Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
 
Articles by Norziana Jamil
Total Records ( 2 ) for Norziana Jamil
  Norziana Jamil , Ramlan Mahmod , Muhammad Reza Z`aba , Nur Izura Udzir and Zuriati Ahmad Zukarnain
  Hash functions are an important cryptographic primitive in a wide range of applications, such as message authentication and digital signatures. Among others, Message Digest (MD)-4/5, Secure Hashing Algorithm (SHA)-0/1/2 and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples of widely used hash functions in cryptographic applications. However with the advances of cryptanalysis, MD-4/5, SHA-0/1 and RIPEMD were broken in 2004-2005 after more than a decade of use. Since then, the structure and components of cryptographic hash functions have been studied and revisited extensively by the cryptographic community. This study describes a 256-bit hash function named as STITCH-256, to overcome problems found in MD- and SHA-family hash functions. We analyze all the components of STITCH-256 and the security analysis of STITCH-256 shows that it is not feasible to construct a collision path for STITCH-256 with a high probability of success.
  Zakuan Firdaus , Norziana Jamil , Qais Saif Qassim , Mohd Ezanee Rusli , Norhamadi Ja`affar , Maslina Daud and HafizahChe Hasan
  Supervisory Control And Data Acquisition Systems (SCADA) monitor and control industrial and critical infrastructure functions such as electricity, oil, water and natural gas production and distribution processes. Consequently, failure in the intended operation of SCADA system results in catastrophic consequences. With the increased interconnectivity of SCADA systems and the commercial availability of cloud computing, SCADA systems have increasingly adopted Internet of Things (IoT) technologies to significantly reduce infrastructure costs and increase ease of maintenance and integration. As a result, the exposure of these systems to cyber threats has increased enormously. Therefore, there is a necessity to identify, remediate and mitigate system’s security vulnerabilities to protect and prevent possible attacks. This study serves two folds; firstly, different types of vulnerabilities in SCADA systems have been identified and reviewed. Secondly, two test cases have been presented to demonstrate the severity of the identified vulnerabilities on SCADA systems. This study draws attention to the impact of threat on SCADA systems and their consequences.
 
 
 
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility