You are on page 1of 2

Dr. Sharifah Md.

Yasin
Members Expertise: Elliptic Curve Cryptography
Tel: 603-8946 6515
Email: ifah@fsktm.upm.edu.my

Dr. Nur Izura Udzir (Leader) Mrs. Hjh. Zaiton Muda


Expertise: Secure Operating System, Access Control, Expertise: Cryptography, Parallel Processing
Multi-agent Coordination, Distributed Systems Tel: 603-8946 6509
Tel: 603-8946 6521 Email: zaiton@fsktm.upm.edu.my
Email: izura@fsktm.upm.edu.my
Dr. Nor Fazlida Mohd Sani
Assoc. Prof. Dr. Ramlan Mahmod Expertise: Software/Web and Database Security
Expertise: Security in Computing, Cryptography, Tel: 603-8947 1731
Artificial Intelligence
Tel: 603-8946 6504
Email: fazlida@fsktm.upm.edu.my
Email: ramlan@fsktm.upm.edu.my
Dr. Zurina Mohd Hanafi
Prof. Dr. Abdul Azim Abd. Ghani Expertise: Network Security
Expertise: Software Metrics, Software Security Tel: 603-8947 1778
Tel: 603-8946 6555 Email: zurina@fsktm.upm.edu.my

INFORMATION
Email: azim@fsktm.upm.edu.my
Mr. Muhd Nabil Ahmad Zawawi
Assoc. Prof. Dr. Azmi Jaafar Expertise: Computer Security, Steganography
Expertise: Mathematical Programming

SECURITY
Tel: 603-8946 6520
Tel: 603-8946 6595
Email: azmi@fsktm.upm.edu.my Email: nabil@fsktm.upm.edu.my

GROUP
Dr. Zuriati Ahmad Zukarnain Mr. Mohamed Afendee Mohamad
Expertise: Quantum Computation, Distributed Expertise: Computer Security, Cryptography
Computing, Computer Networks Tel: 603-8946 6579
Tel: 603-8946 6565 Email: afendee@fsktm.upm.edu.my
Email: zuriati@fsktm.upm.edu.my
Mrs. Aziah Asmawi
Dr. Azizol Abdullah
Expertise: Grid Computing,Telematics, CSCW, CSCL,
Expertise: Operating System, Programming
Distributed Systems Languages
Tel: 603-8946 6540 Tel: 603-8946 6581 Faculty of Computer Science
Email: azizol@fsktm.upm.edu.my Email: aziah@fsktm.upm.edu.my
and Information Technology
Dr. Aida Mustapha Mrs. Raja Azlina Raja Mahmood
Expertise: Intelligent Computing, Natural Language Expertise: Network Security
Processing Tel: 603-8947 1768 Universiti Putra Malaysia
Tel: 603-8946 6554 Email: azlina@fsktm.upm.edu.my
Email: aida@fsktm.upm.edu.my

Contact
Dr. Mohd Taufik Abdullah
Expertise: Computer Forensics, Computer Security
Tel: 603-8946 6511
Dr. Nur Izura Udzir (Leader)
Email: mtaufik@fsktm.upm.edu.my
Tel: 603-8947 1708
Fax: 603-8946 6577
Email: izura@fsktm.upm.edu.my
Overview Research Areas Projects/Grants

Computer security is crucial in almost any The group explores research areas such as 1. A Linear-Temporal Formal Language for
technology-driven industry which operates on computer and system security, including Context-Sensitive Usage Control Policies
computer systems, as enormous volumes of cryptography and protocols, operating system - Dr. Nur Izura Udzir, A.P. Dr. Ramlan
critical information is created, transmitted, and security, access control, quantum key distribution, Mahmod, Dr. Zuriati Ahmad Zukarnain
archived by computers worldwide every day – information hiding (e.g. steganography, water- - Fundamental RGS, Feb 2011 – July 2012
ensuring the security of this information is a marking), multimedia information security,
challenge. Some of this information can be computer forensic, network security and software 2. User-centered Privacy Model Based on Mobile
confidential ones belonging to governments, security and malware. Trusted Module (MTM) in Pervasive
military, financial institutions, hospitals, and private Computing Systems
businesses. Protecting confidential information is 1. Cryptography and protocols - Dr. Nur Izura Udzir, A.P. Dr. Ramlan
crucial indeed – it is undoubtedly a business Assoc. Prof. Dr. Ramlan Mahmod Mahmod, Dr. Zuriati Ahmad Zukarnain
requirement, and in many cases also an ethical Assoc. Prof. Dr. Azmi Jaafar - Fundamental RGS, Sept 2009 – Feb 2011
and legal requirement. Mrs. Hjh. Zaiton Muda
Dr. Sharifah Md. Yasin 3. Steganography Through Cover Generation
Information security involves protecting Mr. Mohamed Afendee Mohamad Using 2D Images
information and information systems from - A.P. Dr. Ramlan Mahmod, Muhd Nabil
unauthorized access, use, disclosure, disruption, Ahmad Zawawi
2. Network and grid security
modification, or destruction. With the ever-growing - Fundamental RGS, Mar 2007 – Feb 2009
Dr. Azizol Abdullah
technology, today’s computer professionals need a Dr. Zurina Mohd Hanafi 4. Quantum Key Distribution Protocol for
comprehensive understanding of all aspects of Mrs. Raja Azlina Raja Mahmood Quantum Computer
security in computing.
- Dr. Zuriati Ahmad Zulkarnain, A.P. Dr.
3. Quantum key distribution Hishamuddin Zainuddin, A.P. Dr. Ramlan
Dr. Zuriati Ahmad Zukarnain
Why study Computer Security Mahmod
- RUGS, June 2007 – Jun 2009
at UPM? 4. Digital forensics
Dr. Mohd Taufik Abdullah 5. Quantum Computing for the System of Qutrits
We at UPM offer/provide: Dr. Aida Mustapha in Small World Networks
well trained experts in the information security - Dr. Zuriati Ahmad Zukarnain, A.P. Dr.
systems area to guide ambitious research 5. Information hiding Hishamuddin Zainuddin
students to conduct research. Mr. Muhd Nabil Ahmad Zawawi - Science Fund, Dec 2006 – Dec 2008
well established programmes that have
6. A New Block Cipher Algorithm
produced a number of successful PhD and 6. Operating system security
Master students. - Zaiton Muda, A.P. Dr. Ramlan Mahmod,
Dr. Nur Izura Udzir
Sharifah Md. Yasin
well equipped with good and latest IT facilities Mrs. Aziah Asmawi
that provide comfortable environment for - Science Fund, Dec 2006 – Oct 2008
ambitious research students to conduct 7. Software security and malware 7. Event Reconstruction System for Digital
research. Prof. Dr. Abdul Azim Abd Ghani Computer Forensics
most of the experts that are involved in the Dr. Nor Fazlida Mohd Sani - A.P. Dr. Ramlan Mahmod, Mohd Taufik
information security systems field are awarded Abdullah
with research grants.
- Science Fund, Aug 2006 – Mar 2008

You might also like