Follow
Sharifah Md Yasin
Title
Cited by
Cited by
Year
A systematic review for enabling of develop a blockchain technology in healthcare application: taxonomy, substantially analysis, motivations, challenges, recommendations and …
HM Hussien, SM Yasin, SNI Udzir, AA Zaidan, BB Zaidan
Journal of medical systems 43, 1-35, 2019
2342019
Blockchain technology in the healthcare industry: Trends and opportunities
HM Hussien, SM Yasin, NI Udzir, MIH Ninggal, S Salman
Journal of Industrial Information Integration 22, 100217, 2021
1772021
Comparison of ECC and RSA algorithm in resource constrained devices
M Bafandehkar, SM Yasin, R Mahmod, ZM Hanapi
2013 international conference on IT convergence and security (ICITCS), 1-3, 2013
1252013
Blockchain-based access control scheme for secure shared personal health records over decentralised storage
H Alobadh, SM Yasin, NI Udzir, MIH Ninggal
Sensors 21 (7), 2462, 2021
392021
Comparison of ECC and RSA algorithms in IoT devices
Z Vahdati, S Yasin, A Ghasempour, M Salehi
Journal of Theoretical and Applied Information Technology 97 (16), 4293, 2019
362019
A comparative analysis of Arabic text steganography
R Thabit, NI Udzir, SM Yasin, A Asmawi, NA Roslan, R Din
Applied Sciences 11 (15), 6851, 2021
202021
CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data
R Thabit, NI Udzir, SM Yasin, A Asmawi, AAA Gutub
IEEE Access 10, 65439-65458, 2022
192022
A new shift column transformation: an enhancement of Rijndael key scheduling
S Sulaiman, Z Muda, J Juremi, R Mahmod, SM Yasin
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (3 …, 2012
112012
ModifiedAes S-Box Based On Determinant Matrix Algorithm
J Juremi, R Mahmod, ZA Zukarnain, SM Yasinm
International Journal of Advanced Research in Computer Science and Software …, 2017
92017
Partial key attack given MSBs of CRT-RSA private keys
AH Abd Ghafar, MR Kamel Ariffin, S Md Yasin, SH Sapar
Mathematics 8 (12), 2188, 2020
52020
Enhance the robustness of secure Rijndael key expansion function based on increment confusion
HM Hussien, Z Muda, SM Yasin
6th Int. Conf. Comput. Informatics, 722-728, 2017
52017
Email spam filtering technique: challenges and solutions
SM Yasin, IH Azmi
Journal of Theoretical and Applied Information Technology 101 (13), 5130-5138, 2023
42023
New key expansion function of Rijndael 128-bit resistance to the related-key attacks
HM Hussien, Z Muda, SM Yasin
Journal of Information and Communication Technology 17 (3), 409-434, 2018
42018
A note on bats from camp 5, Mulu world heritage area, Sarawak, Malaysian Borneo
I Azhar, AR Mohd-Ridwan, L Ho, M Gani, SM Yasin, MT Abdullah
Malayan Nature Journal 64 (4), 169-184, 2013
42013
Optimizing {0, 1, 3}-NAF Recoding Algorithm Using Block-Method Technique in Elliptic Curve Cryptosystem.
M Bafandehkar, SM Yasin, R Mahmod
J. Comput. Sci. 12 (11), 534-544, 2016
32016
TRIPLING FORMULAE OF ELLIPTIC CURVE OVER BINARY FIELD IN LOPEZ-DAHAB MODEL.
S YASIN, Z MUDA
Journal of Theoretical & Applied Information Technology 75 (2), 2015
32015
New signed-digit {0, 1, 3}-NAF scalar multiplication algorithm for elliptic curve over binary field
SM Yasin
Universiti Putra Malaysia, 2011
32011
Performance Analysis of Signed—Digit {0, 1, 3}—NAF Scalar Multiplication Algorithm in Lopez—Dahab Model
MS Yasin, M Ramlan, NHN Rozi
Research Journal of Information Technology 7, 80-100, 2015
22015
Key dependent dynamic s-boxes based on 3D cellular automata for block cipher
SM Yasin, AM Hamid, NI Udzir, S Turaev, MRK Ariffin
Journal of Theoretical and Applied Information Technology 98 (23), 3808-3822, 2020
12020
A Review of DNA-Based Block Cipher
CC Wei, SM Yasin, MT Abdullah, NI Udzir
International Journal of Computer Networks and Communications Security 6 (9 …, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20