Match!
Habibah Hashim
Universiti Teknologi MARA
119Publications
11H-index
420Citations
Publications 120
Newest
Source
#1Nur Nabila Mohamed (UiTM: Universiti Teknologi MARA)H-Index: 3
#2Yusnani Mohd Yussoff (UiTM: Universiti Teknologi MARA)H-Index: 6
Last.Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
view all 4 authors...
Embedded Machine-to-Machine (M2M) is one of the hottest research topics in recent industrial Internet of Things. In order to serve the communication to effectively transfer data and messages between machines, the system must incorporate a file transfer protocol, known as Trivial File Transfer Protocol (TFTP). However, the main constraint is lack of security mechanism during TFTP Client–Server communication whereby its reliability is questionable as the protocol does not support any authenticatio...
Source
view all 4 authors...
Source
#2Habibah HashimH-Index: 11
view all 3 authors...
Source
#1Mohammed A. Saleh (UiTM: Universiti Teknologi MARA)H-Index: 2
Last.Habibah HashimH-Index: 11
view all 3 authors...
2 Citations
#1M. H. Amaran (UiTM: Universiti Teknologi MARA)H-Index: 1
#2Mohd Saufy RohmadH-Index: 3
Last.Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
view all 5 authors...
1 CitationsSource
Source
#1Mohd Anuar Mat Isa (UiTM: Universiti Teknologi MARA)H-Index: 6
#2Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
Last.Yasin Fitri Alias (UiTM: Universiti Teknologi MARA)H-Index: 1
view all 5 authors...
The advancing of Key Exchange Protocol (KEP) is compulsory to secure the connected world via Internet of Thing (IoT), cryptocurrency and blockchain, virtual intelligent, smart computing etc. To address the security issues in the Internet based computing systems, this paper explores the side-channel security for KEP, namely timing and relay attacks. Nowadays, various KEP variances are used by internet protocol such as IKEv2/3. The purpose of KEP is to enable a secret key(s) sharing between two or...
Source
#2Mohd Anuar Mat Isa (UiTM: Universiti Teknologi MARA)H-Index: 6
Last.Habibah HashimH-Index: 11
view all 3 authors...
Internet of Things (IoT) is a way of providing data with the physical thing that interconnected to the network, which is the Internet. The IoT devices connected to the internet, broadcast of the data to the broker or a server, becomes an open route for attackers to gain the data and making the data becomes vulnerable. Thus, the data could be altered or spoofed by an attacker which led to security issues especially on data integrity. Therefore, the data security collected from the sensors is as i...
Source
#1Yasin Fitri AliasH-Index: 1
#2Habibah HashimH-Index: 11
In Diffie-Hellman Key Exchange (DHKE), two parties need to communicate to each other by sharing their secret key (cipher text) over an unsecure communication channel. An adversary or cryptanalyst can easily get their secret keys but cannot get the information (plaintext). Brute force is one the common tools used to obtain the secret key, but when the key is too large (etc. 1024 bits and 2048 bits) this tool is no longer suitable. Thus timing attacks have become more attractive in the new cryptog...
Source
12345678910