Azman Samsudin, Professor Dr.
-
Honorary ProfessorEmail :
This email address is being protected from spambots. You need JavaScript enabled to view it. Tel : +604 653 3635/2158
Fax : +604 653 3335
Room : 719/704C
School of Computer Sciences, Universiti Sains Malaysia, 11800 USM, Pulau PinangResearch Cluster
Enabling Technologies And Infrastructures
-
Research InterestCryptography, Parallel & Distributed Computing, and Interconnection Switching Networks.
Specialization
Cryptography, Parallel & Distributed Computing, and Interconnection Switching Networks.
Qualifications
BSc. University of Rochester, U.S.A.
MSc. University of Denver, U.S.A.
PhD. University of Denver, U.S.A.
Interests
Azman Samsudin is a Professor at the School of Computer Sciences, Universiti Sains Malaysia (USM). He earned his B.Sc. in Computer Science from University of Rochester, New York, USA, in 1989. Later, he received his M.Sc. and Ph.D. in Computer Science, in 1993 and 1998, respectively, both from the University of Denver, Colorado, USA. He has been with Universiti Sains Malaysia since 1998. His research interests include Cryptography, Switching Networks and Parallel Computing. He has published more than 100 articles over a series of book chapters, professional journals and conference proceedings. He also has held a series of grants in the fields of Cryptography and Parallel Computing.
Projects
[Fill your grants or projects]
Visual Public Key Cryptosystems
Improving the Efficiency of Scalar Multiplication in ECC (Elliptic Curve Cryptosystem
Attribute Based Homomorphic Encryption (ABHE) Scheme For Securing Outsourced Big Data Computation From Non-circuit Based Approach
Novel Symmetric Encryption Scheme based on True Random Numbers and Chaotic Maps
ZOT-Binary: A New Numbering System for Public-Key Cryptography
Voice Over Internet Protocol (VOIP) Automatic Authentication Scheme
Publications
2020
Alawida, M., Samsudin, A., Teh, J.S. Enhanced digital chaotic maps based on bit reversal with applications in random bit generators (2020) Information Sciences, 512, pp. 1155-1169. DOI: 10.1016/j.ins.2019.10.055
2019
Alawida, M., Samsudin, A., Teh, J.S., Alshoura, W.H. Deterministic chaotic finite-state automata (2019) Nonlinear Dynamics, 98 (3), pp. 2403-2421. DOI: 10.1007/s11071-019-05311-z
Alawida, M., Teh, J.S., Samsudin, A., Alshoura, W.H. An image encryption scheme based on hybridizing digital chaos and finite state machine (2019) Signal Processing, 164, pp. 249-266. DOI: 10.1016/j.sigpro.2019.06.013
Alawida, M., Samsudin, A., Teh, J.S., Alkhawaldeh, R.S. A new hybrid digital chaotic system with applications in image encryption (2019) Signal Processing, 160, pp. 45-58. DOI: 10.1016/j.sigpro.2019.02.016
Alawida, M., Samsudin, A., Teh, J.S. Enhancing unimodal digital chaotic maps through hybridisation (2019) Nonlinear Dynamics, 96 (1), pp. 601-613. DOI: 10.1007/s11071-019-04809-w
Alawida, M., Samsudin, A., Alshoura, W.H. Enhancing one-dimensional chaotic map based on bitstream dividing model (2019) ACM International Conference Proceeding Series, Part F147956, pp. 130-134. DOI: 10.1145/3316615.3316657
Tan, S.F., Samsudin, A., Alias, S. Internet of things: Security challenges and its future direction (2019) Lecture Notes in Electrical Engineering, 547, pp. 483-488. DOI: 10.1007/978-981-13-6447-1_61
2018
Almazrooie, M., Samsudin, A., Abdullah, R., Mutter, K.N. Quantum reversible circuit of AES-128 (2018) Quantum Information Processing(2018) Quantum Information Processing, 17 (5), art. no. 112, . DOI: 10.1007/s11128-018-1864-3
Almazrooie, M., Abdullah, R., Samsudin, A., Mutter, K.N. Quantum grover attack on the simplified-AES (2018) ACM International Conference Proceeding Series(2018) ACM International Conference Proceeding Series, pp. 204-211. DOI: 10.1145/3185089.3185122
Fun, T.S., Samsudin, A. An Efficient ElGamal Encryption Scheme Based on Polynomial Modular Arithmetic in F2n (2018) Lecture Notes in Electrical Engineering, 488, pp. 99-107. DOI: 10.1007/978-981-10-8276-4_10
Almazrooie, M., Samsudin, A., Gutub, A.A.-A., Salleh, M.S., Omar, M.A., Hassan, S.A. Integrity verification for digital Holy Quran verses using cryptographic hash function and compression (2018) Journal of King Saud University - Computer and Information Sciences. DOI: 10.1016/j.jksuci.2018.02.006
2017
Akhavan, A., Samsudin, A., Akhshani, A. Cryptanalysis of an image encryption algorithm based on DNA encoding (2017) Optics and Laser Technology, 95, pp. 94-99. DOI: 10.1016/j.optlastec.2017.04.022
Chen, J., Teh, J., Liu, Z., Su, C., Samsudin, A., Xiang, Y. Towards accurate statistical analysis of security margins: New searching strategies for differential attacks (2017) IEEE Transactions on Computers, 66 (10), art. no. 7914659, pp. 1763-1777. DOI: 10.1109/TC.2017.2699190
Teh, J.S., Samsudin, A. A Stream Cipher based on Spatiotemporal Chaos and True Random Synchronization (2017) IETE Journal of Research, 63 (3), pp. 346-357.
Fun, T.S., Samsudin, A. Attribute based encryption—A data centric approach for securing internet of things (IoT) (2017) Advanced Science Letters, 23 (5), pp. 4219-4223. DOI: 10.1166/asl.2017.8315
Fun, T.S., Samsudin, A., Zaaba, Z.F. Enhanced security for public cloud storage with honey encryption (2017) Advanced Science Letters, 23 (5), pp. 4232-4235. DOI: 10.1166/asl.2017.8324
Mahmadi, F.N., Zaaba, Z.F., Samsudin, A. Security issues in online banking: Review cases in Malaysia (2017) Advanced Science Letters, 23 (5), pp. 4327-4330. DOI: 10.1166/asl.2017.8311
Mok, E., Samsudin, A., Tan, S.-F. Ilmpementing the honey encryption for securing public cloud data storage (2017) COMPSE 2016 - 1st EAI International Conference on Computer Science and Engineering, .
Eghdamian, A., Samsudin, A. MGSDNAF - A modified signed digit generalized non-adjacent form for integers representation (2017) Journal of Telecommunication, Electronic and Computer Engineering, 9 (2-4), pp. 11-13.
Teh, J.S., Samsudin, A. A chaos-based authenticated cipher with associated data (2017) Security and Communication Networks, 2017, art. no. 9040518, . DOI: 10.1155/2017/9040518
Eghdamian, A., Samsudin, A. New modified left-to-right radix-r representation for integers (2017) International Journal of Technology, 8 (3), pp. 519-527. DOI: 10.14716/ijtech.v8i3.6570
Tan, S.F., Samsudin, A. Key policy-attribute based fully homomorphic encryption (KP-ABFHE) scheme for securing cloud application in multi-users environment (2017) Lecture Notes in Electrical Engineering, 398, pp. 77-86. DOI: 10.1007/978-981-10-1721-6_9
Zulkefli, Z., Singh, M.M., Mohd Shariff, A.R., Samsudin, A. Typosquat Cyber Crime Attack Detection via Smartphone (2017) Procedia Computer Science, 124, pp. 664-671. DOI: 10.1016/j.procs.2017.12.203
2016
Teh, J.S., Teng, W., Samsudin, A. A true random number generator based on hyperchaos and digital sound (2016) 2016 3rd International Conference on Computer and Information Sciences, ICCOINS 2016 - Proceedings, art. no. 7783225, pp. 264-269. DOI: 10.1109/ICCOINS.2016.7783225
Almazrooie, M., Samsudin, A., Abdullah, R., Mutter, K.N. Quantum exhaustive key search with simplified-DES as a case study (2016) SpringerPlus, 5 (1), art. no. 1494, . DOI: 10.1186/s40064-016-3159-4
Fun, T.S., Samsudin, A. A survey of homomorphic encryption for outsourced big data computation (2016) KSII Transactions on Internet and Information Systems, 10 (8), pp. 3826-3851. DOI: 10.3837/tiis.2016.08.022
Chen, J., Teh, J.S., Su, C., Samsudin, A., Fang, J. Improved (related-key) attacks on round-reduced KATAN-32/48/64 based on the extended boomerang framework (2016) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9723, pp. 333-346. DOI: 10.1007/978-3-319-40367-0_21
2015
Soo Fun, T., Samsudin, A. Lattice Ciphertext-Policy Attribute-Based encryption from ring-LWE (2015) 2nd International Symposium on Technology Management and Emerging Technologies, ISTMET 2015 - Proceeding, art. no. 7359040, pp. 258-262. DOI: 10.1109/ISTMET.2015.7359040
Eghdamian, A., Samsudin, A. A modified left-to-right radix-r representation (2015) 2nd International Symposium on Technology Management and Emerging Technologies, ISTMET 2015 - Proceeding, art. no. 7359039, pp. 254-257. DOI: 10.1109/ISTMET.2015.7359039
Teh, J.S., Samsudin, A., Al-Mazrooie, M., Akhavan, A. GPUs and chaos: a new true random number generator (2015) Nonlinear Dynamics, 82 (4), pp. 1913-1922. DOI: 10.1007/s11071-015-2287-7
Akhavan, A., Samsudin, A., Akhshani, A. Cryptanalysis of "an improvement over an image encryption method based on total shuffling"(2015) Optics Communications, 350, pp. 77-82. DOI: 10.1016/j.optcom.2015.03.079
Teh, J.S., Samsudin, A., Akhavan, A. Parallel chaotic hash function based on the shuffle-exchange network (2015) Nonlinear Dynamics, 81 (3), pp. 1067-1079. DOI: 10.1007/s11071-015-2049-6
Din, R., Yusof, S.A.M., Amphawan, A., Hussain, H.S., Yaacob, H., Jamaludin, N., Samsudin, A. Performance analysis on text steganalysis method using a computational intelligence approach (2015) International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), 2, pp. 67-73.
Almimi, H., Samsudin, A., Jahani, S. Elliptic-curve scalar multiplication algorithm using ZOT structure (2015) Security and Communication Networks, 8 (6), pp. 1141-1154. DOI: 10.1002/sec.1047
Almazrooie, M., Samsudin, A., Singh, M.M. Improving the diffusion of the stream cipher salsa20 by employing a chaotic logistic map (2015) Journal of Information Processing Systems, 11 (2), pp. 310-324. DOI: 10.3745/JIPS.02.0024
Bann, L.L., Singh, M.M., Samsudin, A. Trusted Security Policies for Tackling Advanced Persistent Threat via Spear Phishing in BYOD Environment (2015) Procedia Computer Science, 72, pp. 129-136. DOI: 10.1016/j.procs.2015.12.113
2014
Jahani, S., Samsudin, A., Subramanian, K.G. Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications (2014) Journal of Applied Mathematics, 2014, art. no. 107109, . DOI: 10.1155/2014/107109
Algehawi, M.B., Samsudin, A. Certificateless Public Key Encryption (CL-PKE) scheme using extended chebyshev polynomial over the finite field (2014) Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014, pp. 1-11.
Anagreh, M., Samsudin, A., Omar, M.A. Parallel method for computing elliptic curve scalar multiplication based on MOF (2014) International Arab Journal of Information Technology, 11 (6), .
2013
Kanniah, U.S., Samsudin, A. New Diffie Hellman key exchange primitive based upon binary field (2013) World Applied Sciences Journal, 21 (SPECIAL ISSUE3), pp. 106-111. DOI: 10.5829/idosi.wasj.2013.21.am.21131
Akhavan, A., Samsudin, A., Akhshani, A. A novel parallel hash function based on 3D chaotic map (2013) Eurasip Journal on Advances in Signal Processing, 2013 (1), art. no. 126, . DOI: 10.1186/1687-6180-2013-126
Jaafar, A., Samsudin, A. An improved version of the visual digital signature scheme (2013) International Arab Journal of Information Technology, 10 (6), .
Mimi, H., Samsudin, A., Jahani, S. Elliptic curve point multiplication algorithm using precomputation (2013) WSEAS Transactions on Computers, 12 (11), pp. 419-431.
Jahani, S., Samsudin, A. Big-digits representation and its application in cryptography (2013) Malaysian Journal of Mathematical Sciences, 7 (SUPPL.1), pp. 145-156.
Algehawi, M.B., Samsudin, A., Jahani, S. Calculation Enhancement of Chebyshev Polynomial over Zp (2013) Malaysian Journal of Mathematical Sciences, 7 (SUPPL.1), pp. 131-143.
Alakrut, R.H.E., Samsudin, A., Syafalni, A. Provably lightweight RFID mutual authentication protocol (2013) International Journal of Security and its Applications, 7 (4), pp. 71-90.
