Fog computing, applications, security and challenges, review G Rahman, CC Wen International Journal of Engineering & Technology 7 (3), 1615-1621, 2018 | 53 | 2018 |
Blockchain-based electronic voting protocol CCZ Wei, CC Wen JOIV: International Journal on Informatics Visualization 2 (4-2), 336-341, 2018 | 26 | 2018 |
Key derivation function: the SCKDF scheme CW Chuah, E Dawson, L Simpson Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013 | 22 | 2013 |
Audio steganography with embedded text CT Jian, CC Wen, NHBA Rahman, IRBA Hamid IOP conference series: materials science and engineering 226 (1), 012084, 2017 | 20 | 2017 |
Staff attendance system using rfid MTA Razak, CC Wen JOIV: International Journal on Informatics Visualization 1 (4-2), 250-255, 2017 | 14 | 2017 |
A comparative study with RapidMiner and WEKA tools over some classification techniques for SMS spam CFM Foozy, R Ahmad, MAF Abdollah, CC Wen IOP Conference Series: Materials Science and Engineering 226 (1), 012100, 2017 | 12 | 2017 |
An Intelligence Brute Force Attack on RSA Cryptosystem CJ Mok, CW Chuah Communications in Computational and Applied Mathematics 1 (1), 2019 | 11 | 2019 |
Mutual authentication security scheme in fog computing G Rahman, CC Wen International Journal of Advanced Computer Science and Applications 10 (11), 2019 | 11 | 2019 |
Smart indoor home surveillance monitoring system using Raspberry Pi LH Keat, CC Wen JOIV: International Journal on Informatics Visualization 2 (4-2), 299-308, 2018 | 11 | 2018 |
Android malware classification using K-means clustering algorithm IRA Hamid, NS Khalid, NA Abdullah, NH Ab Rahman, CC Wen IOP Conference Series: Materials Science and Engineering 226 (1), 012105, 2017 | 10 | 2017 |
A framework for security analysis of key derivation functions CC Wen, E Dawson, JM González Nieto, L Simpson Information Security Practice and Experience: 8th International Conference …, 2012 | 9 | 2012 |
Man in the Middle Attack Prevention for edg-fog, mutual authentication scheme G Rahman, CC Wen International Journal of Recent Technology and Engineering (IJRTE) 8 (2s2), 2019 | 6 | 2019 |
Forecasting ASEAN countries exchange rates using auto regression model based on triangular fuzzy number HM Rahman, N Arbaiy, R Efendi, CC Wen Indonesian Journal of Electrical Engineering and Computer Science 14 (3 …, 2019 | 6 | 2019 |
On power analysis attacks against hardware stream ciphers RD Silva, I Navaratna, M Kumarasiri, J Alawatugoda, CC Wen International Journal of Information and Computer Security 17 (1-2), 21-35, 2022 | 5 | 2022 |
Robust security framework with bit‐flipping attack and timing attack for key derivation functions WW Koh, CW Chuah IET Information Security 14 (5), 562-571, 2020 | 5 | 2020 |
Enhancing the randomness of symmetric key using genetic algorithm AZ Zakaria, SN Ramli, CC Wen, CFM Foozy, PSS Palaniappan, ... International Journal of Innovative Technology and Exploring Engineering …, 2019 | 5 | 2019 |
Email authentication using symmetric and asymmetric key algorithm encryption MAA Halim, CC Wen, I Rahmi, NA Abdullah, NHA Rahman AIP Conference Proceedings 1891 (1), 2017 | 5 | 2017 |
Review on leakage resilient key exchange security model ZWC Chan, CW Chuah, J Alawatugoda International Journal of Communication Networks and Information Security …, 2019 | 4 | 2019 |
Timing side channel attack on key derivation functions CW Chuah, WW Koh Information Science and Applications 2017: ICISA 2017 8, 266-273, 2017 | 4 | 2017 |
Electronic medical record system using ethereum blockchain and role-based access control CM Loh, CW Chuah Applied Information Technology And Computer Science 2 (2), 53-72, 2021 | 3 | 2021 |