Enhanced password-based authentication protocol / Lee Chee Kiam.
Similar Items
The incidence quotients of 3-Homogeneous simplicial complexes
Kwa, Kiam Heong.
by: Kwa, Kiam Heong
Published: (1999)
by: Kwa, Kiam Heong
Published: (1999)
Course Advisory System / Lee Chee Siong
by: Lee, Chee Siong
Published: (2004)
by: Lee, Chee Siong
Published: (2004)
Authentication tool for picture based passwords
by: Goh, Wen Bin
Published: (2014)
by: Goh, Wen Bin
Published: (2014)
Password-based authentication in wireless LAN
by: Gan, Hock Lai
Published: (2005)
by: Gan, Hock Lai
Published: (2005)
One-Time Password Authentication System In Website
by: Azham Helmi, Azmi
Published: (2023)
by: Azham Helmi, Azmi
Published: (2023)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
On chromatic polynomials of graphs / Ho, Chee Kit.
by: Ho, Chee Kit
Published: (1998)
by: Ho, Chee Kit
Published: (1998)
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Hopfield model for shortest path computation and routing in ATM network / by Lee Chee Weng
by: Lee, Chee Weng
Published: (2001)
by: Lee, Chee Weng
Published: (2001)
A security enhanced timestamp-based password authentication scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Success factors and challenges for e-procurement implementation / Lee Chee Kong
by: Lee, Chee Kong
Published: (2009)
by: Lee, Chee Kong
Published: (2009)
A study of job satisfaction among engineers / Lee Chee Keen
by: Lee, Chee Keen
Published: (1995)
by: Lee, Chee Keen
Published: (1995)
Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
An improved timestamp-based password authentication scheme with two-party verification using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Grid-based multi-touch gesture to enhance two-factor authentication graphical password for mobile phones
by: Zabidi, Nur Syabila
Published: (2021)
by: Zabidi, Nur Syabila
Published: (2021)
Active authentication by one time password based on unique factor and behavioral biometric
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
by: Por, Lip Yee
Published: (2012)
by: Por, Lip Yee
Published: (2012)
Securing anonymous authenticated announcement protocol for group signature in internet of vehicle / Nur Afiqah Suzelan Amir
by: Nur Afiqah , Suzelan Amir
Published: (2021)
by: Nur Afiqah , Suzelan Amir
Published: (2021)
An XML-based middleware interface integrating with heterogeneous relational databases / Kum Lee Ching.
by: Kum, Lee Ching
Published: (2003)
by: Kum, Lee Ching
Published: (2003)
Confidence regions based on likelihood ratio in a nonlinear model / Chi Lee Meng
by: Chi, Lee Meng
Published: (1996)
by: Chi, Lee Meng
Published: (1996)
Parents the biggest contributor to Lee Chee Ho s success
by: Nurul Ateeqah, Othman
Published: (2022)
by: Nurul Ateeqah, Othman
Published: (2022)
Risk analysis on password for web authentication
by: Omar, Mohd Hasbullah, et al.
Published: (2006)
by: Omar, Mohd Hasbullah, et al.
Published: (2006)
A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Enhancing image-emoji graphical password multi-factor authentication by utilizing single touch and multi-touch gesture
by: Roslan, Nuur Alifah, et al.
Published: (2024)
by: Roslan, Nuur Alifah, et al.
Published: (2024)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
by: Mohammed, Lawan Ahmed
Published: (2004)
by: Mohammed, Lawan Ahmed
Published: (2004)
An Analysis on Vulnerabilities of Password Retrying
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
An object-oriented data automation system for Microsoft Excel files / Ng Lee Yean.
by: Ng, Lee Yean
Published: (2003)
by: Ng, Lee Yean
Published: (2003)
Solving fractional differential equations using iterative homotopy analysis method / Lee Meng Oon
by: Lee , Meng Oon
Published: (2021)
by: Lee , Meng Oon
Published: (2021)
Fundamental to password based security
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Picture-Based Password Scheme
by: Seow, Yang Jiin
Published: (2019)
by: Seow, Yang Jiin
Published: (2019)
Network authentication with time expired scheme and random generated password / Muhamad Syuhaimi Baharuddin
by: Baharuddin, Muhamad Syuhaimi
Published: (2004)
by: Baharuddin, Muhamad Syuhaimi
Published: (2004)
Moving Towards Two Dimensional Passwords
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Data-Driven Augmented Reality for Scout Password Recognition in
Interactive Learning Environment
by: M. Soekarno, Putra, et al.
Published: (2024)
by: M. Soekarno, Putra, et al.
Published: (2024)
Development of object oriented components for ATM network simulation with emphasis on congestion control / Lee Wen Dee.
by: Lee, Wen Dee
Published: (2000)
by: Lee, Wen Dee
Published: (2000)
Quantitative versus qualitative : complement or contradiction / Ngarajah Lee
by: Lee, Ngarajah
Published: (2003)
by: Lee, Ngarajah
Published: (2003)
Password Usage: An Analysis in Academic Institution
by: M. N. M., Kahar, et al.
Published: (2007)
by: M. N. M., Kahar, et al.
Published: (2007)
Password Strengthening by Using Keystroke Dynamics
by: Teh, Pin Shen
Published: (2008)
by: Teh, Pin Shen
Published: (2008)
A Novel Protocol For Enhancing The Security Of Electronic Transaction Using Gsm Authentication
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
Password authentication using biometric function (voice/speaker recognition) / Mohd Shahman Samsul Ambia
by: Mohd Shahman , Samsul Ambia
Published: (2002)
by: Mohd Shahman , Samsul Ambia
Published: (2002)
Similar Items
-
The incidence quotients of 3-Homogeneous simplicial complexes
Kwa, Kiam Heong.
by: Kwa, Kiam Heong
Published: (1999) -
Course Advisory System / Lee Chee Siong
by: Lee, Chee Siong
Published: (2004) -
Authentication tool for picture based passwords
by: Goh, Wen Bin
Published: (2014) -
Password-based authentication in wireless LAN
by: Gan, Hock Lai
Published: (2005) -
One-Time Password Authentication System In Website
by: Azham Helmi, Azmi
Published: (2023)