Behnia, S., Akhavan, A., Akhshani, A., Samsudin, A. Image encryption based on the Jacobian elliptic maps (2013) Journal of Systems and Software, 86 (9), pp. 2429-2438. DOI: 10.1016/j.jss.2013.04.088
Jaafar, Y., Samsudin, A., Syafalni, A., Omar, M.A. Framework for VoIP authentication using session ID based on modified vector quantization (2013) International Journal of Multimedia and Ubiquitous Engineering, 8 (3), pp. 369-376.
Din, R., Samsudin, A., Muda, T.Z.T., Lertkrai, P., Amphawan, A., Omar, M.N. Fitness value based evolution algorithm approach for text steganalysis model (2013) International Journal of Mathematical Models and Methods in Applied Sciences, 7 (5), pp. 551-558.
Jahani, S., Samsudin, A. Karatsuba-ZOT multiplication algorithm and its application in cryptography (2013) Applied Mechanics and Materials, 241-244, pp. 2417-2423. DOI: 10.4028/www.scientific.net/AMM.241-244.2417
Jahani, S., Samsudin, A. ZOT-Binary: A new numbering system with an application on Big-Integer multiplication (2013) Journal of Theoretical and Applied Information Technology, 48 (1), pp. 29-40.
2012
Syafalni, A., Samsudin, A., Jaafar, Y., Omar, M.A. ROSS: Low-cost self-securing VoIP communication framework (2012) KSII Transactions on Internet and Information Systems, 6 (12), pp. 3366-3383.
Al-Wesabi, O.A., Samsudin, A., Abdullah, N. Fast hashing function based on multi-pipeline hash construction (MPHC) (2012) International Journal of Innovative Computing, Information and Control, 8 (11), pp. 7887-7907.
Jaafar, A., Samsudin, A. A survey of black-and-white visual cryptography models (2012) International Journal of Digital Content Technology and its Applications, 6 (15), pp. 237-249. DOI: 10.4156/jdcta.vol6.issue15.28
Din, R., Ani, Z.C., Samsudin, A. A formulation of conditional states on steganalysis approach (2012) WSEAS Transactions on Mathematics, 11 (3), pp. 173-182.
Jaafar, A., Samsudin, A. Using 3-SAT NP-hard problem to improve the security of visual zero-knowledge proof of identity scheme (2012) European Journal of Scientific Research, 79 (4), pp. 616-629.
2011
Eghdamian, A., Samsudin, A. A secure protocol for ultralightweight radio frequency identification (RFID) tags (2011) Communications in Computer and Information Science, 251 CCIS (PART 1), pp. 200-213. DOI: 10.1007/978-3-642-25327-0_18
Akhavan, A., Samsudin, A., Akhshani, A. A symmetric image encryption scheme based on combination of nonlinear chaotic maps (2011) Journal of the Franklin Institute, 348 (8), pp. 1797-1813. DOI: 10.1016/j.jfranklin.2011.05.001
Behnia, S., Akhavan, A., Akhshani, A., Samsudin, A. A novel dynamic model of pseudo random number generator (2011) Journal of Computational and Applied Mathematics, 235 (12), pp. 3455-3463. DOI: 10.1016/j.cam.2011.02.006
Suwais, K., Samsudin, A. LTSC-128: Stream cipher based on the intractable Shortest Vector Problem in Lattice (2011) Journal of Digital Information Management, 9 (1), pp. 27-32.
2010
Abuadhmah, N.A., Naser, M., Samsudin, A. E-visas verification schemes based on public-key infrastructure and identity based encryption (2010) Journal of Computer Science, 6 (7), pp. 723-727. DOI: 10.3844/jcssp.2010.723.727
Jaafar, A.M., Samsudin, A. Visual digital signature scheme: A new approach (2010) IAENG International Journal of Computer Science, 37 (4), .
Benasser Algehawi, M., Samsudin, A. A new Identity Based Encryption (IBE) scheme using extended Chebyshev polynomial over finite fields ℤp (2010) Physics Letters, Section A: General, Atomic and Solid State Physics, 374 (46), pp. 4670-4674. DOI: 10.1016/j.physleta.2010.09.041
Jaafar, A.M., Samsudin, A. Visual zero-knowledge proof of identity scheme: A new approach (2010) 2nd International Conference on Computer Research and Development, ICCRD 2010, art. no. 5489513, pp. 205-212. DOI: 10.1109/ICCRD.2010.38
Lock, A.J.J., Loh, C.H., Juhari, S.H., Samsudin, A. Compression-encryption based on fractal geometric (2010) 2nd International Conference on Computer Research and Development, ICCRD 2010, art. no. 5489512, pp. 213-217. DOI: 10.1109/ICCRD.2010.40
Almimi, H., Osabi, O., Samsudin, A. A Case Study of Key-dependent permutations in feistel ciphers (2010) World Academy of Science, Engineering and Technology, 62, pp. 296-301.
2009
Chuah, C.W., Samsudin, A. Omega network hash construction (2009) Journal of Computer Science, 5 (12), pp. 962-973. DOI: 10.3844/jcssp.2009.962.973
Akhavan, A., Samsudin, A., Akhshani, A. Hash function based on piecewise nonlinear chaotic map (2009) Chaos, Solitons and Fractals, 42 (2), pp. 1046-1053. DOI: 10.1016/j.chaos.2009.02.044
Sudha, S., Samsudin, A., Alia, M.A. Group re-keying protocol based on modular polynomial arithmetic over galois field GF(2n) (2009) American Journal of Applied Sciences, 6 (9), pp. 1714-1717. DOI: 10.3844/ajassp.2009.1714.1717
Din, R., Samsudin, A. Intelligent steganalytic system: Application on natural language environment (2009) WSEAS Transactions on Systems and Control, 4 (8), pp. 379-388.
2008
Tan, T.K., Samsudin, A. Fast software triggered intelligent mobile signal learning for network mobility handover (2008) 2008 International Conference on Electronic Design, ICED 2008, art. no. 4786634, . DOI: 10.1109/ICED.2008.4786634
Suwais, K., Samsudin, A. ECSC-128: New stream cipher based on elliptic Curve discrete logarithm problem (2008) Security of Information and Networks - Proceedings of the 1st International Conference on Security of Information and Networks, SIN 2007, pp. 13-23.
Alia, M.A., Samsudin, A.B. Fractal (Mandelbrot and Julia) zero-knowledge proof of identity (2008) Journal of Computer Science, 4 (5), pp. 408-414. DOI: 10.3844/jcssp.2008.408.414
Suwais, K.M., Samsudin, A. DSP-128: Stream cipher based on discrete log problem and polynomial arithmetic (2008) American Journal of Applied Sciences, 5 (7), pp. 896-904. DOI: 10.3844/ajassp.2008.896.904
2007
Tan, T.K., Samsudin, A. Efficient NEMO security management via CA-PKI (2007) Proceeding - 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, art. no. 4448618, pp. 140-144. DOI: 10.1109/ICTMICC.2007.4448618
Pahlevanzadeh, B., Samsudin, A. Distributed hierarchical IDS for MANET over AODV+ (2007) Proceeding - 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, art. no. 4448633, pp. 220-225. DOI: 10.1109/ICTMICC.2007.4448633
Tan, T.K., Samsudin, A. Fast and simple NEMO authentication via random number (2007) Proceeding - 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, art. no. 4448643, pp. 266-271. DOI: 10.1109/ICTMICC.2007.4448643
Kanniah, U.S., Samsudin, A. Multi-threading elliptic curve cryptosystems (2007) Proceeding - 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, art. no. 4448617, pp. 134-139. DOI: 10.1109/ICTMICC.2007.4448617
Alia, M.A., Samsudin, A.B. A new digital signature scheme based on Mandelbrot and Julia fractal sets (2007) American Journal of Applied Sciences, 4 (11), pp. 850-858.
2006
Ai-Salihy, W.A.-H., Samsudin, A. A new proposed protocol of router's CA certificate (2006) 2006 International Conference on Computing and Informatics, ICOCI '06, art. no. 5276477, . DOI: 10.1109/ICOCI.2006.5276477
2005
Tan, T.K., Samsudin, A. Secure hashing of the NEMO mobile router communications (2005) 2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings, 1, art. no. 1635499, pp. 341-345. DOI: 10.1109/ICON.2005.1635499
Joseph, L.T.A., Samsudin, A., Belaton, B. Efficient search on encrypted data (2005) 2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings, 1, art. no. 1635501, pp. 352-357. DOI: 10.1109/ICON.2005.1635501
Ho, Y.L., Samsudin, A., Belaton, B. Heuristic cryptanalysis of classical and modern ciphers (2005) 2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings, 2, art. no. 1635595, pp. 710-715. DOI: 10.1109/ICON.2005.1635595
Bakar, N.A., Belaton, B., Samsudin, A. False positives reduction via intrusion alert quality framework (2005) 2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings, 1, art. no. 1635545, pp. 547-552. DOI: 10.1109/ICON.2005.1635545
2004
Ehtiba, F.O., Samsudin, A. Multiplication and exponentiation of big integers with hybrid montgomery and distributed Karatsuba algorithm (2004) Proceedings - 2004 International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004, pp. 421-422.
