Authentication Model Based on Reformation Mapping Method
The main objective of the research is to propose an authentication model that exhibits the authentication in more secured fashion. The proposed authentication model is based on the reformation mapping method and works in two stages. Firstly, it reforms the user created password and stored it in the...
| Main Authors: | Safdar, S., Hassan, M.F., Qureshi, M.A., Akhbar, R., Aamir, R. |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/3272/ http://scholars.utp.edu.my/id/eprint/3272/1/stamp.jsp%3Ftp%3D%26arnumber%3D5625708%26tag%3D1 |
Similar Items
Framework for Alternate Execution of Workflows Under Threat
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Two Phase Shortest Path Algorithm for Non-Negative Undirected Graphs
by: Qureshi, MA., et al.
Published: (2010)
by: Qureshi, MA., et al.
Published: (2010)
Biologically Inspired Execution Framework for
Vulnerable Workflow Systems
by: Safdar, S., et al.
Published: (2009)
by: Safdar, S., et al.
Published: (2009)
A O(|E|) Time Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs
by: Qureshi, M.A., et al.
Published: (2010)
by: Qureshi, M.A., et al.
Published: (2010)
Client’s Perspective: Realization as a New Generation Process for Software Project Development and Management
by: Akbar, R., et al.
Published: (2010)
by: Akbar, R., et al.
Published: (2010)
An Edge-Wise Linear Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs
by: Qureshi, M.A., et al.
Published: (2010)
by: Qureshi, M.A., et al.
Published: (2010)
Limitations and Measures in Outsourcing Projects to Geographically Distributed Offshore Teams
by: Akhbar, R., et al.
Published: (2010)
by: Akhbar, R., et al.
Published: (2010)
Moving Towards Two Dimensional Passwords
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Improvements Over Two Phase Shortest Path Algorithm
by: Qureshi, M.A., et al.
Published: (2010)
by: Qureshi, M.A., et al.
Published: (2010)
A Collaborative-Interaction Model of Software Project Development: An Extension to Agile Based Methodologies
by: Akbar, R., et al.
Published: (2010)
by: Akbar, R., et al.
Published: (2010)
Quality model for web services from multi-stakeholders' perspective
by: Balfagih, Z., et al.
Published: (2009)
by: Balfagih, Z., et al.
Published: (2009)
Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
Coordinated Constraint Relaxation Using a
Distributed Agent Protocol
by: Hassan, M.F.
Published: (2007)
by: Hassan, M.F.
Published: (2007)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Three layer authentications with a spiral block mapping to prove authenticity in medical images
by: Ernawan, Ferda, et al.
Published: (2022)
by: Ernawan, Ferda, et al.
Published: (2022)
Fabric authenticity method using fast Fourier transformation detection
by: Norislina, Ismail, et al.
Published: (2011)
by: Norislina, Ismail, et al.
Published: (2011)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Meta-requirement mapping model
by: Muhamad Idaham, Umar Ong, et al.
Published: (2020)
by: Muhamad Idaham, Umar Ong, et al.
Published: (2020)
Constraint relaxation to reduce brittleness of distributed agent
protocols
by: Hassan, M.F., et al.
Published: (2004)
by: Hassan, M.F., et al.
Published: (2004)
Addressing the Brittleness of Agent Interaction
by: Hassan, M.F., et al.
Published: (2008)
by: Hassan, M.F., et al.
Published: (2008)
Constraint Relaxation Approach for Over-Constrained Agent Interaction
by: Hassan, M.F., et al.
Published: (2008)
by: Hassan, M.F., et al.
Published: (2008)
Single and Replicated Simulations for Colored Petri Nets Nondeterministic Network
by: Adhipta, D., et al.
Published: (2010)
by: Adhipta, D., et al.
Published: (2010)
Agent based Monitoring Framework for SOA Applications Quality
by: Balfagih, Z., et al.
Published: (2010)
by: Balfagih, Z., et al.
Published: (2010)
A Survey on Different Interoperability Frameworks of SOA Systems Towards Seamless Interoperability
by: M. Ibrahim, N., et al.
Published: (2010)
by: M. Ibrahim, N., et al.
Published: (2010)
Hybrid biometric authentication for automatic teller machine
by: Arokiasamy, Steven R., et al.
Published: (2024)
by: Arokiasamy, Steven R., et al.
Published: (2024)
Virtual On-Premise Shopping System with Face Recognition Authentication
by: Yap, Choi Sen, et al.
Published: (2022)
by: Yap, Choi Sen, et al.
Published: (2022)
AuSR2: Image watermarking technique for authentication and self-recovery with image texture preservation
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
Development of Simulation Environment for Agent Interaction Protocol
by: Latif, N.A., et al.
Published: (2010)
by: Latif, N.A., et al.
Published: (2010)
Theoretical Framework of the Effect of Extrinsic Rewards and Individual's Intrinsic Attributes on Knowledge Sharing Behavior
by: Amin, A., et al.
Published: (2009)
by: Amin, A., et al.
Published: (2009)
Model driven security frameworks for addressing security problems of Service Oriented Architecture
by: Saleem, M. Q., et al.
Published: (2010)
by: Saleem, M. Q., et al.
Published: (2010)
Smart Home Security Using Facial Authentication
by: Rakshitha, M.V., et al.
Published: (2024)
by: Rakshitha, M.V., et al.
Published: (2024)
A hybrid approach to semi-supervised named entity recognition in health, safety and environment reports
by: Sari, Y., et al.
Published: (2009)
by: Sari, Y., et al.
Published: (2009)
Addressing Constraint Failures in Agent Interaction Protocol
by: Hassan, M.F., et al.
Published: (2009)
by: Hassan, M.F., et al.
Published: (2009)
Creating Extraction Pattern by Combining Part
of Speech Tagger and Grammatical Parser
by: Sari, Y., et al.
Published: (2009)
by: Sari, Y., et al.
Published: (2009)
Rule-based Pattern Extractor and Named Entity Recognition: A Hybrid Approach
by: Sari, Y., et al.
Published: (2010)
by: Sari, Y., et al.
Published: (2010)
A Survey on Adaptive Qualitative Assessment and Dynamic Questions Generation Approaches
by: Rozali, D.S., et al.
Published: (2010)
by: Rozali, D.S., et al.
Published: (2010)
Framework of Intrinsic and Extrinsic Motivators of Knowledge Sharing: A case of Training Institutes of an Oil and Gas Company in Malaysia
by: Amin, A., et al.
Published: (2010)
by: Amin, A., et al.
Published: (2010)
Enhancing user authentication for cloud web-based application / Detar Beqo
by: Detar , Beqo
Published: (2018)
by: Detar , Beqo
Published: (2018)
On the development of a web extension for text authentication on google chrome
by: M. Nomani, Kabir, et al.
Published: (2019)
by: M. Nomani, Kabir, et al.
Published: (2019)
Interaction Protocol For Agent-Based E-Learning System
by: Latif, N.A., et al.
Published: (2009)
by: Latif, N.A., et al.
Published: (2009)
Similar Items
-
Framework for Alternate Execution of Workflows Under Threat
by: Safdar, S., et al.
Published: (2010) -
Two Phase Shortest Path Algorithm for Non-Negative Undirected Graphs
by: Qureshi, MA., et al.
Published: (2010) -
Biologically Inspired Execution Framework for
Vulnerable Workflow Systems
by: Safdar, S., et al.
Published: (2009) -
A O(|E|) Time Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs
by: Qureshi, M.A., et al.
Published: (2010) -
Client’s Perspective: Realization as a New Generation Process for Software Project Development and Management
by: Akbar, R., et al.
Published: (2010)