Follow
Iftekhar Salam
Iftekhar Salam
Xiamen University Malaysia
Verified email at xmu.edu.my
Title
Cited by
Cited by
Year
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5, 1-16, 2015
662015
Dental Caries Detection Using Score-Based Multi-Input Deep Convolutional Neural Network
A Imak, A Celebi, K Siddique, M Turkoglu, A Sengur, I Salam
IEEE Access 10, 18320-18329, 2022
632022
Investigating cube attacks on the authenticated encryption stream cipher ACORN
MI Salam, H Bartlett, E Dawson, J Pieprzyk, L Simpson, KKH Wong
International Conference on Applications and Techniques in Information …, 2016
412016
An efficient key pre-distribution scheme for wireless sensor network using public key cryptography
MI Salam, P Kumar, HJ Lee
The 6th International Conference on Networked Computing and Advanced …, 2010
252010
A Review of the NIST Lightweight Cryptography Finalists and Their Fault Analyses
H Madushan, I Salam, J Alawatugoda
Electronics 11 (24), 4199, 2022
242022
Finding state collisions in the authenticated encryption stream cipher ACORN
MI Salam, KKH Wong, H Bartlett, L Simpson, E Dawson, J Pieprzyk
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2016
222016
Blockchain-based healthcare management system with two-side verifiability
TL Tan, I Salam, M Singh
PloS one 17 (4), e0266916, 2022
202022
Cube Attacks on Round-Reduced TinyJAMBU
WL Teng, I Salam, WC Yau, J Pieprzyk, RCW Phan
Scientific Reports 12, 2022
182022
Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD
I Salam, TH Ooi, L Xue, WC Yau, J Pieprzyk, RCW Phan
IEEE Access 9, 72568-72586, 2021
182021
Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System
TH Chua, I Salam
arXiv preprint arXiv:2203.05232, 2022
172022
Investigating cube attacks on the authenticated encryption stream cipher MORUS
I Salam, L Simpson, H Bartlett, E Dawson, J Pieprzyk, KKH Wong
2017 IEEE Trustcom/BigDataSE/ICESS, 961-966, 2017
132017
Random fault attacks on a class of stream ciphers
H Bartlett, E Dawson, H Quhar al Mahri, MI Salam, L Simpson, KKH Wong
Security and Communication Networks, 2019
102019
Fault attacks on Tiaoxin-346
I Salam, HQA Mahri, L Simpson, H Bartlett, E Dawson, KKH Wong
Proceedings of the Australasian Computer Science Week Multiconference, 1-9, 2018
92018
Investigating Deep Learning Approaches on the Security Analysis of Cryptographic Algorithms
BY Chong, I Salam
Cryptography 5 (4), 30, 2021
82021
Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection Using Progressive Dataset
TH Chua, I Salam
Symmetry 15 (6), 1251, 2023
72023
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
I Salam, L Simpson, H Bartlett, E Dawson, K Koon-Ho Wong
Cryptography 2 (1), 4, 2018
72018
Blockchain based Contact Tracing: A Solution using Bluetooth and Sound Waves for Proximity Detection
ZX Hee, I Salam
Cryptology ePrint Archive, 2022
62022
Nature-Inspired Heuristic Frameworks Trends in Solving Multi-objective Engineering Optimization Problems
CCW Chang, TJ Ding, CCW Ee, W Han, JKS Paw, I Salam, MAS Bhuiyan, ...
Archives of Computational Methods in Engineering, 1-34, 2024
42024
Differential fault based key recovery attacks on TRIAD
I Salam, KY Law, L Xue, WC Yau
International Conference on Information Security and Cryptology, 273-287, 2020
42020
Impact of Fuzziness for Skin Lesion Classification with Transformer-Based Model
I Yasmin, S Sultana, SJ Begum, MJA Patwary, TA Almohamad, I Salam
2023 International Conference on Computing, Electronics & Communications …, 2023
32023
The system can't perform the operation now. Try again later.
Articles 1–20