Sien, O.B., Samsudin, A., Budiarto, R. A new image-database encryption based on a hybrid approach of data-at-rest and data-in-motion encryption protocol (2004) Proceedings - 2004 International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004, pp. 603-604.
Jumandi, Z., Samsudin, A., Budiarto, R. Optimized arbitrary size networks (2004) Proceedings - 2004 International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004, pp. 665-666.
Choon, L.S., Samsudin, A., Budiarto, R. Lightweight and cost-effective MPEG video encryption (2004) Proceedings - 2004 International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004, pp. 525-526.
Budiarto, R., Samsudin, A., Heong, C.W., Noori, S. Honeypots: Why we need a dynamics honeypots? (2004) Proceedings - 2004 International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004, pp. 565-566.
Budiarto, R., Ramadass, S., Samsudin, A., Noor, S. Development of penetration testing model for increasing network security (2004) Proceedings - 2004 International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004, pp. 563-564.
2003
Kiong, N.C., Samsudin, A. Incoercible secure electronic voting scheme based on chaffing and winnowing (2003) APCC 2003 - 9th Asia-Pacific Conference on Communications, in conjunction with 6th Malaysia International Conference on Communications, MICC 2003, Proceedings, 2, art. no. 1274478, pp. 838-843. DOI: 10.1109/APCC.2003.1274478
Choon, O.T., Samsudin, A. Grid-based intrusion detection system (2003) APCC 2003 - 9th Asia-Pacific Conference on Communications, in conjunction with 6th Malaysia International Conference on Communications, MICC 2003, Proceedings, 3, art. no. 1274254, pp. 1028-1032. DOI: 10.1109/APCC.2003.1274254
Mazlan, M.A., Samsudin, A., Budiarto, R. Secure groups communication for mobile agents based on public key infrastructure (2003) APCC 2003 - 9th Asia-Pacific Conference on Communications, in conjunction with 6th Malaysia International Conference on Communications, MICC 2003, Proceedings, 3, art. no. 1274253, pp. 1023-1027. DOI: 10.1109/APCC.2003.1274253
Tarhuni, M.A., Ng, S.H., Samsudin, A., Ng, W.P. Enhanced counter mode (2003) APCC 2003 - 9th Asia-Pacific Conference on Communications, in conjunction with 6th Malaysia International Conference on Communications, MICC 2003, Proceedings, 2, art. no. 1274448, pp. 701-705. DOI: 10.1109/APCC.2003.1274448
Meftah, S., Razali, R., Samsudin, A., Budiator, R. Enhancing public-key cryptosystem using parallel Karatsuba algorithm with socket programming (2003) APCC 2003 - 9th Asia-Pacific Conference on Communications, in conjunction with 6th Malaysia International Conference on Communications, MICC 2003, Proceedings, 2, art. no. 1274449, pp. 706-710. DOI: 10.1109/APCC.2003.1274449
2002
Soo, W.H., Samsudin, A., Goh, A. Efficient mental card shuffling via optimised arbitrary-sized benes permutation network (2002) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2433, pp. 446-458.
Sumari, P., Samsudin, A., Kamarulhaili, H. Data storage and retrieval for video-on-demand servers (2002) Proceedings - 4th International Symposium on Multimedia Software Engineering, MSE 2002, art. no. 1181618, pp. 240-245. DOI: 10.1109/MMSE.2002.1181618
2000
Ngo, D.C.L., Samsudin, A., Abdullah, R. Aesthetic measures for assessing graphic screens (2000) Journal of Information Science and Engineering, 16 (1), pp. 97-116.
1998
Samsudin, A., Lee, K.Y. ND-dBPN: New self-routing permutation networks based on the de Bruijn digraphs (1998) Proceedings of the International Conference on Parallel Processing, pp. 604-611. DOI: 10.1109/ICPP.1998.708535
Supervision
[Fill your graduates supervisions]
Teaching
[Fill your teaching subjects]
Recognition & Leadership
[Fill your recognitions, e.g. examiners, editorial boards etc.]
Consultancy
[Fill your consultation works]
- Hits: 4952