Jamalul-lail Ab Manan

Orcid: 0000-0003-0871-4107

According to our database1, Jamalul-lail Ab Manan authored at least 40 papers between 2009 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
A Novel Energy Efficient Key Distribution Scheme for Mobile WiMAX Networks.
Wirel. Pers. Commun., 2017

2016
A Mathematical Trust Algebra for International Nation Relations Computation and Evaluation.
CoRR, 2016

A Formal Calculus for International Relations Computation and Evaluation.
CoRR, 2016

2014
Design and Implementation of a Privacy Preserved off-Premises Cloud Storage.
J. Comput. Sci., 2014

Trusted Cloud Computing Framework for Healthcare Sector.
J. Comput. Sci., 2014

Scalable and efficient key management for Mobile WiMAX networks.
Int. J. Commun. Syst., 2014

An Experimental Study of Cryptography Capability using Chained Key Exchange Scheme for Embedded Devices.
CoRR, 2014

A Secure TFTP Protocol with Security Proofs.
CoRR, 2014

RF simulator for cryptographic protocol.
Proceedings of the 2014 IEEE International Conference on Control System, 2014

An Implementation of a Unified Security, Trust and Privacy (STP) Framework for Future Integrated RFID System.
Proceedings of the Future Data and Security Engineering - First International Conference, 2014

Neural Network and Linear Regression methods for prediction of students' academic achievement.
Proceedings of the 2014 IEEE Global Engineering Education Conference, 2014

2013
A Unified Trust Model for Pervasive Environments - Simulation and Analysis.
KSII Trans. Internet Inf. Syst., 2013

Unified trust establishment by leveraging remote attestation - modeling and analysis.
Inf. Manag. Comput. Secur., 2013

2012
Trustworthy Mutual Attestation Protocol for Local True Single Sign-On System: Proof of Concept and Performance Evaluation.
KSII Trans. Internet Inf. Syst., 2012

Practicable Unified Security, Trust and Privacy (STP) Framework for Federated Access Management (FAM).
Proceedings of the 11th IEEE International Conference on Trust, 2012

Integrity Verification Architecture (IVA) Based Security Framework for Windows Operating System.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Enabling trust and privacy for RFID system.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

A trust based model for federated identity architecture to mitigate identity theft.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

An enhanced remote authentication scheme to mitigate man-in-the-browser attacks.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Distributed Intrusion Detection trust management through integrity and expertise evaluation.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Leveraging Remote Attestation to enhance the Unified Trust Model for WSNs.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Finest authorizing member of common criteria certification.
Proceedings of the 2012 International Conference on Cyber Security, 2012

A survey on security issues of federated identity in the cloud computing.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
Trust levels in Peer-to-Peer (P2P) vehicular communication.
Proceedings of the 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2011

Behavior of attacker and some new possible attacks in Vehicular Ad hoc Network (VANET).
Proceedings of the 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2011

Remote User Authentication Scheme with Hardware-Based Attestation.
Proceedings of the Software Engineering and Computer Systems, 2011

An Enhanced Route Discovery Mechanism for AODV Routing Protocol.
Proceedings of the Software Engineering and Computer Systems, 2011

Taxonomy of C Overflow Vulnerabilities Attack.
Proceedings of the Software Engineering and Computer Systems, 2011

Scalable Rekeying Algorithm in IEEE 802.16e.
Proceedings of the IEEE 17th Asia-Pacific Conference on Communications, 2011

Finding New Solutions for Services in Federated Open Systems Interconnection.
Proceedings of the Advances in Computing and Communications, 2011

Trusted anonymizer-based RFID system with integrity verification.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

Black hole effect mitigation method in AODV routing protocol.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

Understanding vulnerabilities by refining taxonomy.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Forming Virtualized Secure Framework for Location Based Services (LBS) using Direct Anonymous Attestation (DAA) protocol.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

Trust Formation Based on Subjective Logic and PGP Web-of-Trust for Information Sharing in Mobile Ad Hoc Networks.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

The System Integrity Verification for Trusted RFID Protocol.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

A conceptual framework providing Direct Anonymous Attestation (DAA) protocol in trusted location-based services (LBS).
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Towards a Unified Trust Model in Pervasive Systems.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Group based access control scheme: proof of method for secure access control architecture in mobile ad-hoc networks.
Proceedings of the MoMM'2009, 2009

Group based access control scheme (GBAC): Keeping information sharing secure in mobile Ad- hoc environment.
Proceedings of the Fourth IEEE International Conference on Digital Information Management, 2009


  Loading...