BibTeX records: Muhammad Reza Z'aba

download as .bib file

@article{DBLP:journals/access/JimaleAKIZJR23,
  author       = {Mohamud Ahmed Jimale and
                  Nor Aniza Abdullah and
                  Miss Laiha Mat Kiah and
                  Mohd Yamani Idna Bin Idris and
                  Muhammad Reza Z'aba and
                  Norziana Jamil and
                  Mohd Saufy Rohmad},
  title        = {Sponge-Based Parallel Authenticated Encryption With Variable Tag Length
                  and Side-Channel Protection},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {59661--59674},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3267161},
  doi          = {10.1109/ACCESS.2023.3267161},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/JimaleAKIZJR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JimaleZKIJMR22,
  author       = {Mohamud Ahmed Jimale and
                  Muhammad Reza Z'aba and
                  Miss Laiha Mat Kiah and
                  Mohd Yamani Idna Bin Idris and
                  Norziana Jamil and
                  Moesfa Soeheila Mohamad and
                  Mohd Saufy Rohmad},
  title        = {Authenticated Encryption Schemes: {A} Systematic Review},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {14739--14766},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3147201},
  doi          = {10.1109/ACCESS.2022.3147201},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/JimaleZKIJMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JimaleZKIJMR22a,
  author       = {Mohamud Ahmed Jimale and
                  Muhammad Reza Z'aba and
                  Miss Laiha Mat Kiah and
                  Mohd Yamani Idna Bin Idris and
                  Norziana Jamil and
                  Moesfa Soeheila Mohamad and
                  Mohd Saufy Rohmad},
  title        = {Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection
                  and Adversary-Invisible Nonces},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {50819--50838},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3171853},
  doi          = {10.1109/ACCESS.2022.3171853},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/JimaleZKIJMR22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HossainNYAZAJ21,
  author       = {Mohammad Asif Hossain and
                  Rafidah Md Noor and
                  Kok{-}Lim Alvin Yau and
                  Saaidal Razalli Azzuhri and
                  Muhammad Reza Z'aba and
                  Ismail Ahmedy and
                  Mohammad Reza Jabbarpour},
  title        = {Multi-Objective Harris Hawks Optimization Algorithm Based 2-Hop Routing
                  Algorithm for {CR-VANET}},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {58230--58242},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3072922},
  doi          = {10.1109/ACCESS.2021.3072922},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HossainNYAZAJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/HossainNAZAYC21,
  author       = {Mohammad Asif Hossain and
                  Rafidah Md Noor and
                  Saaidal Razalli Azzuhri and
                  Muhammad Reza Z'aba and
                  Ismail Ahmedy and
                  Kok{-}Lim Alvin Yau and
                  Christopher Chembe},
  title        = {Spectrum sensing challenges {\&} their solutions in cognitive
                  radio based vehicular networks},
  journal      = {Int. J. Commun. Syst.},
  volume       = {34},
  number       = {7},
  year         = {2021},
  url          = {https://doi.org/10.1002/dac.4748},
  doi          = {10.1002/DAC.4748},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/HossainNAZAYC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/MahmoodKAKEQAZ21,
  author       = {Atif Mahmood and
                  Miss Laiha Mat Kiah and
                  Saaidal Razalli Azzuhri and
                  Muhammad Mustafa Kamal and
                  Tillal Eldabi and
                  Adnan N. Qureshi and
                  Zati Hakim Azizul and
                  Muhammad Reza Z'aba},
  title        = {Wireless backhaul network's capacity optimization using time series
                  forecasting approach},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {12},
  number       = {1},
  pages        = {1407--1418},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12652-020-02209-2},
  doi          = {10.1007/S12652-020-02209-2},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/MahmoodKAKEQAZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MahmoodKZQKAKAA20,
  author       = {Atif Mahmood and
                  Miss Laiha Mat Kiah and
                  Muhammad Reza Z'aba and
                  Adnan N. Qureshi and
                  Muhammad Shahreeza Safiruz Kassim and
                  Zati Hakim Azizul and
                  Jagadeesh Kakarla and
                  Iraj Sadegh Amiri and
                  Saaidal Razalli Azzuhri},
  title        = {Capacity and Frequency Optimization of Wireless Backhaul Network Using
                  Traffic Forecasting},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {23264--23276},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2970224},
  doi          = {10.1109/ACCESS.2020.2970224},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MahmoodKZQKAKAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HossainNYAZA20,
  author       = {Mohammad Asif Hossain and
                  Rafidah Md. Noor and
