Distributed lightweight Kerberos protocol for Mobile Agent Systems
Al-Hamadi, H M N, Yeun, C Y, Zemerly, M J, Al-Qutayri, M
Published in 2011 IEEE GCC Conference and Exhibition (GCC) (01.02.2011)
Published in 2011 IEEE GCC Conference and Exhibition (GCC) (01.02.2011)
Get full text
Conference Proceeding
Linear and differential cryptanalysis of small-sized random (n, m)-S-boxes
Alsalami, Y., Yeun, C. Y., Martin, T., Khonji, M.
Published in 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) (01.12.2016)
Published in 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) (01.12.2016)
Get full text
Conference Proceeding
Formal modeling and verification of DLK protocol
Al-Hamadi, H. M. N., Yeun, C. Y., Zemerly, M. J., Al-Qutayri, M. A., Gawanmeh, A.
Published in 2011 International Conference for Internet Technology and Secured Transactions (01.12.2011)
Get full text
Published in 2011 International Conference for Internet Technology and Secured Transactions (01.12.2011)
Conference Proceeding
Security for emerging ubiquitous networks
Chan Yeob Yeun, Eng Keong Lua, Crowcroft, J.
Published in VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005 (2005)
Published in VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005 (2005)
Get full text
Conference Proceeding
A unified countermeasure against side channel attacks on cryptographic RFID
Marzouqi, H., Salah, K., Al-Qutayri, M., Yeun, M. C. Y.
Published in 2011 International Conference for Internet Technology and Secured Transactions (01.12.2011)
Get full text
Published in 2011 International Conference for Internet Technology and Secured Transactions (01.12.2011)
Conference Proceeding