Azman Samsudin, Professor Dr.

  • Azman 


  • Professor 

    Email : This email address is being protected from spambots. You need JavaScript enabled to view it.

    Tel : +604 653 3635
    Fax : +604 653 3335
    Room : 719

    School of Computer Sciences, Universiti Sains Malaysia, 11800 USM, Pulau Pinang

    Research Cluster

    Enabling Technologies And Infrastructures



  • Research Interest

    Cryptography, Parallel & Distributed Computing, and Interconnection Switching Networks.

    Specialization

    Cryptography, Parallel & Distributed Computing, and Interconnection Switching Networks.


Qualifications

BSc. University of Rochester, U.S.A. 
MSc. University of Denver, U.S.A.
PhD. University of Denver, U.S.A. 

Interests

Azman Samsudin is a Professor at the School of Computer Sciences, Universiti Sains Malaysia (USM). He earned his B.Sc. in Computer Science from University of Rochester, New York, USA, in 1989. Later, he received his M.Sc. and Ph.D. in Computer Science, in 1993 and 1998, respectively, both from the University of Denver, Colorado, USA. He has been with Universiti Sains Malaysia since 1998. His research interests include Cryptography, Switching Networks and Parallel Computing. He has published more than 100 articles over a series of book chapters, professional journals and conference proceedings. He also has held a series of grants in the fields of Cryptography and Parallel Computing.

Projects

[Fill your grants or projects]

Visual Public Key Cryptosystems

Improving the Efficiency of Scalar Multiplication in ECC (Elliptic Curve Cryptosystem

Attribute Based Homomorphic Encryption (ABHE) Scheme For Securing Outsourced Big Data Computation From Non-circuit Based Approach

Novel Symmetric Encryption Scheme based on True Random Numbers and Chaotic Maps

ZOT-Binary: A New Numbering System for Public-Key Cryptography

Voice Over Internet Protocol (VOIP) Automatic Authentication Scheme

Publications

2020

Alawida, M., Samsudin, A., Teh, J.S. Enhanced digital chaotic maps based on bit reversal with applications in random bit generators (2020) Information Sciences, 512, pp. 1155-1169. DOI: 10.1016/j.ins.2019.10.055

2019 

Alawida, M., Samsudin, A., Teh, J.S., Alshoura, W.H. Deterministic chaotic finite-state automata (2019) Nonlinear Dynamics, 98 (3), pp. 2403-2421. DOI: 10.1007/s11071-019-05311-z

Alawida, M., Teh, J.S., Samsudin, A., Alshoura, W.H. An image encryption scheme based on hybridizing digital chaos and finite state machine (2019) Signal Processing, 164, pp. 249-266. DOI: 10.1016/j.sigpro.2019.06.013

Alawida, M., Samsudin, A., Teh, J.S., Alkhawaldeh, R.S. A new hybrid digital chaotic system with applications in image encryption (2019) Signal Processing, 160, pp. 45-58. DOI: 10.1016/j.sigpro.2019.02.016

Alawida, M., Samsudin, A., Teh, J.S. Enhancing unimodal digital chaotic maps through hybridisation (2019) Nonlinear Dynamics, 96 (1), pp. 601-613. DOI: 10.1007/s11071-019-04809-w

Alawida, M., Samsudin, A., Alshoura, W.H. Enhancing one-dimensional chaotic map based on bitstream dividing model (2019) ACM International Conference Proceeding Series, Part F147956, pp. 130-134. DOI: 10.1145/3316615.3316657

Tan, S.F., Samsudin, A., Alias, S. Internet of things: Security challenges and its future direction (2019) Lecture Notes in Electrical Engineering, 547, pp. 483-488. DOI: 10.1007/978-981-13-6447-1_61

2018

Almazrooie, M., Samsudin, A., Abdullah, R., Mutter, K.N. Quantum reversible circuit of AES-128 (2018) Quantum Information Processing(2018) Quantum Information Processing, 17 (5), art. no. 112, . DOI: 10.1007/s11128-018-1864-3

Almazrooie, M., Abdullah, R., Samsudin, A., Mutter, K.N. Quantum grover attack on the simplified-AES (2018) ACM International Conference Proceeding Series(2018) ACM International Conference Proceeding Series, pp. 204-211. DOI: 10.1145/3185089.3185122

Fun, T.S., Samsudin, A. An Efficient ElGamal Encryption Scheme Based on Polynomial Modular Arithmetic in F2n (2018) Lecture Notes in Electrical Engineering, 488, pp. 99-107.  DOI: 10.1007/978-981-10-8276-4_10

Almazrooie, M., Samsudin, A., Gutub, A.A.-A., Salleh, M.S., Omar, M.A., Hassan, S.A. Integrity verification for digital Holy Quran verses using cryptographic hash function and compression (2018) Journal of King Saud University - Computer and Information Sciences. DOI: 10.1016/j.jksuci.2018.02.006

2017

Akhavan, A., Samsudin, A., Akhshani, A. Cryptanalysis of an image encryption algorithm based on DNA encoding (2017) Optics and Laser Technology, 95, pp. 94-99. DOI: 10.1016/j.optlastec.2017.04.022

Chen, J., Teh, J., Liu, Z., Su, C., Samsudin, A., Xiang, Y. Towards accurate statistical analysis of security margins: New searching strategies for differential attacks (2017) IEEE Transactions on Computers, 66 (10), art. no. 7914659, pp. 1763-1777. DOI: 10.1109/TC.2017.2699190

Teh, J.S., Samsudin, A. A Stream Cipher based on Spatiotemporal Chaos and True Random Synchronization (2017) IETE Journal of Research, 63 (3), pp. 346-357. 

Fun, T.S., Samsudin, A. Attribute based encryption—A data centric approach for securing internet of things (IoT) (2017) Advanced Science Letters, 23 (5), pp. 4219-4223. DOI: 10.1166/asl.2017.8315

Fun, T.S., Samsudin, A., Zaaba, Z.F. Enhanced security for public cloud storage with honey encryption (2017) Advanced Science Letters, 23 (5), pp. 4232-4235. DOI: 10.1166/asl.2017.8324

Mahmadi, F.N., Zaaba, Z.F., Samsudin, A. Security issues in online banking: Review cases in Malaysia (2017) Advanced Science Letters, 23 (5), pp. 4327-4330. DOI: 10.1166/asl.2017.8311

Mok, E., Samsudin, A., Tan, S.-F. Ilmpementing the honey encryption for securing public cloud data storage (2017) COMPSE 2016 - 1st EAI International Conference on Computer Science and Engineering, . 

Eghdamian, A., Samsudin, A. MGSDNAF - A modified signed digit generalized non-adjacent form for integers representation (2017) Journal of Telecommunication, Electronic and Computer Engineering, 9 (2-4), pp. 11-13. 

Teh, J.S., Samsudin, A. A chaos-based authenticated cipher with associated data (2017) Security and Communication Networks, 2017, art. no. 9040518, . DOI: 10.1155/2017/9040518

Eghdamian, A., Samsudin, A. New modified left-to-right radix-r representation for integers (2017) International Journal of Technology, 8 (3), pp. 519-527. DOI: 10.14716/ijtech.v8i3.6570

Tan, S.F., Samsudin, A. Key policy-attribute based fully homomorphic encryption (KP-ABFHE) scheme for securing cloud application in multi-users environment (2017) Lecture Notes in Electrical Engineering, 398, pp. 77-86. DOI: 10.1007/978-981-10-1721-6_9

Zulkefli, Z., Singh, M.M., Mohd Shariff, A.R., Samsudin, A. Typosquat Cyber Crime Attack Detection via Smartphone (2017) Procedia Computer Science, 124, pp. 664-671. DOI: 10.1016/j.procs.2017.12.203

2016

Teh, J.S., Teng, W., Samsudin, A. A true random number generator based on hyperchaos and digital sound (2016) 2016 3rd International Conference on Computer and Information Sciences, ICCOINS 2016 - Proceedings, art. no. 7783225, pp. 264-269. DOI: 10.1109/ICCOINS.2016.7783225

Almazrooie, M., Samsudin, A., Abdullah, R., Mutter, K.N. Quantum exhaustive key search with simplified-DES as a case study (2016) SpringerPlus, 5 (1), art. no. 1494, . DOI: 10.1186/s40064-016-3159-4

Fun, T.S., Samsudin, A. A survey of homomorphic encryption for outsourced big data computation (2016) KSII Transactions on Internet and Information Systems, 10 (8), pp. 3826-3851. DOI: 10.3837/tiis.2016.08.022

Chen, J., Teh, J.S., Su, C., Samsudin, A., Fang, J. Improved (related-key) attacks on round-reduced KATAN-32/48/64 based on the extended boomerang framework (2016) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9723, pp. 333-346. DOI: 10.1007/978-3-319-40367-0_21

