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks.
IEEE Trans. Computers, 2017
Secur. Commun. Networks, 2017
Ciphertext Policy-Attribute Based Homomorphic Encryption (CP-ABHER-LWE) Scheme: A Fine-Grained Access Control on Outsourced Cloud Data Computation.
J. Inf. Sci. Eng., 2017
2016
KSII Trans. Internet Inf. Syst., 2016
Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Secur. Commun. Networks, 2015
Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map.
J. Inf. Process. Syst., 2015
2014
Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications.
J. Appl. Math., 2014
Int. Arab J. Inf. Technol., 2014
2013
Int. Arab J. Inf. Technol., 2013
EURASIP J. Adv. Signal Process., 2013
CoRR, 2013
CoRR, 2013
2012
KSII Trans. Internet Inf. Syst., 2012
2011
J. Frankl. Inst., 2011
LTSC-128: Stream Cipher Based on the Intractable Shortest Vector Problem in Lattice.
J. Digit. Inf. Manag., 2011
J. Comput. Appl. Math., 2011
2004
Enhance Performance of Secure Image Using Wavelet Compression.
Proceedings of the International Conference on Computational Intelligence, 2004
2003
Secure Groups Communication Using Mobile Agents Technologies.
Proceedings of the 3th International Conference on IT in Asia, 2003
2002
Proceedings of the 4th International Symposium on Multimedia Software Engineering, 2002
Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network.
Proceedings of the Information Security, 5th International Conference, 2002
Data Storage for Video on Demand Servers.
Proceedings of the IASTED International Conference on Communications, 2002
2000
1999
Local and Global Considerations in Line Drawing Interpretations of Partially Occluded Patterns.
Proceedings of the Signal and Image Processing (SIP), 1999
1998
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998
1997
KautzNet: Multihop Lightwave Networks.
Proceedings of the IASTED International Conference on Parallel and Distributed Systems, 1997
Inverse de Bruijn and Inverse Kautz Optical Networks.
Proceedings of the IASTED International Conference on Parallel and Distributed Systems, 1997