Muhammad Reza Z'aba
Muhammad Reza Z'aba
Verified email at um.edu.my - Homepage
Title
Cited by
Cited by
Year
Bit-pattern based integral attack
MR Z’aba, H Raddum, M Henricksen, E Dawson
International Workshop on Fast Software Encryption, 363-381, 2008
852008
Construction of cryptographically strong S-boxes inspired by bee waggle dance
H Isa, N Jamil, MR Z’aba
New generation computing 34 (3), 221-238, 2016
302016
Threat modeling approaches for securing cloud computin
A Amini, N Jamil, AR Ahmad, MR Zaba
Journal of Applied Sciences 15 (7), 953-967, 2015
272015
Analysis of linear relationships in block ciphers
MR Z'aba
Queensland University of Technology, 2010
232010
Comprehensive survey of machine learning approaches in cognitive radio-based vehicular ad hoc networks
MA Hossain, RM Noor, KLA Yau, SR Azzuhri, MR Z’aba, I Ahmedy
IEEE Access 8, 78054-78108, 2020
192020
I-PRESENTTM: An Involutive Lightweight Block Cipher
MR Z’aba, N Jamil, ME Rusli, MZ Jamaludin, AAM Yasir
Journal of Information Security 2014, 2014
172014
AES: Current security and efficiency analysis of its alternatives
H Isa, I Bahari, H Sufian, MR Z'aba
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
152011
S-box construction from non-permutation power functions
H Isa, N Jamil, MR Z'aba
Proceedings of the 6th International Conference on Security of Information …, 2013
122013
Implementation of PRINCE algorithm in FPGA
YA Abbas, R Jidin, N Jamil, MR Z'aba, ME Rusli, B Tariq
Proceedings of the 6th International Conference on Information Technology …, 2014
112014
Structured encryption for conceptual graphs
GS Poh, MS Mohamad, MR Z’aba
International Workshop on Security, 105-122, 2012
112012
Hybrid heuristic methods in constructing cryptographically strong S-boxes
H Isa, N Jamil, M Z’aba
Int. J. Cryptol. Res 6 (1), 1-15, 2016
92016
Capacity and frequency optimization of wireless backhaul network using traffic forecasting
A Mahmood, MLM Kiah, MR Z’aba, AN Qureshi, MSS Kassim, ZHA Hasan, ...
IEEE Access 8, 23264-23276, 2020
82020
Adapted stream region for packet marking based on DDoS attack detection in vehicular ad hoc networks
R Kolandaisamy, RM Noor, MR Z’aba, I Ahmedy, I Kolandaisamy
The Journal of Supercomputing 76 (8), 5948-5970, 2020
72020
IMPLEMENTATION OF LIGHTWEIGHT CRYPTOGRAPHIC PRIMITIVES.
BT Hammad, N Jamil, ME Rusli, MR Z'ABA, IT Ahmed
Journal of Theoretical & Applied Information Technology 95 (19), 2017
72017
PRINCE IP-core on Field Programmable Gate Arrays (FPGA)
YA Abbas, R Jidin, N Jamil, MR Z'aba, ME Rusli
PRINCE IP-core on Field Programmable Gate Arrays (FPGA). Research Journal of …, 2015
72015
KEY-DEPENDENT S-BOX IN LIGHTWEIGHT BLOCK CIPHERS.
SSM Aldabbagh, IFT Al Shaikhli, MR ZABA
Journal of Theoretical & Applied Information Technology 62 (2), 2014
52014
Improved S-box construction from binomial power functions
H Isa, N Jamil, MR Z’aba
Conf. Proc.—Cryptol, 131-139, 2014
52014
Randomness analysis on LED block ciphers
H Isa, MR Z'aba
Proceedings of the Fifth International Conference on Security of Information …, 2012
52012
Spectrum sensing challenges & their solutions in cognitive radio based vehicular networks
MA Hossain, R Md Noor, SR Azzuhri, MR Z'aba, I Ahmedy, KLA Yau, ...
International Journal of Communication Systems 34 (7), e4748, 2021
42021
Reasoning of collaborative human behaviour in security-criticalwork practices: A framework
GS Poh, NN Abdullah, MR Z’aba, MR Wahiddin
Trustworthy Ubiquitous Computing, 99-106, 2012
42012
The system can't perform the operation now. Try again later.
Articles 1–20