Jamalul-lail Ab Manan
Orcid: 0000-0003-0871-4107
According to our database1,
Jamalul-lail Ab Manan
authored at least 40 papers
between 2009 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2017
Wirel. Pers. Commun., 2017
2016
A Mathematical Trust Algebra for International Nation Relations Computation and Evaluation.
CoRR, 2016
2014
J. Comput. Sci., 2014
Int. J. Commun. Syst., 2014
An Experimental Study of Cryptography Capability using Chained Key Exchange Scheme for Embedded Devices.
CoRR, 2014
Proceedings of the 2014 IEEE International Conference on Control System, 2014
An Implementation of a Unified Security, Trust and Privacy (STP) Framework for Future Integrated RFID System.
Proceedings of the Future Data and Security Engineering - First International Conference, 2014
Neural Network and Linear Regression methods for prediction of students' academic achievement.
Proceedings of the 2014 IEEE Global Engineering Education Conference, 2014
2013
KSII Trans. Internet Inf. Syst., 2013
Unified trust establishment by leveraging remote attestation - modeling and analysis.
Inf. Manag. Comput. Secur., 2013
2012
Trustworthy Mutual Attestation Protocol for Local True Single Sign-On System: Proof of Concept and Performance Evaluation.
KSII Trans. Internet Inf. Syst., 2012
Practicable Unified Security, Trust and Privacy (STP) Framework for Federated Access Management (FAM).
Proceedings of the 11th IEEE International Conference on Trust, 2012
Integrity Verification Architecture (IVA) Based Security Framework for Windows Operating System.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
Distributed Intrusion Detection trust management through integrity and expertise evaluation.
Proceedings of the 2012 International Conference on Cyber Security, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
2011
Proceedings of the 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2011
Behavior of attacker and some new possible attacks in Vehicular Ad hoc Network (VANET).
Proceedings of the 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2011
Proceedings of the Software Engineering and Computer Systems, 2011
Proceedings of the Software Engineering and Computer Systems, 2011
Proceedings of the Software Engineering and Computer Systems, 2011
Proceedings of the IEEE 17th Asia-Pacific Conference on Communications, 2011
Proceedings of the Advances in Computing and Communications, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
Forming Virtualized Secure Framework for Location Based Services (LBS) using Direct Anonymous Attestation (DAA) protocol.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010
Trust Formation Based on Subjective Logic and PGP Web-of-Trust for Information Sharing in Mobile Ad Hoc Networks.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010
A conceptual framework providing Direct Anonymous Attestation (DAA) protocol in trusted location-based services (LBS).
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
2009
Group based access control scheme: proof of method for secure access control architecture in mobile ad-hoc networks.
Proceedings of the MoMM'2009, 2009
Group based access control scheme (GBAC): Keeping information sharing secure in mobile Ad- hoc environment.
Proceedings of the Fourth IEEE International Conference on Digital Information Management, 2009