2015

Soo Fun, T., Samsudin, A. Lattice Ciphertext-Policy Attribute-Based encryption from ring-LWE (2015) 2nd International Symposium on Technology Management and Emerging Technologies, ISTMET 2015 - Proceeding, art. no. 7359040, pp. 258-262. DOI: 10.1109/ISTMET.2015.7359040

Eghdamian, A., Samsudin, A. A modified left-to-right radix-r representation (2015) 2nd International Symposium on Technology Management and Emerging Technologies, ISTMET 2015 - Proceeding, art. no. 7359039, pp. 254-257. DOI: 10.1109/ISTMET.2015.7359039

Teh, J.S., Samsudin, A., Al-Mazrooie, M., Akhavan, A. GPUs and chaos: a new true random number generator (2015) Nonlinear Dynamics, 82 (4), pp. 1913-1922. DOI: 10.1007/s11071-015-2287-7

Akhavan, A., Samsudin, A., Akhshani, A. Cryptanalysis of "an improvement over an image encryption method based on total shuffling"(2015) Optics Communications, 350, pp. 77-82. DOI: 10.1016/j.optcom.2015.03.079

Teh, J.S., Samsudin, A., Akhavan, A. Parallel chaotic hash function based on the shuffle-exchange network (2015) Nonlinear Dynamics, 81 (3), pp. 1067-1079. DOI: 10.1007/s11071-015-2049-6

Din, R., Yusof, S.A.M., Amphawan, A., Hussain, H.S., Yaacob, H., Jamaludin, N., Samsudin, A. Performance analysis on text steganalysis method using a computational intelligence approach (2015) International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), 2, pp. 67-73. 

Almimi, H., Samsudin, A., Jahani, S. Elliptic-curve scalar multiplication algorithm using ZOT structure (2015) Security and Communication Networks, 8 (6), pp. 1141-1154. DOI: 10.1002/sec.1047

Almazrooie, M., Samsudin, A., Singh, M.M. Improving the diffusion of the stream cipher salsa20 by employing a chaotic logistic map (2015) Journal of Information Processing Systems, 11 (2), pp. 310-324. DOI: 10.3745/JIPS.02.0024

Bann, L.L., Singh, M.M., Samsudin, A. Trusted Security Policies for Tackling Advanced Persistent Threat via Spear Phishing in BYOD Environment (2015) Procedia Computer Science, 72, pp. 129-136. DOI: 10.1016/j.procs.2015.12.113

2014

Jahani, S., Samsudin, A., Subramanian, K.G. Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications (2014) Journal of Applied Mathematics, 2014, art. no. 107109, . DOI: 10.1155/2014/107109

Algehawi, M.B., Samsudin, A. Certificateless Public Key Encryption (CL-PKE) scheme using extended chebyshev polynomial over the finite field (2014) Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014, pp. 1-11. 

Anagreh, M., Samsudin, A., Omar, M.A. Parallel method for computing elliptic curve scalar multiplication based on MOF (2014) International Arab Journal of Information Technology, 11 (6), .

2013

Kanniah, U.S., Samsudin, A. New Diffie Hellman key exchange primitive based upon binary field (2013) World Applied Sciences Journal, 21 (SPECIAL ISSUE3), pp. 106-111. DOI: 10.5829/idosi.wasj.2013.21.am.21131

Akhavan, A., Samsudin, A., Akhshani, A. A novel parallel hash function based on 3D chaotic map (2013) Eurasip Journal on Advances in Signal Processing, 2013 (1), art. no. 126, . DOI: 10.1186/1687-6180-2013-126

Jaafar, A., Samsudin, A. An improved version of the visual digital signature scheme (2013) International Arab Journal of Information Technology, 10 (6), . 

Mimi, H., Samsudin, A., Jahani, S. Elliptic curve point multiplication algorithm using precomputation (2013) WSEAS Transactions on Computers, 12 (11), pp. 419-431. 

Jahani, S., Samsudin, A. Big-digits representation and its application in cryptography (2013) Malaysian Journal of Mathematical Sciences, 7 (SUPPL.1), pp. 145-156. 

Algehawi, M.B., Samsudin, A., Jahani, S. Calculation Enhancement of Chebyshev Polynomial over Zp (2013) Malaysian Journal of Mathematical Sciences, 7 (SUPPL.1), pp. 131-143. 

Alakrut, R.H.E., Samsudin, A., Syafalni, A. Provably lightweight RFID mutual authentication protocol (2013) International Journal of Security and its Applications, 7 (4), pp. 71-90. 

