Showing
1 - 6
results of
6
for search '
Zain J
'
Skip to content
Home
High Impact Articles
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
Jawi Collection
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Zain J
Showing
1 - 6
results of
6
for search '
Zain J
'
, query time: 0.05s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Romidepsin in the treatment of cutaneous T-cell lymphoma
by
Jain S
,
Zain
J
Published 2011-04-01
Get full text
Article
2
Peripheral T cell lymphoma: clinical utility of romidepsin
by
Sawey K
,
Zain
J
Published 2012-06-01
Get full text
Article
3
Access Control: Ciphertext Policy - Attribute Based Encryption in Cloud Computing
by
Mohd
Zain
,
J
.
,
Muhammad, N.
Published 2021
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
4
Current issues in Ciphertext Policy-Attribute based scheme for cloud computing: A survey
by
Mohamad, M.
,
Muhammad, N.
,
Zain
,
J
.M
Published 2018
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
5
Mobile Cloud Computing with SOAP and REST Web Services
by
Ali, M.
,
Anwar, S.
,
Zain
,
J
.M
,
Zolkipli, M.F
Published 2018
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
6
From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
by
Anthony, B.
,
Anwar, S.
,
Chang, V.
,
Inayat, Z.
,
Khan, S.
,
Zain
,
J
.M
,
Zolkipli, M.F
Published 2017
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
Search Tools:
Get RSS Feed
—
Email this Search
Related Subjects
Digital storage
Network security
ABE Scheme
Access control
Attacks
Attribute-based encryptions
Battery Consumption
Battery consumption
Big data
CP-ABE Problems
CP-ABE Scheme
Ciphertext-policy attribute-based encryptions
Cloud computing
Cloud computing security
Cloud storage systems
Computational Offloading
Computer crime
Cryptographic techniques
Cryptography
Distributed database systems
Distributed systems
Encryption schemes
Energy utilization
Execution Time
Execution time
Important features
In-depth understanding
Information management
Information security
Intrusion
Loading...