default search action
A. H. Azni 0001
Person information
- affiliation: Universiti Sains Islam Malaysia, Faculty of Science and Technology, Nilai, Malaysia
Other persons with the same name
- A. H. Azni — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j5]Abdul Alif Zakaria, A. H. Azni, Farida Ridzuan, Nur Hafiza Zakaria, Maslina Daud:
Systematic literature review: Trend analysis on the design of lightweight block cipher. J. King Saud Univ. Comput. Inf. Sci. 35(5): 101550 (2023) - 2022
- [j4]Abdul Alif Zakaria, Azni Haslizan Ab Halim, Farida Ridzuan, Nur Hafiza Zakaria, Maslina Daud:
LAO-3D: A Symmetric Lightweight Block Cipher Based on 3D Permutation for Mobile Encryption Application. Symmetry 14(10): 2042 (2022) - [c8]Abdul Fuad Abdul Rahman, Azni Haslizan Ab Halim, Shazwani Salleh, Nur Farahin Jamaludin, Nurul Syazwani Kamarulzaman, Madihah Zulfa Mohamad:
Lightweight Denial of Service (DOS) Detection System Algorithm (LIDSA). ICACT 2022: 285-291 - 2021
- [c7]Abdul Fuad Abdul Rahman, Azni Haslizan Ab Halim, Shazwani Salleh, Nur Farahin Jamaludin, Nurul Syazwani Kamarulzaman, Madihah Zulfa Mohamad:
Lightweight Denial of Service (DOS) Detection System Algorithm (LIDSA). ICACT 2021: 285-291 - 2020
- [j3]Abdul Alif Zakaria, A. H. Azni, Farida Ridzuan, Nur Hafiza Zakaria, Maslina Daud:
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT. IEEE Access 8: 198646-198658 (2020) - [j2]Ahmed Abduljabbar Alsabhany, Ahmed Hussain Ali, Farida Ridzuan, A. H. Azni, Mohd Rosmadi Mokhtar:
Digital audio steganography: Systematic review, classification, and analysis of the current state of the art. Comput. Sci. Rev. 38: 100316 (2020) - [c6]Abdul Alif Zakaria, A. H. Azni, Farida Ridzuan, Nur Hafiza Zakaria, Maslina Daud:
Modifications of Key Schedule Algorithm on RECTANGLE Block Cipher. ACeS 2020: 194-206
2010 – 2019
- 2019
- [j1]Ahmed Abduljabbar Alsabhany, Farida Ridzuan, A. H. Azni:
The Adaptive Multi-Level Phase Coding Method in Audio Steganography. IEEE Access 7: 129291-129306 (2019) - [c5]Che Ku Nuraini Che Ku Mohd, Faaizah Shahbodin, Zanariah Jano, A. H. Azni:
Visual Perception Games for Autistic Learners: Design & Development. APIT 2019: 5-11 - [c4]Faaizah Shahbodin, A. H. Azni, Tasnuva Ali, Che Ku Nuraini Che Ku Mohd:
Lightweight Cryptography Techniques for MHealth Cybersecurity. APIT 2019: 44-50 - [c3]Faaizah Shahbodin, Che Ku Nuraini Che Ku Mohd, A. H. Azni, Zanariah Jano:
Visual Perception Games for Autistic Learners: Research Findings. APIT 2019: 56-60 - 2018
- [c2]Abdul Fuad Abdul Rahman, Azni Haslizan Ab Halim, Najwa Hayaati Mohd Alwi, Kamaruzzaman Seman Alwi, Farhan Arif Mohamad, Mohamad Nasrul Taufiq, Madihah Zulfa Mohamad, Khairul Azri Zainal Abidin:
Measuring Sensor to Cloud Energy Consumption. HPCCT 2018: 43-47 - 2017
- [c1]A. H. Azni, Abdul Fuad Abdul Rahman, Najwa Hayaati Mohd Alwi, Kamaruzzaman Seman:
Measuring sensor to cloud energy consumption. ICC 2017: 186:1-186:6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint