Showing
1 - 6
results of
6
for search '
Yussoff, YM
'
Skip to content
Home
High Impact Articles
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
Jawi Collection
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Yussoff, YM
Showing
1 - 6
results of
6
for search '
Yussoff, YM
'
, query time: 0.11s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Authentication Scheme Interface for Mobile e-Health Monitoring Using Unique and Lightweight Identity-based Authentication
by
Kamarudin, NH
,
Yussoff
,
YM
Published 2016
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
Article
2
A Review of Physical Attacks and Trusted Platforms in Wireless Sensor Networks
by
Baba, MD
,
Hashim, H
,
Rosli, R
,
Yussoff
,
YM
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
Article
3
A review of physical attacks and trusted platforms in Wireless Sensor Networks
by
Baba, M.D
,
Hashim, H.
,
Rosli, R.
,
Yussoff
,
Y.M
Published 2012
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
4
Hybrid cryptographic approach for internet of things applications: A review
by
Hashim, H.
,
Mohamed, N.N
,
Saleh, M.A
,
Yussoff
,
Y.M
Published 2020
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
5
Low power multicarrier-code division multiple access receiver on field programmable gate array
by
Hassan, S.L.M
,
Jaafar, H.
,
Saparon, A.
,
Sulaiman, N.
,
Yussoff
,
Y.M
Published 2019
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
6
Authentication scheme interface for mobile e-health monitoring using unique and lightweight identity-based authentication
by
Abdullah M.H.R.O
,
Bashar N.A.M
,
Kamarudin, N.H
,
Min Y.H
,
Nasir S.M.F.S.A
,
Yussoff
,
Y.M
Published 2016
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
Search Tools:
Get RSS Feed
—
Email this Search
Related Subjects
Security
WBAN
authentication
e-health
identity-based encryption
Combiner
Cryptography
Encryption
FPGA
Internet of things
MC-CDMA
Physical attacks
Pipelined FFT
Public key cryptography
Receiver
Trusted platform
Wireless Sensor Networks
Loading...