Showing
1 - 11
results of
11
Skip to content
Skip to content
+604 9283627
uumlib@uum.edu.my
MALRep Discovery Service
Facebook
Twitter
Youtube
Instagram
Discover MALRep
Malaysian Academic Library Institutional Repository
Search for:
Menu
Home
Discovery Options
expand child menu
Search History
Advanced Search
Find More
expand child menu
Browse the Catalog
Browse Alphabetically
Explore Channels
Course Reserves
New Items
Search Tips
About
expand child menu
About MALRep Discovery Service
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Kiah M.L.M.
Search Results - Kiah M.L.M.
Showing
1 - 11
results of
11
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Unicast position-based routing protocols for ad-hoc networks
by
Kiah, M.L.M
.
,
Qabajeh, L.K.
,
Qabajeh, M.M.
Published 2010
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
2
A qualitative comparison of position-based routing protocols for ad-hoc networks
by
Qabajeh, L.K.
,
Kiah, M.L.M
.
,
Qabajeh, M.
Published 2009
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
3
Suitability of using SOAP protocol to secure electronic medical record databases transmission
by
Nabi, M.S.A.
,
Kiah, M.L.M
.
,
Zaidan, B.B.
,
Zaidan, A.A.
,
Alam, G.M.
Published 2010
Get full text
Article
Save to List
Saved in:
4
Secure unicast position-based routing protocols for Ad-Hoc networks
by
Qabajeh, L.K.
,
Kiah, M.L.M
.
,
Qabajeh, M.M.
Published 2011
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
5
Shoulder surfing resistance using penup event and neighbouring connectivity manipulation
by
Yee, P.L.
,
Kiah, M.L.M
.
Published 2010
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
6
Host mobility protocol for secure group communication in wireless mobile environments
by
Kiah, M.L.M
.
,
Martin, K.M.
Published 2008
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
7
A more secure and scalable routing protocol for mobile ad hoc networks
by
Qabajeh, L.K.
,
Kiah, M.L.M
.
,
Qabajeh, M.M.
Published 2012
Get full text
Get full text
Article
Save to List
Saved in:
8
A scalable and secure position-based routing protocols for ad-hoc networks
by
Qabajeh, L.K.
,
Kiah, M.L.M
.
,
Qabajeh, M.M.
Published 2009
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
9
A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm
by
Ahmed, M.A.
,
Kiah, M.L.M
.
,
Zaidan, B.B.
,
Zaidan, A.A.
Published 2010
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
10
StegoMos: a secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem
by
Zaidan, B.B.
,
Zaidan, A.A.
,
Taqa, A.
,
Alam, G.M.
,
Kiah, M.L.M
.
,
Jalab, A.H.
Published 2010
Get full text
Get full text
Article
Save to List
Saved in:
11
A distributed framework for health information exchange using smartphone technologies
by
Abdulnabi M.
,
Al-Haiqi A.
,
Kiah M.L.M
.
,
Zaidan A.A.
,
Zaidan B.B.
,
Hussain M.
Published 2023
Article
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search