Loading…
On the security & design of MyKad
Within 5 years, all Malaysians are expected to have their ICs, driving licenses, passport and e-cash (ATM) all rolled into one card: MyKad. As one of the multimedia super corridor's (MSC) multipurpose smart card flagships, MyKad will become the most important card that Malaysians carry in their...
Saved in:
Main Authors: | Raphael C.-W. Phan, Lawan A. Mohammed |
---|---|
Format: | Default Conference proceeding |
Published: |
2003
|
Subjects: | |
Online Access: | https://hdl.handle.net/2134/5695 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Loading…
On the design of forgiving biometric security systems
by: Raphael C.-W. Phan, et al.
Published: (2009)
by: Raphael C.-W. Phan, et al.
Published: (2009)
Loading…
Security limitations of an authorized anonymous ID-based scheme for mobile communication
by: Raphael C.-W. Phan
Published: (2005)
by: Raphael C.-W. Phan
Published: (2005)
Loading…
Security of group key exchange protocols with different passwords
by: Raphael C.-W. Phan
Published: (2009)
by: Raphael C.-W. Phan
Published: (2009)
Loading…
Traceable privacy of recent provably-secure RFID protocols
by: Khaled Ouafi, et al.
Published: (2008)
by: Khaled Ouafi, et al.
Published: (2008)
Loading…
Security of two recent constant-round password authenticated group key exchange schemes
by: Raphael C.-W. Phan
Published: (2009)
by: Raphael C.-W. Phan
Published: (2009)
Loading…
Further attacks and comments on 'security of two remote user authentication schemes using smart cards'
by: Raphael C.-W. Phan, et al.
Published: (2004)
by: Raphael C.-W. Phan, et al.
Published: (2004)
Loading…
(In)security of efficient tree-based group key agreement using bilinear map
by: Raphael C.-W. Phan, et al.
Published: (2008)
by: Raphael C.-W. Phan, et al.
Published: (2008)
Loading…
Analyzing the secure simple pairing in Bluetooth v4.0
by: Raphael C.-W. Phan, et al.
Published: (2012)
by: Raphael C.-W. Phan, et al.
Published: (2012)
Loading…
Notions and relations for RKA-secure permutation and function families
by: Jongsung Kim, et al.
Published: (2011)
by: Jongsung Kim, et al.
Published: (2011)
Loading…
Fixing the integrated Diffie-Hellman-DSA key exchange protocol
by: Raphael C.-W. Phan
Published: (2005)
by: Raphael C.-W. Phan
Published: (2005)
Loading…
On hashing with tweakable ciphers
by: Raphael C.-W. Phan, et al.
Published: (2009)
by: Raphael C.-W. Phan, et al.
Published: (2009)
Loading…
Low-resolution watermarking for print security
by: Khaled W. Mahmoud
Published: (2004)
by: Khaled W. Mahmoud
Published: (2004)
Loading…
Tampering with a watermarking-based image authentication scheme
by: Raphael C.-W. Phan
Published: (2008)
by: Raphael C.-W. Phan
Published: (2008)
Loading…
Physical layer security jamming: Theoretical limits and practical designs in wireless networks
by: Kanapathippillai Cumanan, et al.
Published: (2016)
by: Kanapathippillai Cumanan, et al.
Published: (2016)
Loading…
Non-repudiable authentication and billing architecture for wireless mesh networks
by: Raphael C.-W. Phan
Published: (2011)
by: Raphael C.-W. Phan
Published: (2011)
Loading…
Privacy of recent RFID authentication protocols
by: Khaled Ouafi, et al.
Published: (2008)
by: Khaled Ouafi, et al.
Published: (2008)
Loading…
Robotic table football- revolutionising mechatronics education using myRIO
by: Antony Sutton
Published: (2015)
by: Antony Sutton
Published: (2015)
Loading…
The application of contingency analysis to stability and security planning of the Blue Nile Grid
by: Abdel R.A. Karrar
Published: (1991)
by: Abdel R.A. Karrar
Published: (1991)
Loading…
Trust-based distributed security framework for active networks
by: Weijun Han
Published: (2006)
by: Weijun Han
Published: (2006)
Loading…
Attacks on improved key distribution protocols with perfect reparability
by: Raphael C.-W. Phan, et al.
Published: (2008)
by: Raphael C.-W. Phan, et al.
Published: (2008)
Loading…
Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI
by: Raphael C.-W. Phan
Published: (2009)
by: Raphael C.-W. Phan
Published: (2009)
Loading…
CPS for community security and safety
by: Michael Henshaw, et al.
Published: (2016)
by: Michael Henshaw, et al.
Published: (2016)
Loading…
Aspects of internet security: identity management and online child protection
by: Chris Durbin
Published: (2019)
by: Chris Durbin
Published: (2019)
Loading…
Modem design for digital satellite communications
by: Mohammed Talal
Published: (1997)
by: Mohammed Talal
Published: (1997)
Loading…
Max-ratio relay selection in secure buffer-aided cooperative wireless networks
by: Gaojie Chen, et al.
Published: (2014)
by: Gaojie Chen, et al.
Published: (2014)
Loading…
Secure document and asset tracking
by: Heinz Lugo, et al.
Published: (2013)
by: Heinz Lugo, et al.
Published: (2013)
Loading…
Improved cryptanalysis of skein
by: Jean-Philippe Aumasson, et al.
Published: (2009)
by: Jean-Philippe Aumasson, et al.
Published: (2009)
Loading…
Secure full-duplex two-way relaying for SWIPT
by: Alexander A. Okandeji, et al.
Published: (2017)
by: Alexander A. Okandeji, et al.
Published: (2017)
Loading…
A framework for describing block cipher cryptanalysis
by: Raphael C.-W. Phan, et al.
Published: (2006)
by: Raphael C.-W. Phan, et al.
Published: (2006)
Loading…
Introduction to the issue on signal processing for exploiting interference toward energy efficient and secure wireless communications
by: Ioannis Krikidis, et al.
Published: (2016)
by: Ioannis Krikidis, et al.
Published: (2016)
Loading…
User-controlled cyber-security using automated key generation
by: Halima Shnishah
Published: (2020)
by: Halima Shnishah
Published: (2020)
Loading…
Privacy analysis of forward and backward untraceable RFID authentication schemes
by: Raphael C.-W. Phan, et al.
Published: (2011)
by: Raphael C.-W. Phan, et al.
Published: (2011)
Loading…
Comment on "Relay selection for secure cooperative networks with jamming"
by: Gaojie Chen, et al.
Published: (2012)
by: Gaojie Chen, et al.
Published: (2012)
Loading…
Advanced differential-style cryptanalysis of the NSA's skipjack block cipher
by: Jongsung Kim, et al.
Published: (2009)
by: Jongsung Kim, et al.
Published: (2009)
Loading…
A study of automatic contingency selection algorithms for steady-state security assessment of power systems and the application of parallel processing
by: Ruth P. Saraiva Leao
Published: (1995)
by: Ruth P. Saraiva Leao
Published: (1995)
Loading…
Augmented attack tree modeling of SQL injection attacks
by: Jie Wang, et al.
Published: (2010)
by: Jie Wang, et al.
Published: (2010)
Loading…
Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks
by: Dzevdan Kapetanovic, et al.
Published: (2015)
by: Dzevdan Kapetanovic, et al.
Published: (2015)
Loading…
Modeling the linkage between systems interoperability and security engineering
by: Elena I. Neaga, et al.
Published: (2010)
by: Elena I. Neaga, et al.
Published: (2010)
Loading…
Dual antenna selection in secure cognitive radio networks
by: Gaojie Chen, et al.
Published: (2015)
by: Gaojie Chen, et al.
Published: (2015)
Loading…
Design and application of neurocomputers
by: David C.J. Naylor
Published: (1994)
by: David C.J. Naylor
Published: (1994)
Similar Items
-
On the design of forgiving biometric security systems
by: Raphael C.-W. Phan, et al.
Published: (2009) -
Security limitations of an authorized anonymous ID-based scheme for mobile communication
by: Raphael C.-W. Phan
Published: (2005) -
Security of group key exchange protocols with different passwords
by: Raphael C.-W. Phan
Published: (2009) -
Traceable privacy of recent provably-secure RFID protocols
by: Khaled Ouafi, et al.
Published: (2008) -
Security of two recent constant-round password authenticated group key exchange schemes
by: Raphael C.-W. Phan
Published: (2009)