Get my own profile
Public access
View all6 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Jianting NingFujian Normal University/Wuhan UniversityVerified email at whu.edu.cnJi-Jian ChinUniversity of PlymouthVerified email at plymouth.ac.uk
Kok-Lim Alvin YauProfessor, UTAR, MalaysiaVerified email at utar.edu.my
Raphaël C.-W. PhanProfessor at Monash UniversityVerified email at monash.edu
Wei-Chuen YauXiamen University MalaysiaVerified email at xmu.edu.my
Keith M. MartinRoyal Holloway, University of LondonVerified email at rhul.ac.ukBok-Min GoiSenior Professor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul RahmanVerified email at utar.edu.my
Syh Yuan TanNewcastle UniversityVerified email at newcastle.ac.ukMuhammad Reza Z'abaMalaysia Cryptology Technology and Management CentreVerified email at upm.edu.my
Swee-Huay HengMultimedia UniversityVerified email at mmu.edu.my
Wun-She YapUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
Huo-Chong LingResearcher@RMIT University VietnamVerified email at rmit.edu.vn
Iftekhar SalamXiamen University MalaysiaVerified email at xmu.edu.my
Junaid QadirProfessor of Computer Engineering, Qatar UniversityVerified email at qu.edu.qa
Qiang NiProfessor, Lancaster UniversityVerified email at lancaster.ac.uk
Wai Kong LeeUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
Peter KomisarczukRoyal Holloway, University of London, Information Security Group (ISG)Verified email at rhul.ac.ukDavid ChiengAssociate Professor of Electrical and Electronic EngineeringVerified email at nottingham.edu.cn