Match!
Nur Nabila Mohamed
Universiti Teknologi MARA
EncryptionTrivial File Transfer ProtocolDiffie–Hellman key exchangeComputer networkComputer science
9Publications
3H-index
34Citations
What is this?
Publications 9
Newest
#1Nur Nabila Mohamed (UiTM: Universiti Teknologi MARA)H-Index: 3
#2Yusnani Mohd Yussoff (UiTM: Universiti Teknologi MARA)H-Index: 6
Last. Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
view all 4 authors...
Embedded Machine-to-Machine (M2M) is one of the hottest research topics in recent industrial Internet of Things. In order to serve the communication to effectively transfer data and messages between machines, the system must incorporate a file transfer protocol, known as Trivial File Transfer Protocol (TFTP). However, the main constraint is lack of security mechanism during TFTP Client–Server communication whereby its reliability is questionable as the protocol does not support any authenticatio...
Source
#1Mohd Anuar Mat Isa (UiTM: Universiti Teknologi MARA)H-Index: 6
#2Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
Last. Yasin Fitri Alias (UiTM: Universiti Teknologi MARA)H-Index: 1
view all 5 authors...
The advancing of Key Exchange Protocol (KEP) is compulsory to secure the connected world via Internet of Thing (IoT), cryptocurrency and blockchain, virtual intelligent, smart computing etc. To address the security issues in the Internet based computing systems, this paper explores the side-channel security for KEP, namely timing and relay attacks. Nowadays, various KEP variances are used by internet protocol such as IKEv2/3. The purpose of KEP is to enable a secret key(s) sharing between two or...
Source
#1Nur Nabila Mohamed (UiTM: Universiti Teknologi MARA)H-Index: 3
#2Mohd Anuar Mat Isa (UiTM: Universiti Teknologi MARA)H-Index: 6
Last. Habibah HashimH-Index: 11
view all 4 authors...
#1Nur Nabila Mohamed (UiTM: Universiti Teknologi MARA)H-Index: 3
#2Hanunah Othman (UiTM: Universiti Teknologi MARA)H-Index: 4
Last. Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
view all 5 authors...
Location Based Services (LBS) are any services or software applications that require the geographic location (longitude and latitude) of an entity. Nowadays, with the aid of smartphones, LBSs have improved tremendously in the market with wide range of users. However, in many existing LBSs, the user's information was not private where the service provider is aware with the user's location and may leak this information to any unauthorized entities. To encounter this problem, a symmetric encryption...
Source
#1Nur Nabila Mohamed (UiTM: Universiti Teknologi MARA)H-Index: 3
Last. Habibah HashimH-Index: 11
view all 3 authors...
Source
#1Mohd Anuar Mat Isa (UiTM: Universiti Teknologi MARA)H-Index: 6
#2Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
Last. Nur Nabila Mohamed (UiTM: Universiti Teknologi MARA)H-Index: 3
view all 5 authors...
Keyless go, automotive keyless systems (AKS), passive keyless entry and start (PKES) are names given to smart systems that allow a driver to unlock a car without pressing any key, and drive the car without inserting a smart key for starting or stopping the car engine. It is one of the debutant IoT applications in automotive sector. This work presents a 128-bit pairing security protocol (PSP 128 bits) lightweight cryptographic protocol as a security protocol authentication between owner and car. ...
Source
#1Nur Nabila MohamedH-Index: 3
#2Habibah HashimH-Index: 11
Last. Syed Farid Syed AdnanH-Index: 5
view all 5 authors...
Data compression technique such as Huffman coding, arithmetic coding, Lempel-Ziv-Welch (LZW) method and others has been playing a vital role in the area of data transmission for reducing time usage during retrieving and transmitting data. However, this technique does not prevent data which contain secret information from being tampered or hacked by malicious attacks even in limited area network environment. Apart from the need of reducing data volume, an implementation of encryption is an import...
4 CitationsSource
#1Nur Nabila MohamedH-Index: 3
#2Habibah HashimH-Index: 11
Last. Anuar Mat IsaH-Index: 1
view all 4 authors...
With the advent of pervasive computing nowadays, there is a need to deal with security including integrity and confidentiality to maintain the accuracy, and distribute data safely and efficiently. Therefore, it is important to find the best solution for protecting sensitive information through encryption in constrained environment. However, due to the limitation of resources, it is difficult to implement common cryptographic functions on this type of environment. In addition, an ideal encryption...
4 CitationsSource
Dec 1, 2012 in ISIE (International Symposium on Industrial Electronics)
#1Mohd Anuar Mat Isa (UiTM: Universiti Teknologi MARA)H-Index: 6
#2Nur Nabila Mohamed (UiTM: Universiti Teknologi MARA)H-Index: 3
Last. Ramlan MahmodH-Index: 14
view all 6 authors...
“Internet of Things” (IOT) has become the everyday buzz words in recent years. As part and parcel of the Smart environment where human beings and things interact intelligently, trust and mobility becomes the basic prerequisites. However, to unify trust and mobility, a security protocol must be used for information exchanges among human and things; as well as between things and things (such as between Wi-Fi Client and Wi-Fi AP). In this paper, we present an enhancement of a security protocol for ...
26 CitationsSource
1