


default search action
Azman Samsudin
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j28]Mohamad Amar Irsyad Mohd Aminuddin, Zarul Fitri Zaaba
, Azman Samsudin, Faiz Zaki
, Nor Badrul Anuar:
The rise of website fingerprinting on Tor: Analysis on techniques and assumptions. J. Netw. Comput. Appl. 212: 103582 (2023) - 2021
- [j27]Moatsum Alawida
, Azman Samsudin
, Nancy Alajarmeh
, Je Sen Teh
, Musheer Ahmad
, Wafa' Hamdan Alshoura
:
A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence. IEEE Access 9: 17882-17897 (2021) - [j26]Ruba Awadallah
, Azman Samsudin
, Je Sen Teh
, Mishal Almazrooie
:
An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain. IEEE Access 9: 69513-69526 (2021) - [j25]Ruba Awadallah
, Azman Samsudin
:
Using Blockchain in Cloud Computing to Enhance Relational Database Security. IEEE Access 9: 137353-137366 (2021) - [j24]Soo Fun Tan
, Azman Samsudin
:
Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey. Sensors 21(19): 6647 (2021) - 2020
- [j23]Je Sen Teh, Weijian Teng, Azman Samsudin, Jiageng Chen:
A post-processing method for true random number generators based on hyperchaos with applications in audio-based generators. Frontiers Comput. Sci. 14(6): 146405 (2020) - [j22]Moatsum Alawida
, Azman Samsudin, Je Sen Teh
:
Enhanced digital chaotic maps based on bit reversal with applications in random bit generators. Inf. Sci. 512: 1155-1169 (2020) - [j21]Mishal Almazrooie, Azman Samsudin
, Adnan Abdul-Aziz Gutub
, Muhammad Syukri Salleh, Mohd. Adib Omar, Shahir Akram Hassan
:
Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. J. King Saud Univ. Comput. Inf. Sci. 32(1): 24-34 (2020)
2010 – 2019
- 2019
- [j20]Moatsum Alawida
, Azman Samsudin
, Je Sen Teh
, Wafa' Hamdan Alshoura:
Digital Cosine Chaotic Map for Cryptographic Applications. IEEE Access 7: 150609-150622 (2019) - [j19]Moatsum Alawida, Azman Samsudin, Je Sen Teh
, Rami S. Alkhawaldeh
:
A new hybrid digital chaotic system with applications in image encryption. Signal Process. 160: 45-58 (2019) - [j18]Moatsum Alawida
, Je Sen Teh
, Azman Samsudin, Wafa' Hamdan Alshoura:
An image encryption scheme based on hybridizing digital chaos and finite state machine. Signal Process. 164: 249-266 (2019) - [c12]Moatsum Alawida, Azman Samsudin, Wafa' Hamdan Alshoura:
Enhancing One-Dimensional Chaotic Map Based on Bitstream Dividing Model. ICSCA 2019: 130-134 - 2018
- [j17]Mishal Almazrooie
, Azman Samsudin, Rosni Abdullah, Kussay N. Mutter:
Quantum reversible circuit of AES-128. Quantum Inf. Process. 17(5): 112 (2018) - [c11]Mishal Almazrooie, Rosni Abdullah, Azman Samsudin, Kussay N. Mutter:
Quantum Grover Attack on the Simplified-AES. ICSCA 2018: 204-211 - 2017
- [j16]Soo-Fun Tan, Azman Samsudin:
Ciphertext Policy-Attribute Based Homomorphic Encryption (CP-ABHER-LWE) Scheme: A Fine-Grained Access Control on Outsourced Cloud Data Computation. J. Inf. Sci. Eng. 33(3): 675-694 (2017) - [j15]Je Sen Teh
, Azman Samsudin
:
A Chaos-Based Authenticated Cipher with Associated Data. Secur. Commun. Networks 2017: 9040518:1-9040518:15 (2017) - [j14]Jiageng Chen, Jesen Teh
, Zhe Liu
, Chunhua Su, Azman Samsudin, Yang Xiang
:
Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks. IEEE Trans. Computers 66(10): 1763-1777 (2017) - 2016
- [j13]Tan Soo Fun
, Azman Samsudin:
A Survey of Homomorphic Encryption for Outsourced Big Data Computation. KSII Trans. Internet Inf. Syst. 10(8): 3826-3851 (2016) - [c10]Jiageng Chen
, Jesen Teh
, Chunhua Su, Azman Samsudin, Junbin Fang:
Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework. ACISP (2) 2016: 333-346 - 2015
- [j12]Mishal Almazrooie, Azman Samsudin, Manmeet Mahinderjit Singh
:
Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map. J. Inf. Process. Syst. 11(2): 310 (2015) - [j11]Hani Mahmoud Almimi
