Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Muhammad Reza Z'aba
@article{DBLP:journals/access/JimaleAKIZJR23, author = {Mohamud Ahmed Jimale and Nor Aniza Abdullah and Miss Laiha Mat Kiah and Mohd Yamani Idna Bin Idris and Muhammad Reza Z'aba and Norziana Jamil and Mohd Saufy Rohmad}, title = {Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection}, journal = {{IEEE} Access}, volume = {11}, pages = {59661--59674}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3267161}, doi = {10.1109/ACCESS.2023.3267161}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/JimaleAKIZJR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JimaleZKIJMR22, author = {Mohamud Ahmed Jimale and Muhammad Reza Z'aba and Miss Laiha Mat Kiah and Mohd Yamani Idna Bin Idris and Norziana Jamil and Moesfa Soeheila Mohamad and Mohd Saufy Rohmad}, title = {Authenticated Encryption Schemes: {A} Systematic Review}, journal = {{IEEE} Access}, volume = {10}, pages = {14739--14766}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3147201}, doi = {10.1109/ACCESS.2022.3147201}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/JimaleZKIJMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JimaleZKIJMR22a, author = {Mohamud Ahmed Jimale and Muhammad Reza Z'aba and Miss Laiha Mat Kiah and Mohd Yamani Idna Bin Idris and Norziana Jamil and Moesfa Soeheila Mohamad and Mohd Saufy Rohmad}, title = {Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces}, journal = {{IEEE} Access}, volume = {10}, pages = {50819--50838}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3171853}, doi = {10.1109/ACCESS.2022.3171853}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/JimaleZKIJMR22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HossainNYAZAJ21, author = {Mohammad Asif Hossain and Rafidah Md Noor and Kok{-}Lim Alvin Yau and Saaidal Razalli Azzuhri and Muhammad Reza Z'aba and Ismail Ahmedy and Mohammad Reza Jabbarpour}, title = {Multi-Objective Harris Hawks Optimization Algorithm Based 2-Hop Routing Algorithm for {CR-VANET}}, journal = {{IEEE} Access}, volume = {9}, pages = {58230--58242}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3072922}, doi = {10.1109/ACCESS.2021.3072922}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HossainNYAZAJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/HossainNAZAYC21, author = {Mohammad Asif Hossain and Rafidah Md Noor and Saaidal Razalli Azzuhri and Muhammad Reza Z'aba and Ismail Ahmedy and Kok{-}Lim Alvin Yau and Christopher Chembe}, title = {Spectrum sensing challenges {\&} their solutions in cognitive radio based vehicular networks}, journal = {Int. J. Commun. Syst.}, volume = {34}, number = {7}, year = {2021}, url = {https://doi.org/10.1002/dac.4748}, doi = {10.1002/DAC.4748}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/HossainNAZAYC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/MahmoodKAKEQAZ21, author = {Atif Mahmood and Miss Laiha Mat Kiah and Saaidal Razalli Azzuhri and Muhammad Mustafa Kamal and Tillal Eldabi and Adnan N. Qureshi and Zati Hakim Azizul and Muhammad Reza Z'aba}, title = {Wireless backhaul network's capacity optimization using time series forecasting approach}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {12}, number = {1}, pages = {1407--1418}, year = {2021}, url = {https://doi.org/10.1007/s12652-020-02209-2}, doi = {10.1007/S12652-020-02209-2}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/MahmoodKAKEQAZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MahmoodKZQKAKAA20, author = {Atif Mahmood and Miss Laiha Mat Kiah and Muhammad Reza Z'aba and Adnan N. Qureshi and Muhammad Shahreeza Safiruz Kassim and Zati Hakim Azizul and Jagadeesh Kakarla and Iraj Sadegh Amiri and Saaidal Razalli Azzuhri}, title = {Capacity and Frequency Optimization of Wireless Backhaul Network Using Traffic Forecasting}, journal = {{IEEE} Access}, volume = {8}, pages = {23264--23276}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2970224}, doi = {10.1109/ACCESS.2020.2970224}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MahmoodKZQKAKAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HossainNYAZA20, author = {Mohammad Asif Hossain and Rafidah Md. Noor and Kok{-}Lim Alvin Yau and Saaidal Razalli Azzuhri and Muhammad Reza