Iftekhar Salam
Iftekhar Salam
Xiamen University Malaysia
Verified email at xmu.edu.my
TitleCited byYear
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 19, 2015
392015
An efficient key pre-distribution scheme for wireless sensor network using public key cryptography
MI Salam, P Kumar, HJ Lee
The 6th International Conference on Networked Computing and Advanced …, 2010
202010
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN
MI Salam, H Bartlett, E Dawson, J Pieprzyk, L Simpson, KKH Wong
International Conference on Applications and Techniques in Information …, 2016
192016
Finding state collisions in the authenticated encryption stream cipher ACORN
MI Salam, KKH Wong, H Bartlett, L Simpson, E Dawson, J Pieprzyk
Proceedings of the Australasian Computer Science Week Multiconference, 36, 2016
152016
Investigating cube attacks on the authenticated encryption stream cipher MORUS
I Salam, L Simpson, H Bartlett, E Dawson, J Pieprzyk, KKH Wong
2017 IEEE Trustcom/BigDataSE/ICESS, 961-966, 2017
62017
Fault attacks on Tiaoxin-346
I Salam, HQA Mahri, L Simpson, H Bartlett, E Dawson, KKH Wong
Proceedings of the Australasian Computer Science Week Multiconference, 5, 2018
22018
Addressing secure data routing scheme for heterogeneous sensor networks
P Kumar, M Iftekhar Salam, SG Lee, HJ Lee
Networked Computing and Advanced Information Management (NCM), 2010 Sixth …, 2010
22010
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
I Salam, L Simpson, H Bartlett, E Dawson, K Koon-Ho Wong
Cryptography 2 (1), 4, 2018
12018
Algebraic countermeasure to enhance the improved summation generator with 2-bit memory
I Salam, HJ Lee
Journal of Networks 8 (5), 977-985, 2013
12013
Algebraic Analysis of Shrinking Generator
MI Salam, HJ Lee
Int. Journal of Math. Analysis 6 (50), 2493-2499, 2012
12012
On the algebraic attack against summation type keystream generators
MI Salam, HJ Lee
International Journal of Information and Computer Security 5 (2), 132-149, 2012
12012
A review on the PKC-based security architecture for wireless sensor networks
MI Salam, HJ Lee
5th International Conference on Computer Sciences and Convergence …, 2010
12010
Random fault attacks on a class of stream ciphers
H Bartlett, E Dawson, H Quhar al Mahri, MI Salam, L Simpson, KKH Wong
Security and Communication Networks, 2019
2019
Analysis of authenticated encryption based on stream ciphers
MI Salam
Queensland University of Technology, 2018
2018
Secure and Efficient Key Management Scheme for Wireless Mesh Network
MI Salam, M Singh, SG Lee, HJ Lee
Proceedings of the Korea Information Processing Society Conference, 844-847, 2011
2011
Performance analysis of PingPong-128 keystream generator for wireless sensor networks
P Kumar, MI Salam, AG Reza, HT Lim, HJ Lee
5th International Conference on Computer Sciences and Convergence …, 2010
2010
The system can't perform the operation now. Try again later.
Articles 1–16