Habibah Hashim

According to our database1, Habibah Hashim authored at least 18 papers between 2010 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Extending hybrid approach to secure Trivial File Transfer Protocol in M2M communication: a comparative analysis.
Telecommun. Syst., 2019

2017
An automobile security protocol: side-channel security against timing and relay attacks.
Int. J. Electron. Secur. Digit. Forensics, 2017

Development of Unique Identity for E-Health Sensor Node in EHEART Passwordless Authentication Protocol.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

2014
An Experimental Study of Cryptography Capability using Chained Key Exchange Scheme for Embedded Devices.
CoRR, 2014

A Secure TFTP Protocol with Security Proofs.
CoRR, 2014

Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack.
CoRR, 2014

A throughput analysis of uplink subframe polling in IEEE 802.16j network.
Proceedings of the IEEE 2nd International Symposium on Telecommunication Technologies, 2014

RF simulator for cryptographic protocol.
Proceedings of the 2014 IEEE International Conference on Control System, 2014

2013
Throughput analysis of LAN and WAN network based on socket buffer length using JPerf.
Proceedings of the 2013 IEEE International Conference on Control System, 2013

A Queueing Analysis of Polling Based for Mobile Multihop Relay WiMAX Networks.
Proceedings of the Fifth International Conference on Computational Intelligence, 2013

2012
Identity-based Trusted Authentication in Wireless Sensor Network
CoRR, 2012

Integrity Verification Architecture (IVA) Based Security Framework for Windows Operating System.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Finest authorizing member of common criteria certification.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
IBE-Trust: A security framework for Wireless Sensor Networks.
Proceedings of the 2011 World Congress on Internet Security, 2011

Analysis of energy consumption on IBE-Trust security framework.
Proceedings of the IEEE 17th Asia-Pacific Conference on Communications, 2011

Root of trust for trusted node based-on ARM11 platform.
Proceedings of the IEEE 17th Asia-Pacific Conference on Communications, 2011

2010
Forming Virtualized Secure Framework for Location Based Services (LBS) using Direct Anonymous Attestation (DAA) protocol.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

A conceptual framework providing Direct Anonymous Attestation (DAA) protocol in trusted location-based services (LBS).
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010


  Loading...