关注
Majid Mumtaz
标题
引用次数
引用次数
年份
Forty years of attacks on the RSA cryptosystem: A brief survey
M Mumtaz, L Ping
Journal of Discrete Mathematical Sciences and Cryptography 22 (1), 9-29, 2019
572019
Droidcc: A scalable clone detection approach for android applications to detect similarity at source code level
J Akram, Z Shi, M Mumtaz, P Luo
2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018
342018
Universities services in the new social ecosystems: Using conversational agents to help teach information security risk analysis
S Kowalski, R Hoffmann, R Jain, M Mumtaz
SOTICS 2011, The First International Conference on Social Eco-Informatics, 91-94, 2011
242011
An RSA based authentication system for smart IoT environment
M Mumtaz, J Akram, L Ping
2019 IEEE 21st International Conference on High Performance Computing and …, 2019
202019
DroidMD: An Efficient and Scalable Android Malware Detection Approach at Source Code Level
PL J. Akram,M. Mumtaz,G. Jabeen
International Journal of Information and Computer Security 15 ((2-3)), 299-321, 2021
132021
IBFET: Index‐based features extraction technique for scalable code clone detection at file level granularity
J Akram, M Mumtaz, P Luo
Software: Practice and Experience 50 (1), 22-46, 2020
122020
DCCD: An Efficient and Scalable Distributed Code Clone Detection Technique for Big Code
J Akram, Z Shi, M Mumtaz, L Ping
The 30th International Conference on Software Engineering and Knowledge …, 2018
122018
Harmonic incursion at the point of common coupling due to small grid-connected power stations
M Mumtaz, SI Khan, WA Chaudhry, ZA Khan
Journal of Electrical Systems and Information Technology 2 (3), 368-377, 2015
82015
An improved cryptanalysis of large RSA decryption exponent with constrained secret key
M Mumtaz, L Ping
International Journal of Information and Computer Security (IJICS), 2021
52021
DroidSD: An Efficient Indexed Based Android Applications Similarity Detection Tool.
J Akram, Z Shi, M Mumtaz, P Luo
J. Inf. Sci. Eng. 36 (1), 13-29, 2020
52020
Remarks on the Cryptanalysis of Common Prime RSA for IoT Constrained Low Power Devices
M Majid, L Ping
Information Sciences, 2020
42020
Cryptanalysis of a special case of RSA large decryption exponent using lattice basis reduction method
M Mumtaz, L Ping
2021 IEEE 6th International Conference on Computer and Communication Systems …, 2021
22021
Cryptanalysis of RSA: A Special Case of Boneh-Durfee’s Attack
M Mumtaz, P Luo
Cryptology ePrint Archive, 2020
22020
Strong authentication protocol based on Java Crypto chips
M Mumtaz, S Muftic, NB Abdullah
Proceedings of the 5th IEEE International Conference on IT Convergence and …, 2015
22015
E_Universities Services in the new social eco-systems: Using Conversational Agents to help Teach Information Security Risk Analysis
R Hoffman, S Kowalski, R Jain, M Mumtaz
12013
E_Universities Services in the New Social Eco-systems: Security Risk Analysis: Using Conversational Agents to Help Teach Information Security Risk Analysis
R Hoffmann, S Kowalski, R Jain, M Mumtaz
12011
Industry 4.0: The Digital Revolution Unleashing Sustainable Supply Chains
M Tayyab, M Mumtaz, NZ Jhanjhi, SM Muzammal
Digital Transformation for Improved Industry and Supply Chain Performance, 54-69, 2024
2024
Industry 4.0: The Digital Revolution Unleashing Sustainable Supply Chain
SMM Muhammad Tayyab, Majid Mumtaz, Noor Zaman Jhanjhi
Digital Transformation for Improved Industry and Supply Chain Performance, 421, 2024
2024
Swarm Security: Tackling Threats in the Age of Drone Swarms
M Tayyab, M Mumtaz, SM Muzammal, NZ Jhanjhi
Cybersecurity Issues and Challenges in the Drone Industry, 324-342, 2024
2024
Strong Authentication Protocol based on Java Crypto Chip as a Secure Element
M Mumtaz, S Muftic, N bin Abdullah
ASTESJ 1 (5), 21-26, 2016
2016
系统目前无法执行此操作,请稍后再试。
文章 1–20