Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ... Human-centric Computing and Information Sciences 5, 1-16, 2015 | 64 | 2015 |
Dental Caries Detection Using Score-Based Multi-Input Deep Convolutional Neural Network A Imak, A Celebi, K Siddique, M Turkoglu, A Sengur, I Salam IEEE Access 10, 18320-18329, 2022 | 51 | 2022 |
Investigating cube attacks on the authenticated encryption stream cipher ACORN MI Salam, H Bartlett, E Dawson, J Pieprzyk, L Simpson, KKH Wong International Conference on Applications and Techniques in Information …, 2016 | 41 | 2016 |
An efficient key pre-distribution scheme for wireless sensor network using public key cryptography MI Salam, P Kumar, HJ Lee The 6th International Conference on Networked Computing and Advanced …, 2010 | 24 | 2010 |
Finding state collisions in the authenticated encryption stream cipher ACORN MI Salam, KKH Wong, H Bartlett, L Simpson, E Dawson, J Pieprzyk Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2016 | 22 | 2016 |
Blockchain-based healthcare management system with two-side verifiability TL Tan, I Salam, M Singh PloS one 17 (4), e0266916, 2022 | 19 | 2022 |
A Review of the NIST Lightweight Cryptography Finalists and Their Fault Analyses H Madushan, I Salam, J Alawatugoda Electronics 11 (24), 4199, 2022 | 19 | 2022 |
Cube Attacks on Round-Reduced TinyJAMBU WL Teng, I Salam, WC Yau, J Pieprzyk, RCW Phan Scientific Reports 12, 2022 | 18 | 2022 |
Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System TH Chua, I Salam arXiv preprint arXiv:2203.05232, 2022 | 16 | 2022 |
Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD I Salam, TH Ooi, L Xue, WC Yau, J Pieprzyk, RCW Phan IEEE Access 9, 72568-72586, 2021 | 16 | 2021 |
Investigating cube attacks on the authenticated encryption stream cipher MORUS I Salam, L Simpson, H Bartlett, E Dawson, J Pieprzyk, KKH Wong 2017 IEEE Trustcom/BigDataSE/ICESS, 961-966, 2017 | 13 | 2017 |
Random fault attacks on a class of stream ciphers H Bartlett, E Dawson, H Quhar al Mahri, MI Salam, L Simpson, KKH Wong Security and Communication Networks, 2019 | 9 | 2019 |
Fault attacks on Tiaoxin-346 I Salam, HQA Mahri, L Simpson, H Bartlett, E Dawson, KKH Wong Proceedings of the Australasian Computer Science Week Multiconference, 1-9, 2018 | 8 | 2018 |
Blockchain based Contact Tracing: A Solution using Bluetooth and Sound Waves for Proximity Detection ZX Hee, I Salam Cryptology ePrint Archive, 2022 | 6 | 2022 |
Investigating Deep Learning Approaches on the Security Analysis of Cryptographic Algorithms BY Chong, I Salam Cryptography 5 (4), 30, 2021 | 6 | 2021 |
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS I Salam, L Simpson, H Bartlett, E Dawson, K Koon-Ho Wong Cryptography 2 (1), 4, 2018 | 6 | 2018 |
Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection Using Progressive Dataset TH Chua, I Salam Symmetry 15 (6), 1251, 2023 | 4 | 2023 |
Differential fault based key recovery attacks on TRIAD I Salam, KY Law, L Xue, WC Yau International Conference on Information Security and Cryptology, 273-287, 2020 | 4 | 2020 |
Impact of Fuzziness for Skin Lesion Classification with Transformer-Based Model I Yasmin, S Sultana, SJ Begum, MJA Patwary, TA Almohamad, I Salam 2023 International Conference on Computing, Electronics & Communications …, 2023 | 3 | 2023 |
Blockchain-Based Multi-keyword Search on Encrypted COVID-19 Contact Tracing Data ZY Ng, I Salam International Conference on Information Security Practice and Experience, 75-92, 2022 | 3 | 2022 |