A systematic review of bring your own device (BYOD) authentication technique F Jamal, M Taufik, AA Abdullah, ZM Hanapi Journal of Physics: Conference Series 1529 (4), 042071, 2020 | 15 | 2020 |
Enhanced bring your own device (BYOD) environment security based on blockchain technology F Jamal, MT Abdullah, A Abdullah, ZM Hanapi International Journal of Engineering & Technology 7 (4.31), 74-79, 2018 | 15 | 2018 |
A Reliable access Control For Mobile Cloud Computing with Cache Aware Scheduling F Jamal, MT Abdullah, A Abdullah, ZM Hanapi IEEE Access, 2019 | 14 | 2019 |
BYOD Authentication Process (BAP) Using Blockchain Technology F Jamal, MT Abdullah, A Abdullah, ZM Hanapi Jour of Adv Research in Dynamical & Control Systems 10 (11), 2018 | 3 | 2018 |
A Proposed Framework for Network Security Audit Trail for Ministry of Domestic Trade & Consumer Affairs F Jamal Graduate School, Universiti Utara Malaysia, 2006 | | 2006 |
SECURE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION WITH CACHE-AWARE SCHEDULING FOR MOBILE CLOUD ACCESS CONTROL F Jamal, MT Abdullah, ZM Hanapi, A Abdullah | | |