Z'aba and Ismail Ahmedy}, title = {Comprehensive Survey of Machine Learning Approaches in Cognitive Radio-Based Vehicular Ad Hoc Networks}, journal = {{IEEE} Access}, volume = {8}, pages = {78054--78108}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2989870}, doi = {10.1109/ACCESS.2020.2989870}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HossainNYAZA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcritis/QassimJZK20, author = {Qais Saif Qassim and Norziana Jamil and Muhammad Reza Z'aba and Wan Azlan Wan Kamarulzaman}, title = {Assessing the cyber-security of the {IEC} 60870-5-104 protocol in {SCADA} system}, journal = {Int. J. Crit. Infrastructures}, volume = {16}, number = {2}, pages = {91--106}, year = {2020}, url = {https://doi.org/10.1504/IJCIS.2020.107242}, doi = {10.1504/IJCIS.2020.107242}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcritis/QassimJZK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpp/AhmadNZQIS20, author = {Iftikhar Ahmad and Rafidah Md Noor and Muhammad Reza Z'aba and Muhammad Ahsan Qureshi and Muhammad Imran and Muhammad Shoaib}, title = {A Cooperative Heterogeneous Vehicular Clustering Mechanism for Road Traffic Management}, journal = {Int. J. Parallel Program.}, volume = {48}, number = {5}, pages = {870--889}, year = {2020}, url = {https://doi.org/10.1007/s10766-019-00629-y}, doi = {10.1007/S10766-019-00629-Y}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijpp/AhmadNZQIS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/KolandaisamyNZA20, author = {Raenu Kolandaisamy and Rafidah Md. Noor and Muhammad Reza Z'aba and Ismail Ahmedy and Indraah Kolandaisamy}, title = {Adapted stream region for packet marking based on DDoS attack detection in vehicular ad hoc networks}, journal = {J. Supercomput.}, volume = {76}, number = {8}, pages = {5948--5970}, year = {2020}, url = {https://doi.org/10.1007/s11227-019-03088-x}, doi = {10.1007/S11227-019-03088-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/KolandaisamyNZA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/AhmadNZ19, author = {Iftikhar Ahmad and Rafidah Md Noor and Muhammad Reza Z'aba}, title = {{LTE} efficiency when used in traffic information systems: {A} stable interest aware clustering}, journal = {Int. J. Commun. Syst.}, volume = {32}, number = {2}, year = {2019}, url = {https://doi.org/10.1002/dac.3853}, doi = {10.1002/DAC.3853}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/AhmadNZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/KolandaisamyNAA18, author = {Raenu Kolandaisamy and Rafidah Md Noor and Ismail Ahmedy and Iftikhar Ahmad and Muhammad Reza Z'aba and Muhammad Imran and Mohammed Abdullah Alnuem}, title = {A Multivariant Stream Analysis Approach to Detect and Mitigate DDoS Attacks in Vehicular Ad Hoc Networks}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2018}, pages = {2874509:1--2874509:13}, year = {2018}, url = {https://doi.org/10.1155/2018/2874509}, doi = {10.1155/2018/2874509}, timestamp = {Tue, 11 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wicomm/KolandaisamyNAA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithms/PohBCMLMZ17, author = {Geong Sen Poh and Vishnu Monn Baskaran and Ji{-}Jian Chin and Moesfa Soeheila Mohamad and Kay Win Lee and Dharmadharshni Maniam and Muhammad Reza Z'aba}, title = {Searchable Data Vault: Encrypted Queries in Secure Distributed Cloud Storage}, journal = {Algorithms}, volume = {10}, number = {2}, pages = {52}, year = {2017}, url = {https://doi.org/10.3390/a10020052}, doi = {10.3390/A10020052}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithms/PohBCMLMZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ngc/IsaJZ16, author = {Herman Isa and Norziana Jamil and Muhammad Reza Z'aba}, title = {Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle Dance}, journal = {New Gener. Comput.}, volume = {34}, number = {3}, pages = {221--238}, year = {2016}, url = {https://doi.org/10.1007/s00354-016-0302-2}, doi = {10.1007/S00354-016-0302-2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ngc/IsaJZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/IsaJZ13, author = {Herman Isa and Norziana Jamil and Muhammad Reza Z'aba}, editor = {Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Oleg B. Makarevich}, title = {S-box construction from non-permutation power functions}, booktitle = {The 6th International Conference on Security of Information and Networks, {SIN} '13, Aksaray, Turkey, November 26-28, 2013}, pages = {46--53}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523514.2523525}, doi = {10.1145/2523514.2523525}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/IsaJZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/PohMZ12, author = {Geong Sen Poh and Moesfa Soeheila Mohamad and Muhammad Reza Z'aba}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Structured Encryption for Conceptual Graphs}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {105--122}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_7}, doi = {10.1007/978-3-642-34117-5\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/PohMZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/IsaZ12, author = {Herman Isa and Muhammad Reza Z'aba}, editor = {Manoj Singh Gaur and Atilla El{\c{c}}i and Oleg B. Makarevich and Mehmet A. Orgun and Virendra Singh}, title = {Randomness analysis on {LED} block ciphers}, booktitle = {5th International Conference of Security of Information and Networks, {SIN} '12, Jaipur, India, October 22 - 26, 2012}, pages = {60--66}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2388576.2388584}, doi = {10.1145/2388576.2388584}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/IsaZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/IsaBSZ11, author = {Herman Isa and Iskandar Bahari and Hasibah Sufian and Muhammad Reza Z'aba}, title = {{AES:} Current security and efficiency analysis of its alternatives}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {267--274}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122831}, doi = {10.1109/ISIAS.2011.6122831}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/IsaBSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/PohZ11, author = {Geong Sen Poh and Muhammad Reza Z'aba}, editor = {Mehmet A. Orgun and Atilla El{\c{c}}i and Oleg B. Makarevich and Sorin A. Huss and Josef Pieprzyk and Lyudmila K. Babenko and Alexander G. Chefranov and Rajan Shankaran}, title = {On the security and practicality of a buyer seller watermarking protocol for {DRM}}, booktitle = {Proceedings of the 4th International Conference on Security of Information and Networks, {SIN} 2011, Sydney, NSW, Australia, November 14-19, 2011}, pages = {251--254}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2070425.2070471}, doi = {10.1145/2070425.2070471}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/PohZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/ZabaRSDHW09, author = {Muhammad Reza Z'aba and H{\aa}vard Raddum and Leonie Simpson and Ed Dawson and Matt Henricksen and Kenneth Koon{-}Ho Wong}, editor = {Ljiljana Brankovic and Willy Susilo}, title = {Algebraic Analysis of {LEX}}, booktitle = {Seventh Australasian Information Security Conference, {AISC} 2009, Wellington, New Zealand, January 2009}, series = {{CRPIT}}, volume = {98}, pages = {33--45}, publisher = {Australian Computer Society}, year = {2009}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98RezaZaba.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/ZabaRSDHW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZabaSDW09, author = {Muhammad Reza Z'aba and Leonie Simpson and Ed Dawson and Kenneth Koon{-}Ho Wong}, editor = {Feng Bao and Moti Yung and Dongdai Lin and Jiwu Jing}, title = {Linearity within the {SMS4} Block Cipher}, booktitle = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6151}, pages = {248--265}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-16342-5\_18}, doi = {10.1007/978-3-642-16342-5\_18}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ZabaSDW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ZabaRHD08, author = {Muhammad Reza Z'aba and H{\aa}vard Raddum and Matthew Henricksen and Ed Dawson}, editor = {Kaisa Nyberg}, title = {Bit-Pattern Based Integral Attack}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {363--381}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_23}, doi = {10.1007/978-3-540-71039-4\_23}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ZabaRHD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.