default search action
Jamalul-lail Ab Manan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j7]Mohammad Mehdi Gilanian Sadeghi, Borhanuddin Mohd Ali, Maode Ma, Jamalul-lail Ab Manan:
A Novel Energy Efficient Key Distribution Scheme for Mobile WiMAX Networks. Wirel. Pers. Commun. 92(2): 727-748 (2017) - 2016
- [i4]Mohd Anuar Mat Isa, Ramlan Mahmod, Nur Izura Udzir, Jamalul-lail Ab Manan, Ali Dehghan Tanha:
A Mathematical Trust Algebra for International Nation Relations Computation and Evaluation. CoRR abs/1604.00980 (2016) - [i3]Mohd Anuar Mat Isa, Ramlan Mahmod, Nur Izura Udzir, Jamalul-lail Ab Manan, Audun Jøsang, Ali Dehghan Tanha:
A Formal Calculus for International Relations Computation and Evaluation. CoRR abs/1606.02239 (2016) - 2014
- [j6]Mohammad Mehdi Gilanian Sadeghi, Borhanuddin Mohd Ali, Maode Ma, Jamalul-lail Ab Manan:
Scalable and efficient key management for Mobile WiMAX networks. Int. J. Commun. Syst. 27(10): 2166-2189 (2014) - [j5]Sarfraz Nawaz Brohi, Mervat Adib Bamiah, Suriayati Chuprat, Jamalul-lail Ab Manan:
Design and Implementation of a Privacy Preserved off-Premises Cloud Storage. J. Comput. Sci. 10(2): 210-223 (2014) - [j4]Mervat Adib Bamiah, Sarfraz Nawaz Brohi, Suriayati Chuprat, Jamalul-lail Ab Manan:
Trusted Cloud Computing Framework for Healthcare Sector. J. Comput. Sci. 10(2): 240-250 (2014) - [c29]Pauziah Mohd Arsad, Norlida Buniyamin, Jamalul-lail Ab Manan:
Neural Network and Linear Regression methods for prediction of students' academic achievement. EDUCON 2014: 916-921 - [c28]Mohd Faizal Mubarak, Jamalul-lail Ab Manan, Saadiah Yahya:
An Implementation of a Unified Security, Trust and Privacy (STP) Framework for Future Integrated RFID System. FDSE 2014: 122-135 - [c27]Mohd Anuar Mat Isa, Habibah Hashim, Jamalul-lail Ab Manan, Syed Farid Syed Adnan, Ramlan Mahmod:
RF simulator for cryptographic protocol. ICCSCE 2014: 518-523 - [i2]Mohd Anuar Mat Isa, Habibah Hashim, Syed Farid Syed Adnan, Jamalul-lail Ab Manan, Ramlan Mahmod:
A Secure TFTP Protocol with Security Proofs. CoRR abs/1409.0060 (2014) - [i1]Mohd Anuar Mat Isa, Habibah Hashim, Jamalul-lail Ab Manan, Syed Farid Syed Adnan, Ramlan Mahmod:
An Experimental Study of Cryptography Capability using Chained Key Exchange Scheme for Embedded Devices. CoRR abs/1409.0065 (2014) - 2013
- [j3]Hamed Khiabani, Norbik Bashah Idris, Jamalul-lail Ab Manan:
Unified trust establishment by leveraging remote attestation - modeling and analysis. Inf. Manag. Comput. Secur. 21(5): 360-380 (2013) - [j2]Hamed Khiabani, Norbik Bashah Idris, Jamalul-lail Ab Manan:
A Unified Trust Model for Pervasive Environments - Simulation and Analysis. KSII Trans. Internet Inf. Syst. 7(7): 1569-1584 (2013) - 2012
- [j1]Zubair Ahmad Khattak, Jamalul-lail Ab Manan, Suziah Sulaiman:
Trustworthy Mutual Attestation Protocol for Local True Single Sign-On System: Proof of Concept and Performance Evaluation. KSII Trans. Internet Inf. Syst. 6(9): 2405-2423 (2012) - [c26]Eghbal Ghazizadeh, Mazdak Zamani, Jamalul-lail Ab Manan, Abolghasem Pashang:
A survey on security issues of federated identity in the cloud computing. CloudCom 2012: 532-565 - [c25]Hadi KhorasaniZadeh, Norbik Bashah Idris, Jamalul-lail Ab Manan:
Distributed Intrusion Detection trust management through integrity and expertise evaluation. CyberSec 2012: 133-138 - [c24]Hamed Khiabani, Norbik Bashah Idris, Jamalul-lail Ab Manan:
Leveraging Remote Attestation to enhance the Unified Trust Model for WSNs. CyberSec 2012: 139-143 - [c23]Mohd Anuar Mat Isa, Jamalul-lail Ab Manan, Ramlan Mahmod, Habibah Hashim, Mar Yah Said, Nur Izura Udzir, Ali Dehghantanha:
Finest authorizing member of common criteria certification. CyberSec 2012: 155-160 - [c22]Fazli Bin Mat Nor, Kamarularifin Abd. Jalil, Jamalul-lail Ab Manan:
An enhanced remote authentication scheme to mitigate man-in-the-browser attacks. CyberSec 2012: 271-276 - [c21]Eghbal Ghazizadeh, Mazdak Zamani, Jamalul-lail Ab Manan, Reza Khaleghparast, Ali Taherian:
A trust based model for federated identity architecture to mitigate identity theft. ICITST 2012: 376-381 - [c20]Mohd Faizal Mubarak, Jamalul-lail Ab Manan, Saadiah Yahya:
Enabling trust and privacy for RFID system. ISDA 2012: 799-804 - [c19]Mohd Anuar Mat Isa, Habibah Hashim, Jamalul-lail Ab Manan, Ramlan Mahmod, Hanunah Othman:
Integrity Verification Architecture (IVA) Based Security Framework for Windows Operating System. TrustCom 2012: 1304-1309 - [c18]Jamalul-lail Ab Manan, Zubair Ahmad Khattak, Suziah Sulaiman:
Practicable Unified Security, Trust and Privacy (STP) Framework for Federated Access Management (FAM). TrustCom 2012: 1411-1416 - 2011
- [c17]Nurul Haszeli Ahmad, Syed Ahmad Aljunid, Jamalul-lail Ab Manan:
Understanding vulnerabilities by refining taxonomy. IAS 2011: 25-29 - [c16]Mohd Faizal Mubarak, Jamalul-lail Ab Manan, Saadiah Yahya:
Trusted anonymizer-based RFID system with integrity verification. IAS 2011: 98-103 - [c15]Zaid Ahmad, Kamarularifin Abd. Jalil, Jamalul-lail Ab Manan:
Black hole effect mitigation method in AODV routing protocol. IAS 2011: 151-155 - [c14]Zubair Ahmad Khattak, Jamalul-lail Ab Manan, Suziah Sulaiman:
Finding New Solutions for Services in Federated Open Systems Interconnection. ACC (4) 2011: 250-259 - [c13]Mohammad Mehdi Gilanian Sadeghi, Borhanuddin Mohd Ali, Maode Ma, Jamalul-lail Ab Manan, Nor Kamariah Noordin, Sabira Khatun:
Scalable Rekeying Algorithm in IEEE 802.16e. APCC 2011: 726-730 - [c12]Nurul Haszeli Ahmad, Syed Ahmad Aljunid, Jamalul-lail Ab Manan:
Taxonomy of C Overflow Vulnerabilities Attack. ICSECS (2) 2011: 376-390 - [c11]Kamarularifin Abd. Jalil, Zaid Ahmad, Jamalul-lail Ab Manan:
An Enhanced Route Discovery Mechanism for AODV Routing Protocol. ICSECS (3) 2011: 408-418 - [c10]Fazli Bin Mat Nor, Kamarularifin Abd. Jalil, Jamalul-lail Ab Manan:
Remote User Authentication Scheme with Hardware-Based Attestation. ICSECS (2) 2011: 437-447 - [c9]Irshad Ahmed Sumra, Iftikhar Ahmad, Halabi Hasbullah, Jamalul-lail Ab Manan:
Behavior of attacker and some new possible attacks in Vehicular Ad hoc Network (VANET). ICUMT 2011: 1-8 - [c8]Irshad Ahmed Sumra, Halabi Hasbullah, Jamalul-lail Ab Manan:
Trust levels in Peer-to-Peer (P2P) vehicular communication. ICUMT 2011: 1-8 - 2010
- [c7]Hamed Khiabani, Zailani Mohamed Sidek, Jamalul-lail Ab Manan:
Towards a Unified Trust Model in Pervasive Systems. AINA Workshops 2010: 831-835 - [c6]Hanunah Othman, Habibah Hashim, Jamalul-lail Ab Manan:
A conceptual framework providing Direct Anonymous Attestation (DAA) protocol in trusted location-based services (LBS). ICITST 2010: 1-7 - [c5]Mohd Faizal Mubarak, Jamalul-lail Ab Manan, Saadiah Yahya:
The System Integrity Verification for Trusted RFID Protocol. ITNG 2010: 743-747 - [c4]Asmidar Abu Bakar, Roslan Ismail, Abdul Rahim Ahmad, Jamalul-lail Ab Manan:
Trust Formation Based on Subjective Logic and PGP Web-of-Trust for Information Sharing in Mobile Ad Hoc Networks. SocialCom/PASSAT 2010: 1004-1009 - [c3]Hanunah Othman, Habibah Hashim, Mohd Ameer Yuslan Razmi, Jamalul-lail Ab Manan:
Forming Virtualized Secure Framework for Location Based Services (LBS) using Direct Anonymous Attestation (DAA) protocol. WiMob 2010: 622-629
2000 – 2009
- 2009
- [c2]Asmidar Abu Bakar, Roslan Ismail, Abdul Rahim Ahmad, Jamalul-lail Ab Manan, Jamilin Jais:
Group based access control scheme (GBAC): Keeping information sharing secure in mobile Ad- hoc environment. ICDIM 2009: 86-91 - [c1]Asmidar Abu Bakar, Roslan Ismail, Abdul Rahim Ahmad, Jamalul-lail Ab Manan, Jamilin Jais:
Group based access control scheme: proof of method for secure access control architecture in mobile ad-hoc networks. MoMM 2009: 446-451
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint