Profesor Madya Dr. Rosli Bin Saleh | Universiti Malaysia Kelantan (UMK) (original) (raw)
Papers by Profesor Madya Dr. Rosli Bin Saleh
Eprint Arxiv 1001 1962, 2010
Nowadays, user authentication is one of the important topics in information security. Text based ... more Nowadays, user authentication is one of the important topics in information security. Text based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical user authentication (GUA) has been proposed as a possible alternative solution to text based authentication, motivated particularly by the fact that humans can remember images better than text. In recent years, many networks, computer systems and Internet based environments try used GUA technique for their users authentication. All of GUA algorithms have two different aspects which are usability and security. Unfortunately, none of graphical algorithms were being able to cover both of these aspects at the same time. This paper presents a wide range survey on the pure and cued recall based algorithms in GUA, based on ISO standards for usability and attack patterns standards for security. After explain usability ISO standards and attack patterns international standards, we try to collect the major attributes of usability and security in GUA. Finally, try to make comparison tables among all recall based algorithms based on usability attributes and attack patterns those we found.
Bookmarks Related papers MentionsView impact
Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard de... more Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard depends on the ease of use and level of security it provides. In this case, contrast between wireless usage and security standards show that the security is not keeping up with the growth paste of end user’s usage. Current wireless technologies in use allow hackers to monitor and even change the integrity of transmitted data. Lack of rigid security standards has caused companies to invest millions on securing their wireless networks. There are three major types of security standards in wireless. In our previous papers which registered in some conferences [1][2][3][4], we explained the structure of WEP, WPA and WPA2 as first, second and third Wi-Fi security protocols and discussed all their versions, vulnerabilities and lacks and improvements. Now, in this paper we try to peruse the weaknesses of WPA2 as the last security protocol in Wi-Fi category and then try to make a whole picture of Wi...
Bookmarks Related papers MentionsView impact
Spyware generally referring to software that installed on a user's computer and that monitors... more Spyware generally referring to software that installed on a user's computer and that monitors the use of the computer without the users' knowledge or consent. Advertising companies have been known to use spyware to gather data about customers to better market their client product. Spyware may change settings, display advertising, track Internet surfing behavior and report information back to a
Bookmarks Related papers MentionsView impact
Several new techniques and algorithms are used to speed up the elliptic curve method computation ... more Several new techniques and algorithms are used to speed up the elliptic curve method computation and reduce the size of the transited parameters. In this paper, we introduce new techniques in projective coordinate for elliptic curves over ) 2 ( n GF ,
Bookmarks Related papers MentionsView impact
2009 Second International Conference on Computer and Electrical Engineering, 2009
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Proceedings, 2008
This paper presents a new VLSI architecture for sub-pixel motion estimation in H.264/AVC encoder.... more This paper presents a new VLSI architecture for sub-pixel motion estimation in H.264/AVC encoder. It is based on an interpolation-free algorithm that causes a high level reduction on memory requirement, hardware resources and computational complexity. A high performance, bit-...
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Journal of Applied Sciences, 2011
Title: Competitive Strategy Trends among the Malaysian Wooden Furniture Industry: An Strategic Gr... more Title: Competitive Strategy Trends among the Malaysian Wooden Furniture Industry: An Strategic Groups Analysis. Authors: Ziaie, Mohsen; Mohamed, Sukri; Ratnasinga, Jegatheswaran; Noor,Awang; Saleh, Rosli. Publication: Journal of Applied Sciences, vol. 11, issue 14, pp. ...
Bookmarks Related papers MentionsView impact
International Business Management, 2012
Bookmarks Related papers MentionsView impact
2012 Third International Conference on Intelligent Systems Modelling and Simulation, 2012
IP-Mobility protocols provides robust and integrate connectivity while the Mobile Node (MN) is mo... more IP-Mobility protocols provides robust and integrate connectivity while the Mobile Node (MN) is moving among wireless networks. Therefore running certain procedures are needed to perform the complete handover procedure which results in handover latency and consequently packet loss. The four main causes of handover latency are: 1) Movement Detection, 2) Neighbor Discovery, 3) Duplicate Address Discovery (DAD), and 4) Sending
Bookmarks Related papers MentionsView impact
Journal of Applied Sciences, 2011
Title: Competitive Strategy Trends among the Malaysian Wooden Furniture Industry: An Strategic Gr... more Title: Competitive Strategy Trends among the Malaysian Wooden Furniture Industry: An Strategic Groups Analysis. Authors: Ziaie, Mohsen; Mohamed, Sukri; Ratnasinga, Jegatheswaran; Noor,Awang; Saleh, Rosli. Publication: Journal of Applied Sciences, vol. 11, issue 14, pp. ...
Bookmarks Related papers MentionsView impact
Journal of Applied Sciences, 2012
Abstract: The competitiveness of Malaysia's furniture industry is sinking, despi... more Abstract: The competitiveness of Malaysia's furniture industry is sinking, despite its sturdy growth over the last two decades. Prolongation of this trend will, on the long run, end up in declining of the furniture industry. Within this context, some literature suggests, from ...
Bookmarks Related papers MentionsView impact
arXiv preprint arXiv:1001.1962, Jan 12, 2010
Abstract: Nowadays, user authentication is one of the important topics in information security. T... more Abstract: Nowadays, user authentication is one of the important topics in information security. Text based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical user authentication (GUA) has been proposed as a possible alternative solution to text based authentication, motivated particularly by the fact that humans can remember images better ...
Bookmarks Related papers MentionsView impact
arXiv preprint arXiv:0912.0951, Dec 4, 2009
Abstract: Information and computer security is supported largely by passwords which are the princ... more Abstract: Information and computer security is supported largely by passwords which are the principle part of the authentication process. The most common computer authentication method is to use alphanumerical username and password which has significant drawbacks. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed as possible alternative solutions to text based scheme. A potential drawback of graphical password schemes is that they are more vulnerable to ...
Bookmarks Related papers MentionsView impact
akademik.unsri.ac.id
AbstractWireless mesh networks based on IEEE 802.11 technology are a scalable and efficient solu... more AbstractWireless mesh networks based on IEEE 802.11 technology are a scalable and efficient solution for next generation wireless networking to provide wide-area wideband internet access to a significant number of users. The deployment of these wireless mesh networks may be ...
Bookmarks Related papers MentionsView impact
wseas.us
Bluetooth specification comprises not only communication protocols but application as well. The s... more Bluetooth specification comprises not only communication protocols but application as well. The specifications for building interoperable applications are called profiles. This paper presents a proposed Bluetooth profile which enables Bluetooth mobile users to view and interact ...
Bookmarks Related papers MentionsView impact
IJCSNS, 2008
Summary Text line segmentation is an essential pre-processing stage for off-line handwriting reco... more Summary Text line segmentation is an essential pre-processing stage for off-line handwriting recognition in many Optical Character Recognition (OCR) systems. It is an important step because inaccurately segmented text lines will cause errors in the recognition stage. Text line ...
Bookmarks Related papers MentionsView impact
Research and Innovations, 2012
Bookmarks Related papers MentionsView impact
Eprint Arxiv 1001 1962, 2010
Nowadays, user authentication is one of the important topics in information security. Text based ... more Nowadays, user authentication is one of the important topics in information security. Text based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical user authentication (GUA) has been proposed as a possible alternative solution to text based authentication, motivated particularly by the fact that humans can remember images better than text. In recent years, many networks, computer systems and Internet based environments try used GUA technique for their users authentication. All of GUA algorithms have two different aspects which are usability and security. Unfortunately, none of graphical algorithms were being able to cover both of these aspects at the same time. This paper presents a wide range survey on the pure and cued recall based algorithms in GUA, based on ISO standards for usability and attack patterns standards for security. After explain usability ISO standards and attack patterns international standards, we try to collect the major attributes of usability and security in GUA. Finally, try to make comparison tables among all recall based algorithms based on usability attributes and attack patterns those we found.
Bookmarks Related papers MentionsView impact
Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard de... more Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard depends on the ease of use and level of security it provides. In this case, contrast between wireless usage and security standards show that the security is not keeping up with the growth paste of end user’s usage. Current wireless technologies in use allow hackers to monitor and even change the integrity of transmitted data. Lack of rigid security standards has caused companies to invest millions on securing their wireless networks. There are three major types of security standards in wireless. In our previous papers which registered in some conferences [1][2][3][4], we explained the structure of WEP, WPA and WPA2 as first, second and third Wi-Fi security protocols and discussed all their versions, vulnerabilities and lacks and improvements. Now, in this paper we try to peruse the weaknesses of WPA2 as the last security protocol in Wi-Fi category and then try to make a whole picture of Wi...
Bookmarks Related papers MentionsView impact
Spyware generally referring to software that installed on a user's computer and that monitors... more Spyware generally referring to software that installed on a user's computer and that monitors the use of the computer without the users' knowledge or consent. Advertising companies have been known to use spyware to gather data about customers to better market their client product. Spyware may change settings, display advertising, track Internet surfing behavior and report information back to a
Bookmarks Related papers MentionsView impact
Several new techniques and algorithms are used to speed up the elliptic curve method computation ... more Several new techniques and algorithms are used to speed up the elliptic curve method computation and reduce the size of the transited parameters. In this paper, we introduce new techniques in projective coordinate for elliptic curves over ) 2 ( n GF ,
Bookmarks Related papers MentionsView impact
2009 Second International Conference on Computer and Electrical Engineering, 2009
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Proceedings, 2008
This paper presents a new VLSI architecture for sub-pixel motion estimation in H.264/AVC encoder.... more This paper presents a new VLSI architecture for sub-pixel motion estimation in H.264/AVC encoder. It is based on an interpolation-free algorithm that causes a high level reduction on memory requirement, hardware resources and computational complexity. A high performance, bit-...
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Journal of Applied Sciences, 2011
Title: Competitive Strategy Trends among the Malaysian Wooden Furniture Industry: An Strategic Gr... more Title: Competitive Strategy Trends among the Malaysian Wooden Furniture Industry: An Strategic Groups Analysis. Authors: Ziaie, Mohsen; Mohamed, Sukri; Ratnasinga, Jegatheswaran; Noor,Awang; Saleh, Rosli. Publication: Journal of Applied Sciences, vol. 11, issue 14, pp. ...
Bookmarks Related papers MentionsView impact
International Business Management, 2012
Bookmarks Related papers MentionsView impact
2012 Third International Conference on Intelligent Systems Modelling and Simulation, 2012
IP-Mobility protocols provides robust and integrate connectivity while the Mobile Node (MN) is mo... more IP-Mobility protocols provides robust and integrate connectivity while the Mobile Node (MN) is moving among wireless networks. Therefore running certain procedures are needed to perform the complete handover procedure which results in handover latency and consequently packet loss. The four main causes of handover latency are: 1) Movement Detection, 2) Neighbor Discovery, 3) Duplicate Address Discovery (DAD), and 4) Sending
Bookmarks Related papers MentionsView impact
Journal of Applied Sciences, 2011
Title: Competitive Strategy Trends among the Malaysian Wooden Furniture Industry: An Strategic Gr... more Title: Competitive Strategy Trends among the Malaysian Wooden Furniture Industry: An Strategic Groups Analysis. Authors: Ziaie, Mohsen; Mohamed, Sukri; Ratnasinga, Jegatheswaran; Noor,Awang; Saleh, Rosli. Publication: Journal of Applied Sciences, vol. 11, issue 14, pp. ...
Bookmarks Related papers MentionsView impact
Journal of Applied Sciences, 2012
Abstract: The competitiveness of Malaysia's furniture industry is sinking, despi... more Abstract: The competitiveness of Malaysia's furniture industry is sinking, despite its sturdy growth over the last two decades. Prolongation of this trend will, on the long run, end up in declining of the furniture industry. Within this context, some literature suggests, from ...
Bookmarks Related papers MentionsView impact
arXiv preprint arXiv:1001.1962, Jan 12, 2010
Abstract: Nowadays, user authentication is one of the important topics in information security. T... more Abstract: Nowadays, user authentication is one of the important topics in information security. Text based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical user authentication (GUA) has been proposed as a possible alternative solution to text based authentication, motivated particularly by the fact that humans can remember images better ...
Bookmarks Related papers MentionsView impact
arXiv preprint arXiv:0912.0951, Dec 4, 2009
Abstract: Information and computer security is supported largely by passwords which are the princ... more Abstract: Information and computer security is supported largely by passwords which are the principle part of the authentication process. The most common computer authentication method is to use alphanumerical username and password which has significant drawbacks. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed as possible alternative solutions to text based scheme. A potential drawback of graphical password schemes is that they are more vulnerable to ...
Bookmarks Related papers MentionsView impact
akademik.unsri.ac.id
AbstractWireless mesh networks based on IEEE 802.11 technology are a scalable and efficient solu... more AbstractWireless mesh networks based on IEEE 802.11 technology are a scalable and efficient solution for next generation wireless networking to provide wide-area wideband internet access to a significant number of users. The deployment of these wireless mesh networks may be ...
Bookmarks Related papers MentionsView impact
wseas.us
Bluetooth specification comprises not only communication protocols but application as well. The s... more Bluetooth specification comprises not only communication protocols but application as well. The specifications for building interoperable applications are called profiles. This paper presents a proposed Bluetooth profile which enables Bluetooth mobile users to view and interact ...
Bookmarks Related papers MentionsView impact
IJCSNS, 2008
Summary Text line segmentation is an essential pre-processing stage for off-line handwriting reco... more Summary Text line segmentation is an essential pre-processing stage for off-line handwriting recognition in many Optical Character Recognition (OCR) systems. It is an important step because inaccurately segmented text lines will cause errors in the recognition stage. Text line ...
Bookmarks Related papers MentionsView impact
Research and Innovations, 2012
Bookmarks Related papers MentionsView impact