Security Issues and Attacks in Wireless Sensor Network AHAKNQ Raja Waseem Anwar, Majid Bakhtiari, Anazida Zainal World Applied Sciences Journal 10 (30), 1224-1227, 2014 | 97* | 2014 |
Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography MS Farash, S Kumari, M Bakhtiari Multimedia Tools and Applications 75, 4485-4504, 2016 | 44 | 2016 |
Serious security weakness in RSA cryptosystem M Bakhtiari, MA Maarof International Journal of Computer Science Issues (IJCSI) 9 (1), 175, 2012 | 40 | 2012 |
Authentication methods in cloud computing: A survey M Babaeizadeh, M Bakhtiari, AM Mohammed Research Journal of Applied Sciences, Engineering and Technology 9 (8), 655-664, 2015 | 33 | 2015 |
Keystroke dynamic authentication in mobile cloud computing M Babaeizadeh, M Bakhtiari, MA Maarof Universiti Teknologi Malaysia, 2014 | 30 | 2014 |
Enhanced trust aware routing against wormhole attacks in wireless sensor networks RW Anwar, M Bakhtiari, A Zainal, AH Abdullah, KN Qureshi 2015 International Conference on Smart Sensors and Application (ICSSA), 56-59, 2015 | 29 | 2015 |
An efficient stream cipher algorithm for data encryption M Bakhtiari, MA Maarof International Journal of Computer Science Issues (IJCSI) 8 (3), 247, 2011 | 26 | 2011 |
Biometric encryption to enhance confidentiality in Cloud computing MN Omar, M Salleh, M Bakhtiari 2014 International symposium on biometrics and security technologies (ISBAST …, 2014 | 25 | 2014 |
A comprehensive literature review of asymmetric key cryptography algorithms for establishment of the existing gap AMM Juliet N. Gaithuru , Majid Bakhtiari, Mazleena Saleh 2015 9th Malaysian Software Engineering Conference (MySEC), 236-244, 2015 | 22 | 2015 |
Printed document integrity verification using barcode A Husain, M Bakhtiari, A Zainal Journal Teknologi (Sciences and Eng, 99-106, 2014 | 19 | 2014 |
Research Article A Survey of Wireless Sensor Network Security and Routing Techniques RW Anwar, M Bakhtiari, A Zainal, KN Qureshi Research Journal of Applied Sciences, Engineering and Technology 9 (11 …, 2015 | 18 | 2015 |
Authentication method through keystrokes measurement of mobile users in cloud environment M Babaeizadeh, M Bakhtiari, MA Maarof Int. J. Advance Soft Compu. Appl 6 (3), 94-112, 2014 | 18 | 2014 |
Insight into the operation of NTRU and a comparative study of NTRU, RSA and ECC public key cryptosystems JN Gaithuru, M Bakhtiari 2014 8th. Malaysian Software Engineering Conference (MySEC), 273-278, 2014 | 16 | 2014 |
Agent-based approach for modeling evacuee uncertainty behavior using game theory model H Chizari, F Malekinezhad, MR Embi, YM Yatim, SA Razak, ... Life Science Journal 10 (3), 1350-1355, 2013 | 14 | 2013 |
JPEG mage encryption with Elliptic Curve Cryptography S Bakhtiari, S Ibrahim, M Salleh, M Bakhtiari 2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014 | 13 | 2014 |
Performance evaluation of routing protocol on aodv and dsr under wormhole attack MG Sanaei, IF Isnin, M Bakhtiari International Journal of Computer Networks and Communications Security 1 (1), 2013 | 11 | 2013 |
An HTTPS approach to resist man in the middle attack in secure SMS using ECC and RSA MM Khan, M Bakhtiari, S Bakhtiari 2013 13th International Conference on Intellient Systems Design and …, 2013 | 10 | 2013 |
Wireless sensor network performance analysis and effect of blackhole and sinkhole attacks RW Anwar, M Bakhtiari, A Zainal, KN Qureshi Jurnal Teknologi (Science & Engineering) 78 (4-3), 75-81, 2016 | 8 | 2016 |
Malicious node detection through trust aware routing in wireless sensor networks N QURESHI Journal of Theoretical and Applied Information Technology 74 (1), 2015 | 8 | 2015 |
Advanced Persistent Threat Detection Based On Network Traffic Noise Pattern and Analysis SCY Ng, M Bakhtiarib Journal of Advanced Research in Computing and Applications 2 (1), 1-18, 2016 | 7 | 2016 |