Behnia, S., Akhavan, A., Akhshani, A., Samsudin, A. Image encryption based on the Jacobian elliptic maps (2013) Journal of Systems and Software, 86 (9), pp. 2429-2438. DOI: 10.1016/j.jss.2013.04.088

Jaafar, Y., Samsudin, A., Syafalni, A., Omar, M.A. Framework for VoIP authentication using session ID based on modified vector quantization (2013) International Journal of Multimedia and Ubiquitous Engineering, 8 (3), pp. 369-376. 

Din, R., Samsudin, A., Muda, T.Z.T., Lertkrai, P., Amphawan, A., Omar, M.N. Fitness value based evolution algorithm approach for text steganalysis model (2013) International Journal of Mathematical Models and Methods in Applied Sciences, 7 (5), pp. 551-558.

Jahani, S., Samsudin, A. Karatsuba-ZOT multiplication algorithm and its application in cryptography (2013) Applied Mechanics and Materials, 241-244, pp. 2417-2423. DOI: 10.4028/www.scientific.net/AMM.241-244.2417

Jahani, S., Samsudin, A. ZOT-Binary: A new numbering system with an application on Big-Integer multiplication (2013) Journal of Theoretical and Applied Information Technology, 48 (1), pp. 29-40. 

2012

Syafalni, A., Samsudin, A., Jaafar, Y., Omar, M.A. ROSS: Low-cost self-securing VoIP communication framework (2012) KSII Transactions on Internet and Information Systems, 6 (12), pp. 3366-3383. 

Al-Wesabi, O.A., Samsudin, A., Abdullah, N. Fast hashing function based on multi-pipeline hash construction (MPHC) (2012) International Journal of Innovative Computing, Information and Control, 8 (11), pp. 7887-7907. 

Jaafar, A., Samsudin, A. A survey of black-and-white visual cryptography models (2012) International Journal of Digital Content Technology and its Applications, 6 (15), pp. 237-249. DOI: 10.4156/jdcta.vol6.issue15.28

Din, R., Ani, Z.C., Samsudin, A. A formulation of conditional states on steganalysis approach (2012) WSEAS Transactions on Mathematics, 11 (3), pp. 173-182. 

Jaafar, A., Samsudin, A. Using 3-SAT NP-hard problem to improve the security of visual zero-knowledge proof of identity scheme (2012) European Journal of Scientific Research, 79 (4), pp. 616-629. 

2011

Eghdamian, A., Samsudin, A. A secure protocol for ultralightweight radio frequency identification (RFID) tags (2011) Communications in Computer and Information Science, 251 CCIS (PART 1), pp. 200-213. DOI: 10.1007/978-3-642-25327-0_18

Akhavan, A., Samsudin, A., Akhshani, A. A symmetric image encryption scheme based on combination of nonlinear chaotic maps (2011) Journal of the Franklin Institute, 348 (8), pp. 1797-1813. DOI: 10.1016/j.jfranklin.2011.05.001

Behnia, S., Akhavan, A., Akhshani, A., Samsudin, A. A novel dynamic model of pseudo random number generator (2011) Journal of Computational and Applied Mathematics, 235 (12), pp. 3455-3463. DOI: 10.1016/j.cam.2011.02.006

Suwais, K., Samsudin, A. LTSC-128: Stream cipher based on the intractable Shortest Vector Problem in Lattice (2011) Journal of Digital Information Management, 9 (1), pp. 27-32. 

2010

Abuadhmah, N.A., Naser, M., Samsudin, A. E-visas verification schemes based on public-key infrastructure and identity based encryption (2010) Journal of Computer Science, 6 (7), pp. 723-727. DOI: 10.3844/jcssp.2010.723.727

Jaafar, A.M., Samsudin, A. Visual digital signature scheme: A new approach (2010) IAENG International Journal of Computer Science, 37 (4), . 

Benasser Algehawi, M., Samsudin, A. A new Identity Based Encryption (IBE) scheme using extended Chebyshev polynomial over finite fields ℤp (2010) Physics Letters, Section A: General, Atomic and Solid State Physics, 374 (46), pp. 4670-4674. DOI: 10.1016/j.physleta.2010.09.041

Jaafar, A.M., Samsudin, A. Visual zero-knowledge proof of identity scheme: A new approach (2010) 2nd International Conference on Computer Research and Development, ICCRD 2010, art. no. 5489513, pp. 205-212. DOI: 10.1109/ICCRD.2010.38

Lock, A.J.J., Loh, C.H., Juhari, S.H., Samsudin, A. Compression-encryption based on fractal geometric (2010) 2nd International Conference on Computer Research and Development, ICCRD 2010, art. no. 5489512, pp. 213-217. DOI: 10.1109/ICCRD.2010.40

Almimi, H., Osabi, O., Samsudin, A. A Case Study of Key-dependent permutations in feistel ciphers (2010) World Academy of Science, Engineering and Technology, 62, pp. 296-301. 