, Azman Samsudin
, Shahram Jahani:
Elliptic-curve scalar multiplication algorithm using ZOT structure. Secur. Commun. Networks 8(6): 1141-1154 (2015) - 2014
- [j10]Mohammad Anagreh, Azman Samsudin, Mohd. Adib Omar:
Parallel method for computing elliptic curve scalar multiplication based on MOF. Int. Arab J. Inf. Technol. 11(6): 521-525 (2014) - [j9]Shahram Jahani, Azman Samsudin, Kumbakonam Govindarajan Subramanian:
Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications. J. Appl. Math. 2014: 107109:1-107109:9 (2014) - 2013
- [j8]Amir Akhavan
, Azman Samsudin
, Afshin Akhshani
:
A novel parallel hash function based on 3D chaotic map. EURASIP J. Adv. Signal Process. 2013: 126 (2013) - [j7]Abdullah Jaafar, Azman Samsudin:
An Improved Version of the Visual Digital Signature Scheme. Int. Arab J. Inf. Technol. 10(6): 595-602 (2013) - [j6]Sohrab Behnia
, Amir Akhavan
, Afshin Akhshani
, Azman Samsudin
:
Image encryption based on the Jacobian elliptic maps. J. Syst. Softw. 86(9): 2429-2438 (2013) - [i2]Azruddin Ahmad, Gobithasan Rudrusamy, Rahmat Budiarto, Azman Samsudin, Sureswaran Ramadass:
A Hybrid Rule Based Fuzzy-Neural Expert System For Passive Network Monitoring. CoRR abs/1304.7843 (2013) - [i1]Gobithasan Rudrusamy, Azrudin Ahmad, Rahmat Budiarto, Azman Samsudin, Sureswaran Ramadass:
Fuzzy Based Diagnostics System for Identifying Network Traffic Flow Anomalies. CoRR abs/1304.7864 (2013) - 2012
- [j5]Alfin Syafalni, Azman Samsudin
, Yazid Jaafar, Mohd. Adib Omar:
ROSS: Low-Cost Self-Securing VoIP Communication Framework. KSII Trans. Internet Inf. Syst. 6(12): 3366-3383 (2012) - 2011
- [j4]Sohrab Behnia
, Amir Akhavan
, Afshin Akhshani
, Azman Samsudin
:
A novel dynamic model of pseudo random number generator. J. Comput. Appl. Math. 235(12): 3455-3463 (2011) - [j3]Khaled Suwais, Azman Samsudin:
LTSC-128: Stream Cipher Based on the Intractable Shortest Vector Problem in Lattice. J. Digit. Inf. Manag. 9(1): 27-32 (2011) - [j2]Amir Akhavan
, Azman Samsudin
, Afshin Akhshani
:
A symmetric image encryption scheme based on combination of nonlinear chaotic maps. J. Frankl. Inst. 348(8): 1797-1813 (2011)
2000 – 2009
- 2004
- [c9]Goh Han Keat, Azman Samsudin, Zurinahni Zainol:
Enhance Performance of Secure Image Using Wavelet Compression. International Conference on Computational Intelligence 2004: 101-104 - 2003
- [c8]Muhammad Aiman Mazlan, Azman Samsudin, Rahmat Budiarto:
Secure Groups Communication Using Mobile Agents Technologies. CITA 2003: 269-274 - 2002
- [c7]Putra Sumari, M. A. Osman, Azman Samsudin, Hailiza Kamarulhaili:
Data Storage for Video on Demand Servers. Communications, Internet, and Information Technology 2002: 376-381 - [c6]Wai Han Soo, Azman Samsudin, Alwyn Goh:
Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network. ISC 2002: 446-458 - [c5]Putra Sumari
, Azman Samsudin, Hailiza Kamarulhaili
:
Data Storage and Retrieval for Video-on-Demand Servers. ISMSE 2002: 240-245 - 2000
- [j1]David Ngo Chek Ling, Azman Samsudin, Rosni Abdullah:
Aesthetic Measures for Assessing Graphic Screens. J. Inf. Sci. Eng. 16(1): 97-116 (2000)
1990 – 1999
- 1999
- [c4]Abdullah Embong, Azman Samsudin:
Local and Global Considerations in Line Drawing Interpretations of Partially Occluded Patterns. SIP 1999: 149-153 - 1998
- [c3]Azman Samsudin, Kyungsook Y. Lee:
nD-dBPN: New Self-Routing Permutation Networks Based On the de Bruijn Digraphs. ICPP 1998: 604-611 - 1997
- [c2]Azman Samsudin, Kyungsook Y. Lee:
Inverse de Bruijn and Inverse Kautz Optical Networks. Euro-PDS 1997: 156-159 - [c1]Azman Samsudin, Kyungsook Y. Lee:
KautzNet: Multihop Lightwave Networks. Euro-PDS 1997: 160-165
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-18 02:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint