Profesor Madya Dr. Rosli Bin Saleh | Universiti Malaysia Kelantan (UMK) (original) (raw)

Papers by Profesor Madya Dr. Rosli Bin Saleh

Research paper thumbnail of A Wide range Survey on Recall Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns

Eprint Arxiv 1001 1962, 2010

Nowadays, user authentication is one of the important topics in information security. Text based ... more Nowadays, user authentication is one of the important topics in information security. Text based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical user authentication (GUA) has been proposed as a possible alternative solution to text based authentication, motivated particularly by the fact that humans can remember images better than text. In recent years, many networks, computer systems and Internet based environments try used GUA technique for their users authentication. All of GUA algorithms have two different aspects which are usability and security. Unfortunately, none of graphical algorithms were being able to cover both of these aspects at the same time. This paper presents a wide range survey on the pure and cued recall based algorithms in GUA, based on ISO standards for usability and attack patterns standards for security. After explain usability ISO standards and attack patterns international standards, we try to collect the major attributes of usability and security in GUA. Finally, try to make comparison tables among all recall based algorithms based on usability attributes and attack patterns those we found.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Wireless Security protocols Wi-Fi (802.11) and WiMAX (802.16)

Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard de... more Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard depends on the ease of use and level of security it provides. In this case, contrast between wireless usage and security standards show that the security is not keeping up with the growth paste of end user’s usage. Current wireless technologies in use allow hackers to monitor and even change the integrity of transmitted data. Lack of rigid security standards has caused companies to invest millions on securing their wireless networks. There are three major types of security standards in wireless. In our previous papers which registered in some conferences [1][2][3][4], we explained the structure of WEP, WPA and WPA2 as first, second and third Wi-Fi security protocols and discussed all their versions, vulnerabilities and lacks and improvements. Now, in this paper we try to peruse the weaknesses of WPA2 as the last security protocol in Wi-Fi category and then try to make a whole picture of Wi...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Signature Based Application to Detect Spyware in Network Environment

Spyware generally referring to software that installed on a user's computer and that monitors... more Spyware generally referring to software that installed on a user's computer and that monitors the use of the computer without the users' knowledge or consent. Advertising companies have been known to use spyware to gather data about customers to better market their client product. Spyware may change settings, display advertising, track Internet surfing behavior and report information back to a

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Efficient Algorithm in Projective Coordinates for EEC Over

Several new techniques and algorithms are used to speed up the elliptic curve method computation ... more Several new techniques and algorithms are used to speed up the elliptic curve method computation and reduce the size of the transited parameters. In this paper, we introduce new techniques in projective coordinate for elliptic curves over ) 2 ( n GF ,

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Complete Comparison on Pure and Cued Recall-Based Graphical User Authentication Algorithms

2009 Second International Conference on Computer and Electrical Engineering, 2009

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Multi-Network Data Path for 5G Mobile Multimedia

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Cost-Efficient Bit-Serial Architecture for Sub-pixel Motion Estimation of H.264/AVC

2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Proceedings, 2008

This paper presents a new VLSI architecture for sub-pixel motion estimation in H.264/AVC encoder.... more This paper presents a new VLSI architecture for sub-pixel motion estimation in H.264/AVC encoder. It is based on an interpolation-free algorithm that causes a high level reduction on memory requirement, hardware resources and computational complexity. A high performance, bit-...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of The Future of Mobile Wireless Communication Networks

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Competitive Strategy Trends among the Malaysian Wooden Furniture Industry: An Strategic Groups Analysis

Journal of Applied Sciences, 2011

Title: Competitive Strategy Trends among the Malaysian Wooden Furniture Industry: An Strategic Gr... more Title: Competitive Strategy Trends among the Malaysian Wooden Furniture Industry: An Strategic Groups Analysis. Authors: Ziaie, Mohsen; Mohamed, Sukri; Ratnasinga, Jegatheswaran; Noor,Awang; Saleh, Rosli. Publication: Journal of Applied Sciences, vol. 11, issue 14, pp. ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Review on Factors of Non-Compliance of Halal Standards among Restaurant Operators in Kuala Lumpur

International Business Management, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Overview of Handover Latency and Resource Consumption in Hierarchical Mobile IPv6 Protocol and GPS Approaches

2012 Third International Conference on Intelligent Systems Modelling and Simulation, 2012

IP-Mobility protocols provides robust and integrate connectivity while the Mobile Node (MN) is mo... more IP-Mobility protocols provides robust and integrate connectivity while the Mobile Node (MN) is moving among wireless networks. Therefore running certain procedures are needed to perform the complete handover procedure which results in handover latency and consequently packet loss. The four main causes of handover latency are: 1) Movement Detection, 2) Neighbor Discovery, 3) Duplicate Address Discovery (DAD), and 4) Sending

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Competitive Strategy Trends among the Malaysian Wooden Furniture Industry: An Strategic Groups Analysis

Journal of Applied Sciences, 2011

Title: Competitive Strategy Trends among the Malaysian Wooden Furniture Industry: An Strategic Gr... more Title: Competitive Strategy Trends among the Malaysian Wooden Furniture Industry: An Strategic Groups Analysis. Authors: Ziaie, Mohsen; Mohamed, Sukri; Ratnasinga, Jegatheswaran; Noor,Awang; Saleh, Rosli. Publication: Journal of Applied Sciences, vol. 11, issue 14, pp. ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Unsteadiness of the Resource-based Competitive Advantage in Absence of Competitive Strategy: Lessons from the Malaysian Wooden Furniture Industry

Journal of Applied Sciences, 2012

Abstract: The competitiveness of Malaysia's furniture industry is sinking, despi... more Abstract: The competitiveness of Malaysia's furniture industry is sinking, despite its sturdy growth over the last two decades. Prolongation of this trend will, on the long run, end up in declining of the furniture industry. Within this context, some literature suggests, from ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Wide range Survey on Recall Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns

arXiv preprint arXiv:1001.1962, Jan 12, 2010

Abstract: Nowadays, user authentication is one of the important topics in information security. T... more Abstract: Nowadays, user authentication is one of the important topics in information security. Text based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical user authentication (GUA) has been proposed as a possible alternative solution to text based authentication, motivated particularly by the fact that humans can remember images better ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Shoulder Surfing attack in graphical password authentication

arXiv preprint arXiv:0912.0951, Dec 4, 2009

Abstract: Information and computer security is supported largely by passwords which are the princ... more Abstract: Information and computer security is supported largely by passwords which are the principle part of the authentication process. The most common computer authentication method is to use alphanumerical username and password which has significant drawbacks. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed as possible alternative solutions to text based scheme. A potential drawback of graphical password schemes is that they are more vulnerable to ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Enhancement Throughput of Unplanned Wireless Mesh Networks Deployment Using Partitioning Hierarchical Cluster (PHC)

akademik.unsri.ac.id

Abstract—Wireless mesh networks based on IEEE 802.11 technology are a scalable and efficient solu... more Abstract—Wireless mesh networks based on IEEE 802.11 technology are a scalable and efficient solution for next generation wireless networking to provide wide-area wideband internet access to a significant number of users. The deployment of these wireless mesh networks may be ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Proposed Bluetooth Middleware Profile for On-Location Universal Format Announcement

wseas.us

Bluetooth specification comprises not only communication protocols but application as well. The s... more Bluetooth specification comprises not only communication protocols but application as well. The specifications for building interoperable applications are called profiles. This paper presents a proposed Bluetooth profile which enables Bluetooth mobile users to view and interact ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Off-Line Handwriting Text Line Segmentation: a Review

IJCSNS, 2008

Summary Text line segmentation is an essential pre-processing stage for off-line handwriting reco... more Summary Text line segmentation is an essential pre-processing stage for off-line handwriting recognition in many Optical Character Recognition (OCR) systems. It is an important step because inaccurately segmented text lines will cause errors in the recognition stage. Text line ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Effects of emotional labor on customer outcomes

Research and Innovations, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Wide range Survey on Recall Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns

Eprint Arxiv 1001 1962, 2010

Nowadays, user authentication is one of the important topics in information security. Text based ... more Nowadays, user authentication is one of the important topics in information security. Text based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical user authentication (GUA) has been proposed as a possible alternative solution to text based authentication, motivated particularly by the fact that humans can remember images better than text. In recent years, many networks, computer systems and Internet based environments try used GUA technique for their users authentication. All of GUA algorithms have two different aspects which are usability and security. Unfortunately, none of graphical algorithms were being able to cover both of these aspects at the same time. This paper presents a wide range survey on the pure and cued recall based algorithms in GUA, based on ISO standards for usability and attack patterns standards for security. After explain usability ISO standards and attack patterns international standards, we try to collect the major attributes of usability and security in GUA. Finally, try to make comparison tables among all recall based algorithms based on usability attributes and attack patterns those we found.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Wireless Security protocols Wi-Fi (802.11) and WiMAX (802.16)

Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard de... more Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard depends on the ease of use and level of security it provides. In this case, contrast between wireless usage and security standards show that the security is not keeping up with the growth paste of end user’s usage. Current wireless technologies in use allow hackers to monitor and even change the integrity of transmitted data. Lack of rigid security standards has caused companies to invest millions on securing their wireless networks. There are three major types of security standards in wireless. In our previous papers which registered in some conferences [1][2][3][4], we explained the structure of WEP, WPA and WPA2 as first, second and third Wi-Fi security protocols and discussed all their versions, vulnerabilities and lacks and improvements. Now, in this paper we try to peruse the weaknesses of WPA2 as the last security protocol in Wi-Fi category and then try to make a whole picture of Wi...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Signature Based Application to Detect Spyware in Network Environment

Spyware generally referring to software that installed on a user's computer and that monitors... more Spyware generally referring to software that installed on a user's computer and that monitors the use of the computer without the users' knowledge or consent. Advertising companies have been known to use spyware to gather data about customers to better market their client product. Spyware may change settings, display advertising, track Internet surfing behavior and report information back to a

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Efficient Algorithm in Projective Coordinates for EEC Over

Several new techniques and algorithms are used to speed up the elliptic curve method computation ... more Several new techniques and algorithms are used to speed up the elliptic curve method computation and reduce the size of the transited parameters. In this paper, we introduce new techniques in projective coordinate for elliptic curves over ) 2 ( n GF ,

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Complete Comparison on Pure and Cued Recall-Based Graphical User Authentication Algorithms

2009 Second International Conference on Computer and Electrical Engineering, 2009

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Multi-Network Data Path for 5G Mobile Multimedia

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Cost-Efficient Bit-Serial Architecture for Sub-pixel Motion Estimation of H.264/AVC

2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Proceedings, 2008

This paper presents a new VLSI architecture for sub-pixel motion estimation in H.264/AVC encoder.... more This paper presents a new VLSI architecture for sub-pixel motion estimation in H.264/AVC encoder. It is based on an interpolation-free algorithm that causes a high level reduction on memory requirement, hardware resources and computational complexity. A high performance, bit-...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of The Future of Mobile Wireless Communication Networks

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Competitive Strategy Trends among the Malaysian Wooden Furniture Industry: An Strategic Groups Analysis

Journal of Applied Sciences, 2011

Title: Competitive Strategy Trends among the Malaysian Wooden Furniture Industry: An Strategic Gr... more Title: Competitive Strategy Trends among the Malaysian Wooden Furniture Industry: An Strategic Groups Analysis. Authors: Ziaie, Mohsen; Mohamed, Sukri; Ratnasinga, Jegatheswaran; Noor,Awang; Saleh, Rosli. Publication: Journal of Applied Sciences, vol. 11, issue 14, pp. ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Review on Factors of Non-Compliance of Halal Standards among Restaurant Operators in Kuala Lumpur

International Business Management, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Overview of Handover Latency and Resource Consumption in Hierarchical Mobile IPv6 Protocol and GPS Approaches

2012 Third International Conference on Intelligent Systems Modelling and Simulation, 2012

IP-Mobility protocols provides robust and integrate connectivity while the Mobile Node (MN) is mo... more IP-Mobility protocols provides robust and integrate connectivity while the Mobile Node (MN) is moving among wireless networks. Therefore running certain procedures are needed to perform the complete handover procedure which results in handover latency and consequently packet loss. The four main causes of handover latency are: 1) Movement Detection, 2) Neighbor Discovery, 3) Duplicate Address Discovery (DAD), and 4) Sending

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Competitive Strategy Trends among the Malaysian Wooden Furniture Industry: An Strategic Groups Analysis

Journal of Applied Sciences, 2011

Title: Competitive Strategy Trends among the Malaysian Wooden Furniture Industry: An Strategic Gr... more Title: Competitive Strategy Trends among the Malaysian Wooden Furniture Industry: An Strategic Groups Analysis. Authors: Ziaie, Mohsen; Mohamed, Sukri; Ratnasinga, Jegatheswaran; Noor,Awang; Saleh, Rosli. Publication: Journal of Applied Sciences, vol. 11, issue 14, pp. ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Unsteadiness of the Resource-based Competitive Advantage in Absence of Competitive Strategy: Lessons from the Malaysian Wooden Furniture Industry

Journal of Applied Sciences, 2012

Abstract: The competitiveness of Malaysia's furniture industry is sinking, despi... more Abstract: The competitiveness of Malaysia's furniture industry is sinking, despite its sturdy growth over the last two decades. Prolongation of this trend will, on the long run, end up in declining of the furniture industry. Within this context, some literature suggests, from ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Wide range Survey on Recall Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns

arXiv preprint arXiv:1001.1962, Jan 12, 2010

Abstract: Nowadays, user authentication is one of the important topics in information security. T... more Abstract: Nowadays, user authentication is one of the important topics in information security. Text based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical user authentication (GUA) has been proposed as a possible alternative solution to text based authentication, motivated particularly by the fact that humans can remember images better ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Shoulder Surfing attack in graphical password authentication

arXiv preprint arXiv:0912.0951, Dec 4, 2009

Abstract: Information and computer security is supported largely by passwords which are the princ... more Abstract: Information and computer security is supported largely by passwords which are the principle part of the authentication process. The most common computer authentication method is to use alphanumerical username and password which has significant drawbacks. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed as possible alternative solutions to text based scheme. A potential drawback of graphical password schemes is that they are more vulnerable to ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Enhancement Throughput of Unplanned Wireless Mesh Networks Deployment Using Partitioning Hierarchical Cluster (PHC)

akademik.unsri.ac.id

Abstract—Wireless mesh networks based on IEEE 802.11 technology are a scalable and efficient solu... more Abstract—Wireless mesh networks based on IEEE 802.11 technology are a scalable and efficient solution for next generation wireless networking to provide wide-area wideband internet access to a significant number of users. The deployment of these wireless mesh networks may be ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Proposed Bluetooth Middleware Profile for On-Location Universal Format Announcement

wseas.us

Bluetooth specification comprises not only communication protocols but application as well. The s... more Bluetooth specification comprises not only communication protocols but application as well. The specifications for building interoperable applications are called profiles. This paper presents a proposed Bluetooth profile which enables Bluetooth mobile users to view and interact ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Off-Line Handwriting Text Line Segmentation: a Review

IJCSNS, 2008

Summary Text line segmentation is an essential pre-processing stage for off-line handwriting reco... more Summary Text line segmentation is an essential pre-processing stage for off-line handwriting recognition in many Optical Character Recognition (OCR) systems. It is an important step because inaccurately segmented text lines will cause errors in the recognition stage. Text line ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Effects of emotional labor on customer outcomes

Research and Innovations, 2012

Bookmarks Related papers MentionsView impact