Login / Signup
ISBAST
2012
2014
2012
2014
Keyphrases
Publications
2014
Shabnam Kasra Kermanshahi
,
Mazleena Salleh
An enhanced certificateless cryptosystem for mobile ad hoc networks.
ISBAST
(2014)
Mohammed Faez Al-Jaberi
,
Anazida Zainal
Data integrity and privacy model in cloud computing.
ISBAST
(2014)
Taqwa Ahmed
,
Maheyzah Md Siraj
,
Anazida Zainal
,
Mazura Mat Din
A taxonomy on intrusion alert aggregation techniques.
ISBAST
(2014)
Eduardo Cermeño
,
Silvana Mallor
,
Juan A. Sigüenza
Offline handwriting segmentation for writer identification.
ISBAST
(2014)
Nelmiawati
,
Mazleena Salleh
,
Malek Najib Omar
Pixel-based dispersal scheme for medical image survivability and confidentiality.
ISBAST
(2014)
Saeid Bakhtiari
,
Subariah Ibrahim
,
Mazleena Salleh
,
Majid Bakhtiari
JPEG mage encryption with Elliptic Curve Cryptography.
ISBAST
(2014)
Xiong Li
,
Muhammad Khurram Khan
,
Saru Kumari
,
Junguo Liao
,
Wei Liang
Cryptanalysis of a robust smart card authentication scheme for multi-server architecture.
ISBAST
(2014)
Iman Omidvar Tehrani
,
Subariah Ibrahim
An enhanced fuzzy c-means medical segmentation algorithm.
ISBAST
(2014)
Shukor Abd Razak
Preface.
ISBAST
(2014)
Malek Najib Omar
,
Mazleena Salleh
,
Majid Bakhtiari
Biometric encryption to enhance confidentiality in Cloud computing.
ISBAST
(2014)
Lu Leng
,
Ming Li
,
Andrew Beng Jin Teoh
Matching reduction of 2DPalmHash Code.
ISBAST
(2014)
Syed Zainudeen Mohd Shaid
,
Mohd Aizaini Maarof
Malware behavior image for malware variant identification.
ISBAST
(2014)
Mohd. Zamri Osman
,
Mohd Aizaini Maarof
,
Mohd. Foad Rohani
Improved skin detection based on dynamic threshold using multi-colour space.
ISBAST
(2014)
Mehdi Barati
,
Azizol Abdullah
,
Nur Izura Udzir
,
Ramlan Mahmod
,
Norwati Mustapha
Distributed Denial of Service detection using hybrid machine learning technique.
ISBAST
(2014)
Ali Feizollah
,
Nor Badrul Anuar
,
Rosli Salleh
,
Fairuz Amalina
Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis.
ISBAST
(2014)
Xi Chen
,
Wen Li
,
Zengli Liu
,
Zaihong Zhou
Fractional low-order independent component analysis for face recognition robust to partial occlusion.
ISBAST
(2014)
Biao Song
,
Yuan Tian
,
Bingyin Zhou
Design and Evaluation of Remote Video Surveillance System on Private Cloud.
ISBAST
(2014)
Cynthia S. Mlambo
,
Fulufhelo V. Nelwamondo
,
Mmamolatelo E. Mathekga
Comparison of effective hough transform-based fingerprint alignment approaches.
ISBAST
(2014)
Noor Afiza Mohd Ariffin
,
Nor Fazlida Mohd Sani
Plan recognition scheme using multi-factors authentication for smart card online system.
ISBAST
(2014)
Ali Sharifara
,
Mohd Shafry Mohd Rahim
,
Yasaman Anisi
A general review of human face detection including a study of neural networks and Haar feature-based cascade classifier in face detection.
ISBAST
(2014)
Seyed-Mohsen Ghoreishi
,
Shukor Abd Razak
,
Ismail Fauzi Isnin
,
Hassan Chizari
New secure identity-based and certificateless authenticated Key Agreement protocols without pairings.
ISBAST
(2014)
Warusia Yassin
,
Nur Izura Udzir
,
Azizol Abdullah
,
Mohd Taufik Abdullah
,
Hazura Zulzalil
,
Zaiton Muda
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers.
ISBAST
(2014)
Waleed Halboob
,
Ali Mamat
,
Ramlan Mahmod
Push-based XML access control policy languages: A review.
ISBAST
(2014)
Chng Chern Wei
DNA approach for password conversion generator.
ISBAST
(2014)
Reza Adinehnia
,
Nur Izura Udzir
,
Lilly Suriani Affendey
,
Iskandar Ishak
,
Zurina Mohd Hanapi
Effective mining on large databases for intrusion detection.
ISBAST
(2014)
Dieynaba Mall
,
Karim Konaté
,
Al-Sakib Khan Pathan
SECRET: A secure and efficient certificate revocation scheme for Mobile Ad hoc Networks.
ISBAST
(2014)
Natasha Arjumand Shoaib Mirza
,
Haider Abbas
,
Farrukh Aslam Khan
,
Jalal Al-Muhtadi
Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms.
ISBAST
(2014)
Omar Tayan
,
Yasser M. Alginahi
A review of recent advances on multimedia watermarking security and design implications for digital Quran computing.
ISBAST
(2014)
Fajri Kurniawan
,
Mohammed S. Khalil
,
Muhammad Khurram Khan
,
Yasser M. Alginahi
DWT+LSB-based fragile watermarking method for digital Quran images.
ISBAST
(2014)
Sisanda Makinana
,
Johannes J. Van Der Merwe
,
Tendani Malumedzha
A fourier transform quality measure for iris images.
ISBAST
(2014)
Xianfeng Guo
,
Xiaomin Wang
Cryptanalysis and improvement of a chaotic key agreement scheme.
ISBAST
(2014)
Muhammad Syafiq bin Samsi
,
Shukor Abd Razak
A mechanism for privacy preserving in healthcare organizations.
ISBAST
(2014)
Selma Elnasir
,
Siti Mariyam Shamsuddin
Proposed scheme for palm vein recognition based on Linear Discrimination Analysis and nearest neighbour classifier.
ISBAST
(2014)
Xi Chen
,
Luping Zheng
,
Zengli Liu
,
Jiashu Zhang
Privacy-preserving biometrics using matrix random low-rank approximation approach.
ISBAST
(2014)
Ahmad A. H. El Farra
,
Edmond Zahedi
Interactive educational tool for teaching a simple cipher.
ISBAST
(2014)
Sim Hiew Moi
,
Hishammuddin Asmuni
,
Rohayanti Hassan
,
Razib M. Othman
A unified approach for unconstrained off-angle iris recognition.
ISBAST
(2014)
Robert T. Hans
Using a biometric system to check-in and check-out luggage at airports.
ISBAST
(2014)
2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014, Kuala Lumpur, Malaysia, August 26-27, 2014
ISBAST
(2014)
Abba Babakura
,
Md Nasir Sulaiman
,
Mahmud A. Yusuf
Improved method of classification algorithms for crime prediction.
ISBAST
(2014)
Wenyang Liu
,
Xiaomin Wang
,
Wenfang Zhang
,
Xianfeng Guo
A lightweight blockcipher based on chaotic maps.
ISBAST
(2014)
Rong-Jian Chen
,
Jhen-Wun Fan
,
Chin-Hao Liao
Reconfigurable Galois Field multiplier.
ISBAST
(2014)
Saru Kumari
,
Muhammad Khurram Khan
,
Xiong Li
,
Rahul Kumar
Notes on "a password-based remote user authentication scheme without smart card".
ISBAST
(2014)
Sura Khalil Abd
,
Syed Abdul Rahman Al-Haddad
,
Fazirulhisyam Hashim
,
Azizol Abdullah
A review of cloud security based on cryptographic mechanisms.
ISBAST
(2014)
Eimad Abdu Abusham
Face verification using Local Graph Stucture (LGS).
ISBAST
(2014)
Syed Mohd Zahid Syed Zainal Ariffin
,
Nursuriati Jamil
Cross-band ear recognition in low or variant illumination environments.
ISBAST
(2014)
Fajri Kurniawan
,
Mohd Shafry Mohd Rahim
,
Mohammed S. Khalil
Geometrical and eigenvector features for ear recognition.
ISBAST
(2014)
Isao Nakanishi
,
Takashi Inada
,
Shigang Li
New dedicated measuring devices for intra-palm propagation signals.
ISBAST
(2014)
Doaa Saleh Abobakr Baras
,
Siti Hajar Othman
,
Mohammad Nazir Ahmad
,
Norafida Ithnin
Towards managing information security knowledge through metamodelling approach.
ISBAST
(2014)
Arafat Mohammed Rashad Al-Dhaqm
,
Siti Hajar Othman
,
Shukor Abd Razak
,
Md. Asri Ngadi
Towards adapting metamodelling technique for database forensics investigation domain.
ISBAST
(2014)
Ahmed Yousuf Jama
,
Maheyzah Md Siraj
,
Rashidah Kadir
Towards metamodel-based approach for Information Security Awareness Management.
ISBAST
(2014)