2009

Chuah, C.W., Samsudin, A. Omega network hash construction (2009) Journal of Computer Science, 5 (12), pp. 962-973. DOI: 10.3844/jcssp.2009.962.973

Akhavan, A., Samsudin, A., Akhshani, A. Hash function based on piecewise nonlinear chaotic map (2009) Chaos, Solitons and Fractals, 42 (2), pp. 1046-1053. DOI: 10.1016/j.chaos.2009.02.044

Sudha, S., Samsudin, A., Alia, M.A. Group re-keying protocol based on modular polynomial arithmetic over galois field GF(2n) (2009) American Journal of Applied Sciences, 6 (9), pp. 1714-1717. DOI: 10.3844/ajassp.2009.1714.1717

Din, R., Samsudin, A. Intelligent steganalytic system: Application on natural language environment (2009) WSEAS Transactions on Systems and Control, 4 (8), pp. 379-388. 

2008

Tan, T.K., Samsudin, A. Fast software triggered intelligent mobile signal learning for network mobility handover (2008) 2008 International Conference on Electronic Design, ICED 2008, art. no. 4786634, . DOI: 10.1109/ICED.2008.4786634

Suwais, K., Samsudin, A. ECSC-128: New stream cipher based on elliptic Curve discrete logarithm problem (2008) Security of Information and Networks - Proceedings of the 1st International Conference on Security of Information and Networks, SIN 2007, pp. 13-23. 

Alia, M.A., Samsudin, A.B. Fractal (Mandelbrot and Julia) zero-knowledge proof of identity (2008) Journal of Computer Science, 4 (5), pp. 408-414. DOI: 10.3844/jcssp.2008.408.414

Suwais, K.M., Samsudin, A. DSP-128: Stream cipher based on discrete log problem and polynomial arithmetic (2008) American Journal of Applied Sciences, 5 (7), pp. 896-904. DOI: 10.3844/ajassp.2008.896.904

2007

Tan, T.K., Samsudin, A. Efficient NEMO security management via CA-PKI (2007) Proceeding - 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, art. no. 4448618, pp. 140-144. DOI: 10.1109/ICTMICC.2007.4448618

Pahlevanzadeh, B., Samsudin, A. Distributed hierarchical IDS for MANET over AODV+ (2007) Proceeding - 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, art. no. 4448633, pp. 220-225. DOI: 10.1109/ICTMICC.2007.4448633

Tan, T.K., Samsudin, A. Fast and simple NEMO authentication via random number (2007) Proceeding - 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, art. no. 4448643, pp. 266-271. DOI: 10.1109/ICTMICC.2007.4448643

Kanniah, U.S., Samsudin, A. Multi-threading elliptic curve cryptosystems (2007) Proceeding - 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, art. no. 4448617, pp. 134-139. DOI: 10.1109/ICTMICC.2007.4448617

Alia, M.A., Samsudin, A.B. A new digital signature scheme based on Mandelbrot and Julia fractal sets (2007) American Journal of Applied Sciences, 4 (11), pp. 850-858. 

2006

Ai-Salihy, W.A.-H., Samsudin, A. A new proposed protocol of router's CA certificate (2006) 2006 International Conference on Computing and Informatics, ICOCI '06, art. no. 5276477, . DOI: 10.1109/ICOCI.2006.5276477

2005

Tan, T.K., Samsudin, A. Secure hashing of the NEMO mobile router communications (2005) 2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings, 1, art. no. 1635499, pp. 341-345. DOI: 10.1109/ICON.2005.1635499

Joseph, L.T.A., Samsudin, A., Belaton, B. Efficient search on encrypted data (2005) 2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings, 1, art. no. 1635501, pp. 352-357. DOI: 10.1109/ICON.2005.1635501

Ho, Y.L., Samsudin, A., Belaton, B. Heuristic cryptanalysis of classical and modern ciphers (2005) 2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings, 2, art. no. 1635595, pp. 710-715. DOI: 10.1109/ICON.2005.1635595

Bakar, N.A., Belaton, B., Samsudin, A. False positives reduction via intrusion alert quality framework (2005) 2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings, 1, art. no. 1635545, pp. 547-552. DOI: 10.1109/ICON.2005.1635545

2004

Ehtiba, F.O., Samsudin, A. Multiplication and exponentiation of big integers with hybrid montgomery and distributed Karatsuba algorithm (2004) Proceedings - 2004 International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004, pp. 421-422. 

Sien, O.B., Samsudin, A., Budiarto, R. A new image-database encryption based on a hybrid approach of data-at-rest and data-in-motion encryption protocol (2004) Proceedings - 2004 International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004, pp. 603-604. 

Jumandi, Z., Samsudin, A., Budiarto, R. Optimized arbitrary size networks (2004) Proceedings - 2004 International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004, pp. 665-666. 

Choon, L.S., Samsudin, A., Budiarto, R. Lightweight and cost-effective MPEG video encryption (2004) Proceedings - 2004 International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004, pp. 525-526. 

Budiarto, R., Samsudin, A., Heong, C.W., Noori, S. Honeypots: Why we need a dynamics honeypots? (2004) Proceedings - 2004 International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004, pp. 565-566. 

Budiarto, R., Ramadass, S., Samsudin, A., Noor, S. Development of penetration testing model for increasing network security (2004) Proceedings - 2004 International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004, pp. 563-564. 

2003

Kiong, N.C., Samsudin, A. Incoercible secure electronic voting scheme based on chaffing and winnowing (2003) APCC 2003 - 9th Asia-Pacific Conference on Communications, in conjunction with 6th Malaysia International Conference on Communications, MICC 2003, Proceedings, 2, art. no. 1274478, pp. 838-843. DOI: 10.1109/APCC.2003.1274478

Choon, O.T., Samsudin, A. Grid-based intrusion detection system (2003) APCC 2003 - 9th Asia-Pacific Conference on Communications, in conjunction with 6th Malaysia International Conference on Communications, MICC 2003, Proceedings, 3, art. no. 1274254, pp. 1028-1032. DOI: 10.1109/APCC.2003.1274254

Mazlan, M.A., Samsudin, A., Budiarto, R. Secure groups communication for mobile agents based on public key infrastructure (2003) APCC 2003 - 9th Asia-Pacific Conference on Communications, in conjunction with 6th Malaysia International Conference on Communications, MICC 2003, Proceedings, 3, art. no. 1274253, pp. 1023-1027. DOI: 10.1109/APCC.2003.1274253

Tarhuni, M.A., Ng, S.H., Samsudin, A., Ng, W.P. Enhanced counter mode (2003) APCC 2003 - 9th Asia-Pacific Conference on Communications, in conjunction with 6th Malaysia International Conference on Communications, MICC 2003, Proceedings, 2, art. no. 1274448, pp. 701-705. DOI: 10.1109/APCC.2003.1274448

Meftah, S., Razali, R., Samsudin, A., Budiator, R. Enhancing public-key cryptosystem using parallel Karatsuba algorithm with socket programming (2003) APCC 2003 - 9th Asia-Pacific Conference on Communications, in conjunction with 6th Malaysia International Conference on Communications, MICC 2003, Proceedings, 2, art. no. 1274449, pp. 706-710. DOI: 10.1109/APCC.2003.1274449

2002

Soo, W.H., Samsudin, A., Goh, A. Efficient mental card shuffling via optimised arbitrary-sized benes permutation network (2002) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2433, pp. 446-458. 

Sumari, P., Samsudin, A., Kamarulhaili, H. Data storage and retrieval for video-on-demand servers (2002) Proceedings - 4th International Symposium on Multimedia Software Engineering, MSE 2002, art. no. 1181618, pp. 240-245. DOI: 10.1109/MMSE.2002.1181618

2000

Ngo, D.C.L., Samsudin, A., Abdullah, R. Aesthetic measures for assessing graphic screens (2000) Journal of Information Science and Engineering, 16 (1), pp. 97-116. 

1998

Samsudin, A., Lee, K.Y. ND-dBPN: New self-routing permutation networks based on the de Bruijn digraphs (1998) Proceedings of the International Conference on Parallel Processing, pp. 604-611. DOI: 10.1109/ICPP.1998.708535

Supervision

[Fill your graduates supervisions]

Teaching

[Fill your teaching subjects]

Recognition & Leadership

[Fill your recognitions, e.g. examiners, editorial boards etc.]

Consultancy

[Fill your consultation works]