Follow
Chai Wen, Chuah
Chai Wen, Chuah
Chai Wen, Chuah
Verified email at uthm.edu.my
Title
Cited by
Cited by
Year
Fog computing, applications, security and challenges, review
G Rahman, CC Wen
International Journal of Engineering & Technology 7 (3), 1615-1621, 2018
512018
Blockchain-based electronic voting protocol
CCZ Wei, CC Wen
JOIV: International Journal on Informatics Visualization 2 (4-2), 336-341, 2018
242018
Key derivation function: the SCKDF scheme
CW Chuah, E Dawson, L Simpson
Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013
202013
Audio steganography with embedded text
CT Jian, CC Wen, NHBA Rahman, IRBA Hamid
IOP conference series: materials science and engineering 226 (1), 012084, 2017
162017
Staff attendance system using rfid
MTA Razak, CC Wen
JOIV: International Journal on Informatics Visualization 1 (4-2), 250-255, 2017
142017
A comparative study with RapidMiner and WEKA tools over some classification techniques for SMS spam
CFM Foozy, R Ahmad, MAF Abdollah, CC Wen
IOP Conference Series: Materials Science and Engineering 226 (1), 012100, 2017
122017
Mutual authentication security scheme in fog computing
G Rahman, CC Wen
International Journal of Advanced Computer Science and Applications 10 (11), 2019
112019
Android Malware classification using K-means Clustering algorithm
IRA Hamid, NS Khalid, NA Abdullah, NH Ab Rahman, CC Wen
IOP Conference Series: Materials Science and Engineering 226 (1), 012105, 2017
112017
Smart indoor home surveillance monitoring system using Raspberry Pi
LH Keat, CC Wen
JOIV: International Journal on Informatics Visualization 2 (4-2), 299-308, 2018
102018
An Intelligence Brute Force Attack on RSA Cryptosystem
CJ Mok, CW Chuah
Communications in Computational and Applied Mathematics 1 (1), 2019
92019
A framework for security analysis of key derivation functions
CC Wen, E Dawson, JM González Nieto, L Simpson
Information Security Practice and Experience: 8th International Conference …, 2012
82012
Man in the middle attack prevention for edge-fog, mutual authentication scheme
G Rahman, CC Wen
International Journal of Recent Technology and Engineering (IJRTE) 8 (2s2), 2019
52019
Forecasting ASEAN countries exchange rates using auto regression model based on triangular fuzzy number
HM Rahman, N Arbaiy, R Efendi, CC Wen
Indonesian Journal of Electrical Engineering and Computer Science 14 (3 …, 2019
52019
Enhancing the randomness of symmetric key using genetic algorithm
AZ Zakaria, SN Ramli, CC Wen, CFM Foozy, PSS Palaniappan, ...
International Journal of Innovative Technology and Exploring Engineering …, 2019
52019
Email authentication using symmetric and asymmetric key algorithm encryption
MAA Halim, CC Wen, I Rahmi, NA Abdullah, NHA Rahman
AIP Conference Proceedings 1891 (1), 2017
52017
On power analysis attacks against hardware stream ciphers
RD Silva, I Navaratna, M Kumarasiri, J Alawatugoda, CC Wen
International Journal of Information and Computer Security 17 (1-2), 21-35, 2022
42022
Robust security framework with bit‐flipping attack and timing attack for key derivation functions
WW Koh, CW Chuah
IET Information Security 14 (5), 562-571, 2020
42020
Review on leakage resilient key exchange security model
ZWC Chan, CW Chuah, J Alawatugoda
International Journal of Communication Networks and Information Security …, 2019
42019
Timing side channel attack on key derivation functions
CW Chuah, WW Koh
Information Science and Applications 2017: ICISA 2017 8, 266-273, 2017
42017
Electronic medical record system using ethereum blockchain and role-based access control
CM Loh, CW Chuah
Applied Information Technology And Computer Science 2 (2), 53-72, 2021
32021
The system can't perform the operation now. Try again later.
Articles 1–20