                  Kok{-}Lim Alvin Yau and
                  Saaidal Razalli Azzuhri and
                  Muhammad Reza Z'aba and
                  Ismail Ahmedy},
  title        = {Comprehensive Survey of Machine Learning Approaches in Cognitive Radio-Based
                  Vehicular Ad Hoc Networks},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {78054--78108},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2989870},
  doi          = {10.1109/ACCESS.2020.2989870},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HossainNYAZA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/QassimJZK20,
  author       = {Qais Saif Qassim and
                  Norziana Jamil and
                  Muhammad Reza Z'aba and
                  Wan Azlan Wan Kamarulzaman},
  title        = {Assessing the cyber-security of the {IEC} 60870-5-104 protocol in
                  {SCADA} system},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {16},
  number       = {2},
  pages        = {91--106},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJCIS.2020.107242},
  doi          = {10.1504/IJCIS.2020.107242},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcritis/QassimJZK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpp/AhmadNZQIS20,
  author       = {Iftikhar Ahmad and
                  Rafidah Md Noor and
                  Muhammad Reza Z'aba and
                  Muhammad Ahsan Qureshi and
                  Muhammad Imran and
                  Muhammad Shoaib},
  title        = {A Cooperative Heterogeneous Vehicular Clustering Mechanism for Road
                  Traffic Management},
  journal      = {Int. J. Parallel Program.},
  volume       = {48},
  number       = {5},
  pages        = {870--889},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10766-019-00629-y},
  doi          = {10.1007/S10766-019-00629-Y},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijpp/AhmadNZQIS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/KolandaisamyNZA20,
  author       = {Raenu Kolandaisamy and
                  Rafidah Md. Noor and
                  Muhammad Reza Z'aba and
                  Ismail Ahmedy and
                  Indraah Kolandaisamy},
  title        = {Adapted stream region for packet marking based on DDoS attack detection
                  in vehicular ad hoc networks},
  journal      = {J. Supercomput.},
  volume       = {76},
  number       = {8},
  pages        = {5948--5970},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11227-019-03088-x},
  doi          = {10.1007/S11227-019-03088-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/KolandaisamyNZA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/AhmadNZ19,
  author       = {Iftikhar Ahmad and
                  Rafidah Md Noor and
                  Muhammad Reza Z'aba},
  title        = {{LTE} efficiency when used in traffic information systems: {A} stable
                  interest aware clustering},
  journal      = {Int. J. Commun. Syst.},
  volume       = {32},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.1002/dac.3853},
  doi          = {10.1002/DAC.3853},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/AhmadNZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/KolandaisamyNAA18,
  author       = {Raenu Kolandaisamy and
                  Rafidah Md Noor and
                  Ismail Ahmedy and
                  Iftikhar Ahmad and
                  Muhammad Reza Z'aba and
                  Muhammad Imran and
                  Mohammed Abdullah Alnuem},
  title        = {A Multivariant Stream Analysis Approach to Detect and Mitigate DDoS
                  Attacks in Vehicular Ad Hoc Networks},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2018},
  pages        = {2874509:1--2874509:13},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/2874509},
  doi          = {10.1155/2018/2874509},
  timestamp    = {Tue, 11 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wicomm/KolandaisamyNAA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithms/PohBCMLMZ17,
  author       = {Geong Sen Poh and
                  Vishnu Monn Baskaran and
                  Ji{-}Jian Chin and
                  Moesfa Soeheila Mohamad and
                  Kay Win Lee and
                  Dharmadharshni Maniam and
                  Muhammad Reza Z'aba},
  title        = {Searchable Data Vault: Encrypted Queries in Secure Distributed Cloud
                  Storage},
  journal      = {Algorithms},
  volume       = {10},
  number       = {2},
  pages        = {52},
  year         = {2017},
  url          = {https://doi.org/10.3390/a10020052},
  doi          = {10.3390/A10020052},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithms/PohBCMLMZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ngc/IsaJZ16,
  author       = {Herman Isa and
                  Norziana Jamil and
                  Muhammad Reza Z'aba},
  title        = {Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle
                  Dance},
  journal      = {New Gener. Comput.},
  volume       = {34},
  number       = {3},
  pages        = {221--238},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00354-016-0302-2},
  doi          = {10.1007/S00354-016-0302-2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ngc/IsaJZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/IsaJZ13,
  author       = {Herman Isa and
                  Norziana Jamil and
                  Muhammad Reza Z'aba},
  editor       = {Atilla El{\c{c}}i and
                  Manoj Singh Gaur and
                  Mehmet A. Orgun and
                  Oleg B. Makarevich},
  title        = {S-box construction from non-permutation power functions},
  booktitle    = {The 6th International Conference on Security of Information and Networks,
                  {SIN} '13, Aksaray, Turkey, November 26-28, 2013},
  pages        = {46--53},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523514.2523525},
  doi          = {10.1145/2523514.2523525},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/IsaJZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/PohMZ12,
  author       = {Geong Sen Poh and
                  Moesfa Soeheila Mohamad and
                  Muhammad Reza Z'aba},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Structured Encryption for Conceptual Graphs},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {105--122},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_7},
  doi          = {10.1007/978-3-642-34117-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/PohMZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/IsaZ12,
  author       = {Herman Isa and
                  Muhammad Reza Z'aba},
  editor       = {Manoj Singh Gaur and
                  Atilla El{\c{c}}i and
                  Oleg B. Makarevich and
                  Mehmet A. Orgun and
                  Virendra Singh},
  title        = {Randomness analysis on {LED} block ciphers},
  booktitle    = {5th International Conference of Security of Information and Networks,
                  {SIN} '12, Jaipur, India, October 22 - 26, 2012},
  pages        = {60--66},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2388576.2388584},
  doi          = {10.1145/2388576.2388584},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/IsaZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/IsaBSZ11,
  author       = {Herman Isa and
                  Iskandar Bahari and
                  Hasibah Sufian and
                  Muhammad Reza Z'aba},
  title        = {{AES:} Current security and efficiency analysis of its alternatives},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {267--274},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122831},
  doi          = {10.1109/ISIAS.2011.6122831},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/IsaBSZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/PohZ11,
  author       = {Geong Sen Poh and
                  Muhammad Reza Z'aba},
  editor       = {Mehmet A. Orgun and
                  Atilla El{\c{c}}i and
                  Oleg B. Makarevich and
                  Sorin A. Huss and
                  Josef Pieprzyk and
                  Lyudmila K. Babenko and
                  Alexander G. Chefranov and
                  Rajan Shankaran},
  title        = {On the security and practicality of a buyer seller watermarking protocol
                  for {DRM}},
  booktitle    = {Proceedings of the 4th International Conference on Security of Information
                  and Networks, {SIN} 2011, Sydney, NSW, Australia, November 14-19,
                  2011},
  pages        = {251--254},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2070425.2070471},
  doi          = {10.1145/2070425.2070471},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/PohZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/ZabaRSDHW09,
  author       = {Muhammad Reza Z'aba and
                  H{\aa}vard Raddum and
                  Leonie Simpson and
                  Ed Dawson and
                  Matt Henricksen and
                  Kenneth Koon{-}Ho Wong},
  editor       = {Ljiljana Brankovic and
                  Willy Susilo},
  title        = {Algebraic Analysis of {LEX}},
  booktitle    = {Seventh Australasian Information Security Conference, {AISC} 2009,
                  Wellington, New Zealand, January 2009},
  series       = {{CRPIT}},
  volume       = {98},
  pages        = {33--45},
  publisher    = {Australian Computer Society},
  year         = {2009},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98RezaZaba.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/ZabaRSDHW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZabaSDW09,
  author       = {Muhammad Reza Z'aba and
                  Leonie Simpson and
                  Ed Dawson and
                  Kenneth Koon{-}Ho Wong},
  editor       = {Feng Bao and
                  Moti Yung and
                  Dongdai Lin and
                  Jiwu Jing},
  title        = {Linearity within the {SMS4} Block Cipher},
  booktitle    = {Information Security and Cryptology - 5th International Conference,
                  Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6151},
  pages        = {248--265},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-16342-5\_18},
  doi          = {10.1007/978-3-642-16342-5\_18},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/ZabaSDW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ZabaRHD08,
  author       = {Muhammad Reza Z'aba and
                  H{\aa}vard Raddum and
                  Matthew Henricksen and
                  Ed Dawson},
  editor       = {Kaisa Nyberg},
  title        = {Bit-Pattern Based Integral Attack},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {363--381},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_23},
  doi          = {10.1007/978-3-540-71039-4\_23},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ZabaRHD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics