A systematic review for enabling of develop a blockchain technology in healthcare application: taxonomy, substantially analysis, motivations, challenges, recommendations and … HM Hussien, SM Yasin, SNI Udzir, AA Zaidan, BB Zaidan Journal of medical systems 43, 1-35, 2019 | 234 | 2019 |
Blockchain technology in the healthcare industry: Trends and opportunities HM Hussien, SM Yasin, NI Udzir, MIH Ninggal, S Salman Journal of Industrial Information Integration 22, 100217, 2021 | 177 | 2021 |
Comparison of ECC and RSA algorithm in resource constrained devices M Bafandehkar, SM Yasin, R Mahmod, ZM Hanapi 2013 international conference on IT convergence and security (ICITCS), 1-3, 2013 | 125 | 2013 |
Blockchain-based access control scheme for secure shared personal health records over decentralised storage H Alobadh, SM Yasin, NI Udzir, MIH Ninggal Sensors 21 (7), 2462, 2021 | 39 | 2021 |
Comparison of ECC and RSA algorithms in IoT devices Z Vahdati, S Yasin, A Ghasempour, M Salehi Journal of Theoretical and Applied Information Technology 97 (16), 4293, 2019 | 36 | 2019 |
A comparative analysis of Arabic text steganography R Thabit, NI Udzir, SM Yasin, A Asmawi, NA Roslan, R Din Applied Sciences 11 (15), 6851, 2021 | 20 | 2021 |
CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data R Thabit, NI Udzir, SM Yasin, A Asmawi, AAA Gutub IEEE Access 10, 65439-65458, 2022 | 19 | 2022 |
A new shift column transformation: an enhancement of Rijndael key scheduling S Sulaiman, Z Muda, J Juremi, R Mahmod, SM Yasin International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (3 …, 2012 | 11 | 2012 |
ModifiedAes S-Box Based On Determinant Matrix Algorithm J Juremi, R Mahmod, ZA Zukarnain, SM Yasinm International Journal of Advanced Research in Computer Science and Software …, 2017 | 9 | 2017 |
Partial key attack given MSBs of CRT-RSA private keys AH Abd Ghafar, MR Kamel Ariffin, S Md Yasin, SH Sapar Mathematics 8 (12), 2188, 2020 | 5 | 2020 |
Enhance the robustness of secure Rijndael key expansion function based on increment confusion HM Hussien, Z Muda, SM Yasin 6th Int. Conf. Comput. Informatics, 722-728, 2017 | 5 | 2017 |
Email spam filtering technique: challenges and solutions SM Yasin, IH Azmi Journal of Theoretical and Applied Information Technology 101 (13), 5130-5138, 2023 | 4 | 2023 |
New key expansion function of Rijndael 128-bit resistance to the related-key attacks HM Hussien, Z Muda, SM Yasin Journal of Information and Communication Technology 17 (3), 409-434, 2018 | 4 | 2018 |
A note on bats from camp 5, Mulu world heritage area, Sarawak, Malaysian Borneo I Azhar, AR Mohd-Ridwan, L Ho, M Gani, SM Yasin, MT Abdullah Malayan Nature Journal 64 (4), 169-184, 2013 | 4 | 2013 |
Optimizing {0, 1, 3}-NAF Recoding Algorithm Using Block-Method Technique in Elliptic Curve Cryptosystem. M Bafandehkar, SM Yasin, R Mahmod J. Comput. Sci. 12 (11), 534-544, 2016 | 3 | 2016 |
TRIPLING FORMULAE OF ELLIPTIC CURVE OVER BINARY FIELD IN LOPEZ-DAHAB MODEL. S YASIN, Z MUDA Journal of Theoretical & Applied Information Technology 75 (2), 2015 | 3 | 2015 |
New signed-digit {0, 1, 3}-NAF scalar multiplication algorithm for elliptic curve over binary field SM Yasin Universiti Putra Malaysia, 2011 | 3 | 2011 |
Performance Analysis of Signed—Digit {0, 1, 3}—NAF Scalar Multiplication Algorithm in Lopez—Dahab Model MS Yasin, M Ramlan, NHN Rozi Research Journal of Information Technology 7, 80-100, 2015 | 2 | 2015 |
Key dependent dynamic s-boxes based on 3D cellular automata for block cipher SM Yasin, AM Hamid, NI Udzir, S Turaev, MRK Ariffin Journal of Theoretical and Applied Information Technology 98 (23), 3808-3822, 2020 | 1 | 2020 |
A Review of DNA-Based Block Cipher CC Wei, SM Yasin, MT Abdullah, NI Udzir International Journal of Computer Networks and Communications Security 6 (9 …, 2018 | | 2018 |