Mohd Anuar Mat Isa, PhDs (EE & CS)
Mohd Anuar Mat Isa, PhDs (EE & CS)
Chief Technology Officer, iExploTech, Malaysia
Verified email at robotics-malaysia.com - Homepage
Title
Cited by
Cited by
Year
A lightweight and secure TFTP protocol for smart environment
MAM Isa, NN Mohamed, H Hashim, SFS Adnan, R Mahmod
2012 International Symposium on Computer Applications and Industrial …, 2012
48*2012
Security, trust and privacy–a new direction for pervasive computing
JL Ab Manan, MF Mubarak, MAM Isa, ZA Khattak
Information Security, 56-60, 2011
202011
Timing analysis of the lightweight AAβ encryption scheme on embedded Linux for Internet of Things
SFS Adnan, MAM Isa, H Hashim
2016 IEEE Symposium on Computer Applications & Industrial Electronics …, 2016
122016
Establishing Trusted Process In Trusted Computing Platform
MAM Isa, AA Talib, JA Manan, SH Rasidi
Conference on Engineering and Technology Education, World Engineering …, 2010
12*2010
Integrity Verification Architecture (IVA) Based Security Framework for Windows Operating System
HO Mohd Anuar Mat Isa, Habibah Hashim, Jamalul-lail Ab Manan, Ramlan Mahmod
International Symposium on Advances in Trusted and Secure Information …, 2012
11*2012
Trusted computing based microkernel
S Setapa, JA Manan, MAM Isa, N Abdullah
Computer Applications and Industrial Electronics (ICCAIE 2010), 309-312, 2010
112010
Implementation of the AA-Beta (AAβ) Lightweight Asymmetric Encryption Scheme on an Embedded System Device
SFS Adnan, MAM Isa, H Hashim
Advanced Science Letters 22 (10), 2910-2913, 2016
92016
An Experimental Study of Cryptography Capability using Chained Key Exchange Scheme for Embedded Devices
MAM Isa, H Hashim, SFS Adnan, JA Manan, R Mahmod
Proceedings of the World Congress on Engineering 2014 (WCE 2014) 1, 2014
92014
A Secure TFTP Protocol with Security Proofs
MAM Isa, H Hashim, SFS Adnan, JA Manan, R Mahmod
Proceedings of the World Congress on Engineering 2014 (WCE 2014) 1, 2014
92014
Secure system architecture for wide area surveillance using security, trust and privacy (STP) framework
MAM Isa, H Hashim
International Journal of Procedia Engineering, 2012
9*2012
An optimization of electrical output power for piezoelectric energy harvester using different micro-cantilever beam geometries
AS Rosmi, M Isa, B Ismail, M Rohani, Y Wahab
Journal of Physics: Conference Series 1019 (1), 012033, 2018
82018
Cryptographic Key Exchange Protocol with Message Authentication Codes (MAC) Using Finite State Machine
MAM Isa, MM Ahmad, NFM Sani, H Hashim, R Mahmod
Procedia Computer Science 42, 263-270, 2014
72014
Finest Authorizing Member of Common Criteria Certification
MAM Isa, H Hashim, JA Manan, R Mahmod, H Othman
The International Conference on Cyber Security, CyberWarfare and Digital …, 2012
72012
Energy analysis of the AAβlightweight asymmetric encryption scheme on an embedded device
SFS Adnan, MAM Isa, H Hashim
2016 IEEE Industrial Electronics and Applications Conference (IEACon), 116-122, 2016
62016
RF simulator for cryptographic protocol
MAM Isa, H Hashim, SFS Adnan, R Mahmod
2014 IEEE International Conference on Control System, Computing and …, 2014
62014
Compression and encryption technique on securing TFTP packet
NN Mohamed, H Hashim, YM Yussoff, MAM Isa, SFS Adnan
2014 IEEE Symposium on Computer Applications and Industrial Electronics …, 2014
62014
SYMMETRIC ENCRYPTION USING PRE-SHARED PUBLIC PARAMETERS FOR A SECURE TFTP PROTOCOL
NN MOHAMED, YM YUSSOFF, MAM ISA, H HASHIM
52015
Attestation with trusted configuration machine
L Mazlan, H Hasyim, N Mohd Anuar Mat Isa
Computer Applications and Industrial Electronics (ICCAIE 2011), 570-573, 2011
5*2011
A Series of Secret Keys in a Key Distribution Protocol
MAM Isa, H Hashim, SFS Adnan, R Mahmod
Transactions on Engineering Technologies, 615-628, 2015
42015
Cryptographic computation using ElGamal algorithm in 32-bit computing system
NA Rosly, MZ Aziz, H Hashim, SFS Adnan, MAM Isa
Third International Conference on Control, Automation and Systems …, 2013
42013
The system can't perform the operation now. Try again later.
Articles 1–20