Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Suriani Mohd Sam is active.

Publication


Featured researches published by Suriani Mohd Sam.


international conference on advances in electrical electronic and systems engineering | 2016

A study of authentication protocols for security of mobile RFID (M-RFID) system

Noriani Mohammed Noor; Kamilia Kamardin; Suriani Mohd Sam; Hafiza Abas; Nilam Nur Amir Sjarif; Yusnaidi Md Yusof; Azri Azmi

Radio-frequency identification (RFID) uses electromagnetic fields for wireless communication that automatically recognized target devices with no physical interaction with the purpose of information transmission. The RFID system composed of transponder or tag, interrogator and back-end host system. The services of mobile RFID (M-RFID) networks can be setup by consolidating with current wireless networking for mobile devices and RFID networks whereby these services are aiming for individual and private users using Mobile smart phone or PDA. Even though these systems have the benefits of RFID and mobile technology, it also promotes crucial security and privacy issues. M-RFID inherits all issues that exist in the traditional RFID system, for example, replay attack, denial of service, spoofing, traceability and impersonation. However the severity of these issues intensifies because M-RFID reader is used in the wireless environment with agility in movement and greater scanning zone. Therefore, many security protocols developed to support the security and privacy problems arise in M-RFID systems. Among the famous security protocol for the system is the ultralightweight authentication protocols and this survey focus on the study of these protocols. These protocols are not capable of fulfilling all the security and privacy requirements especially in the mobile wireless environments. As in most of the literatures that described and proposed for the security and privacy authentication protocol of M-RFID, they proved that designing a security and privacy authentication protocol is still a demanding and challenging activities. Although many authentication protocols have been developed over the years, none can be considered as perfect and supreme. Based on the review of the authentication protocols, the well-chosen protocol always depends on the context and scenario for the security and privacy efficiency requirements of the M-RFID system.


international conference on digital information processing and communications | 2015

Implementation of security in computer designated mode system

Sharizal Fadlie Sabri; Salwani Mohd Daud; Suriani Mohd Sam; Kamilia Kamardin; Nor'asnilawati Salleh

Computer Designated Mode (CDM) plays an important role during tracking ISROs launch vehicle, GSLV D5. It allows tracking data to be transferred from Satish Dhawan Space Centre, India to Malaysia Space Centre, Malaysia. The data are used for real time tracking. This paper looks into the development of CDM that is based on functional requirement whereas the security measure is not considered at the moment. This paper explains the architecture of CDM and how the security will be implemented on the systems. RSA algorithm is chosen as the encryption technique which will be applied in the system. Simulation result shows that this technique is feasible for the mentioned implementation.


Jurnal Teknologi | 2016

Review of the current design on wearable antenna in medical field and its challenges

Sharizal Fadlie Sabri; Suriani Mohd Sam; Kamilia Kamardin; Salwani Mohd Daud; Nor’asnilawati Salleh


soft computing | 2017

Adaptive user profiling: experimenting on multiple interests and changing interests

Nurulhuda Firdaus Mohd Azmi; Suriani Mohd Sam; Saiful Adli Ismail; Nilam Nur Amir Sjarif


Advanced Science Letters | 2017

Master data definition and the privacy classification in government agencies: Case studies of local government

Faizura Haneem; Nazri Kama; Azri Azmi; Azizul Azizan; Suriani Mohd Sam; Othman Mohd Yusop; Hafiza Abas


Archive | 2016

Prioritization of master data domains in public sector organisations

Faizura Haneem; Nazri Kama; Azri Azmi; Azizul Azizan; Suriani Mohd Sam


Archive | 2016

Enterprise resources planning implementation success factors of steel industry

Nurazean Maarop; Erfan Ayazia; Suriani Mohd Sam; Othman Mohd Yusop; Azrina Hani Azmi; Rosmah Alia


Jurnal Teknologi | 2016

SOME INTRIGUING HIGH-THROUGHPUT DNA SEQUENCE VARIANTS PREDICTION OVER PROTEIN FUNCTIONALITY

Atabak Kheirkhah; Salwani Mohd Daud; Suriani Mohd Sam; Hafiza Abas; Sya Azmeela Shariff; Yusnaidi Md Yusof


Indian journal of science and technology | 2016

Study of Qos performance in optical burst switched networks (OBS)

Suriani Mohd Sam; Salwani Mohd Daud; Kamilia Kamardin; Nurazean Maarop


ARPN journal of engineering and applied sciences | 2016

Implementation of cryptography algorithms in SCADAKratos application

Nor'asnilawati Salleh; Salwani Mohd Daud; Sharizal Fadlie Sabri; Suriani Mohd Sam; Mohamad Zulkefli Adam

Collaboration


Dive into the Suriani Mohd Sam's collaboration.

Top Co-Authors

Avatar

Salwani Mohd Daud

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Kamilia Kamardin

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Azri Azmi

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Hafiza Abas

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Azizul Azizan

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Faizura Haneem

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Nilam Nur Amir Sjarif

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Nurazean Maarop

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Othman Mohd Yusop

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Yusnaidi Md Yusof

Universiti Teknologi Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge