default search action
Habibah Hashim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c14]Nurul Iman Hassan, Nooritawati Md. Tahir, Fadhlan Hafizhelmi Kamaru Zaman, Habibah Hashim:
People Detection System Using YOLOv3 Algorithm. ICCSCE 2020: 131-136 - [c13]Muhamad Izham Hadi Azhar, Fadhlan Hafizhelmi Kamaru Zaman, Nooritawati Md. Tahir, Habibah Hashim:
People Tracking System Using DeepSORT. ICCSCE 2020: 137-141
2010 – 2019
- 2019
- [j2]Nur Nabila Mohamed, Yusnani Mohd Yussoff, Mohd Anuar Mat Isa, Habibah Hashim:
Extending hybrid approach to secure Trivial File Transfer Protocol in M2M communication: a comparative analysis. Telecommun. Syst. 70(4): 511-523 (2019) - 2017
- [j1]Mohd Anuar Mat Isa, Habibah Hashim, Syed Farid Syed Adnan, Norhaflyza Marbukhari, Nur Nabila Mohamed:
An automobile security protocol: side-channel security against timing and relay attacks. Int. J. Electron. Secur. Digit. Forensics 9(3): 239-253 (2017) - [c12]Nazhatul Hafizah Kamarudin, Yusnani Mohd Yussoff, Nurhaflyza Marbukhari, Mustaffa Samad, Habibah Hashim:
Development of Unique Identity for E-Health Sensor Node in EHEART Passwordless Authentication Protocol. LCN 2017: 155-158 - 2014
- [c11]Mohd Anuar Mat Isa, Habibah Hashim, Jamalul-lail Ab Manan, Syed Farid Syed Adnan, Ramlan Mahmod:
RF simulator for cryptographic protocol. ICCSCE 2014: 518-523 - [c10]Mohd Daud Alang Hassan, Habibah Hashim, Darmawaty Mohd Ali, Azlina Idris:
A throughput analysis of uplink subframe polling in IEEE 802.16j network. ISTT 2014: 273-277 - [i4]Mohd Anuar Mat Isa, Habibah Hashim, Syed Farid Syed Adnan, Jamalul-lail Ab Manan, Ramlan Mahmod:
A Secure TFTP Protocol with Security Proofs. CoRR abs/1409.0060 (2014) - [i3]Mohd Anuar Mat Isa, Habibah Hashim, Jamalul-lail Ab Manan, Syed Farid Syed Adnan, Ramlan Mahmod:
An Experimental Study of Cryptography Capability using Chained Key Exchange Scheme for Embedded Devices. CoRR abs/1409.0065 (2014) - [i2]Mohd Anuar Mat Isa, Habibah Hashim:
Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack. CoRR abs/1409.6556 (2014) - 2013
- [c9]Mohd Daud Alang Hassan, Habibah Hashim, Darmawaty Mohd Ali, NurHidayat Ahmad:
A Queueing Analysis of Polling Based for Mobile Multihop Relay WiMAX Networks. CICSyN 2013: 322-327 - [c8]Lucyantie Mazalan, Sharifah Syafiqah Syed Hamdan, Nurzaimah Masudi, Habibah Hashim, Ruhani Abd Rahman, Nooritawati Md Tahir, Norliza Zaini, Roszainiza Rosli, Hasmila Akmar Omar:
Throughput analysis of LAN and WAN network based on socket buffer length using JPerf. ICCSCE 2013: 621-625 - 2012
- [c7]Mohd Anuar Mat Isa, Jamalul-lail Ab Manan, Ramlan Mahmod, Habibah Hashim, Mar Yah Said, Nur Izura Udzir, Ali Dehghantanha:
Finest authorizing member of common criteria certification. CyberSec 2012: 155-160 - [c6]Mohd Anuar Mat Isa, Habibah Hashim, Jamalul-lail Ab Manan, Ramlan Mahmod, Hanunah Othman:
Integrity Verification Architecture (IVA) Based Security Framework for Windows Operating System. TrustCom 2012: 1304-1309 - [i1]Yusnani Mohd Yussoff, Habibah Hashim, Mohd Dani Baba:
Identity-based Trusted Authentication in Wireless Sensor Network. CoRR abs/1207.6185 (2012) - 2011
- [c5]Yusnani Mohd Yussoff, Habibah Hashim:
Analysis of energy consumption on IBE-Trust security framework. APCC 2011: 236-240 - [c4]L. H. Adnan, Habibah Hashim, Yusnani Mohd Yussoff, M. U. Kamaluddin:
Root of trust for trusted node based-on ARM11 platform. APCC 2011: 812-815 - [c3]Yusnani Mohd Yussoff, Habibah Hashim:
IBE-Trust: A security framework for Wireless Sensor Networks. WorldCIS 2011: 171-176 - 2010
- [c2]Hanunah Othman, Habibah Hashim, Jamalul-lail Ab Manan:
A conceptual framework providing Direct Anonymous Attestation (DAA) protocol in trusted location-based services (LBS). ICITST 2010: 1-7 - [c1]Hanunah Othman, Habibah Hashim, Mohd Ameer Yuslan Razmi, Jamalul-lail Ab Manan:
Forming Virtualized Secure Framework for Location Based Services (LBS) using Direct Anonymous Attestation (DAA) protocol. WiMob 2010: 622-629
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-29 00:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint