ASP authentication using IP address / Kumar Mallanaidu
The project undertaken is ASP Authentication Using IP Addressing; the mam objective of this project is to introduce the authentication technique for the websites, which are developed for any commercial organizations. This project just demonstrates the core key concepts of password authentication,...
| Main Author: | Kumar , Mallanaidu |
|---|---|
| Format: | Thesis |
| Published: |
2003
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/8677/ http://studentsrepo.um.edu.my/8677/1/ASP_authentication_using_IP_address.pdf |
Similar Items
Classification of dividend news based on the movement of the share market prices of public listed companies in Bursa Malaysia / Shubana Vijaya Kumar
by: Shubana , Vijaya Kumar
Published: (2020)
by: Shubana , Vijaya Kumar
Published: (2020)
End-to-end delay performance for VoIP on LTE system in access network
by: Ng, Liang Shen, et al.
Published: (2013)
by: Ng, Liang Shen, et al.
Published: (2013)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Unidirectional and bidirectional optimistic modes IP header compression for real-time video streaming
by: Bouthiba Farouq, Douma, et al.
Published: (2020)
by: Bouthiba Farouq, Douma, et al.
Published: (2020)
Fabric authenticity method using fast Fourier transformation detection
by: Norislina, Ismail, et al.
Published: (2011)
by: Norislina, Ismail, et al.
Published: (2011)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Hybrid biometric authentication for automatic teller machine
by: Arokiasamy, Steven R., et al.
Published: (2024)
by: Arokiasamy, Steven R., et al.
Published: (2024)
A secure authentication scheme using locimetric and press touch code techniques
by: Noor Elya Afiqah, Che Nordin
Published: (2019)
by: Noor Elya Afiqah, Che Nordin
Published: (2019)
Fingerprint watermarking with tamper localization and exact recovery using multi-level authentication
by: Wei, Keat Lee, et al.
Published: (2018)
by: Wei, Keat Lee, et al.
Published: (2018)
Strict Authentication Watermaking with Jpeg Compression (SAW-JPEG)
by: Jasni, Mohamad Zain
Published: (2008)
by: Jasni, Mohamad Zain
Published: (2008)
Reversible watermarking technique for fingerprint authentication based on DCT
by: Mohamed, Lebcir, et al.
Published: (2020)
by: Mohamed, Lebcir, et al.
Published: (2020)
Model driven security frameworks for addressing security problems of Service Oriented Architecture
by: Saleem, M. Q., et al.
Published: (2010)
by: Saleem, M. Q., et al.
Published: (2010)
Numbering with Spiral Pattern to Prove Authenticity and Integrity in Medical Images
by: Syifak Izhar, Hisham, et al.
Published: (2016)
by: Syifak Izhar, Hisham, et al.
Published: (2016)
On the development of a web extension for text authentication on google chrome
by: M. Nomani, Kabir, et al.
Published: (2019)
by: M. Nomani, Kabir, et al.
Published: (2019)
Addressing the Brittleness of Agent Interaction
by: Hassan, M.F., et al.
Published: (2008)
by: Hassan, M.F., et al.
Published: (2008)
Performance Analysis on the Effect of G.729, Speex and GSM Speech Codec on 802.11g Wireless Local Area Network over VoIP using Packet Jitter
by: Imran Edzereiq, Kamarudin, et al.
Published: (2013)
by: Imran Edzereiq, Kamarudin, et al.
Published: (2013)
A hybrid screen size independent authentication scheme for smart devices
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
Comparative analysis on raster, spiral, hilbert, and peano mapping pattern of fragile watermarking to address the authentication issue in healthcare system
by: Syifak Izhar, Hisham, et al.
Published: (2019)
by: Syifak Izhar, Hisham, et al.
Published: (2019)
An enhanced concept based approach medical information retrieval to address readability, vocabulary and presentation issues
by: Kontagora, Ibrahim Umar
Published: (2019)
by: Kontagora, Ibrahim Umar
Published: (2019)
Stegano-image as a digital signature to improve security authentication system in mobile computing
by: Mantoro, Teddy, et al.
Published: (2016)
by: Mantoro, Teddy, et al.
Published: (2016)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Graphical user authentication system (GUAS)
by: Tan, Woei Wen
Published: (2014)
by: Tan, Woei Wen
Published: (2014)
Addressing Constraint Failures in Agent Interaction Protocol
by: Hassan, M.F., et al.
Published: (2009)
by: Hassan, M.F., et al.
Published: (2009)
A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents
by: M. Nomani, Kabir, et al.
Published: (2014)
by: M. Nomani, Kabir, et al.
Published: (2014)
Study of graphical authentication system based on persuasive rotation, resizing and cued click point (GUAS)
by: Zolkipli, Mohamad Fadli
Published: (2014)
by: Zolkipli, Mohamad Fadli
Published: (2014)
Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
Smart Home Security Using Facial Authentication
by: Rakshitha, M.V., et al.
Published: (2024)
by: Rakshitha, M.V., et al.
Published: (2024)
Improving computational complexity using I-zag for text image authentication scheme
by: ‘Aqilah, Abd. Ghani
Published: (2024)
by: ‘Aqilah, Abd. Ghani
Published: (2024)
Automated attendance taker using passive mac address probing
by: Low, Chun Fai
Published: (2018)
by: Low, Chun Fai
Published: (2018)
Accurate modeling of VoIP traffic QoS parameters in current and future networks with multifractal and Markov Models
by: Toral-Cruz, Homero, et al.
Published: (2012)
by: Toral-Cruz, Homero, et al.
Published: (2012)
Fingerprint Authentication System using a low-priced Webcam
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Recognition based authentication method to prevent reconstruction attack
by: Koay, Chong Jen
Published: (2018)
by: Koay, Chong Jen
Published: (2018)
Authentication Model Based on Reformation Mapping Method
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Watermark Embedder and Image Authenticator (WEIA)
by: Lu, Chun Ling, et al.
Published: (2014)
by: Lu, Chun Ling, et al.
Published: (2014)
Design of a collaborative system for real time haptic feedback in distributed virtual environments over IP networks
by: Yap, Kian Meng *
Published: (2011)
by: Yap, Kian Meng *
Published: (2011)
Interactive biology learning system (IBLS) / Vija Kumar Ganapathy Pillay
by: Vija Kumar, Ganapathy Pillay
Published: (2002)
by: Vija Kumar, Ganapathy Pillay
Published: (2002)
Komunikasi Suara Melalui Protokol Internet(VoIP) / Mohd. Azmi Mustafa @ Sulaiman
by: Mohd. Azmi, Mustafa @ Sulaiman
Published: (2004)
by: Mohd. Azmi, Mustafa @ Sulaiman
Published: (2004)
Virtual On-Premise Shopping System with Face Recognition Authentication
by: Yap, Choi Sen, et al.
Published: (2022)
by: Yap, Choi Sen, et al.
Published: (2022)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Similar Items
-
Classification of dividend news based on the movement of the share market prices of public listed companies in Bursa Malaysia / Shubana Vijaya Kumar
by: Shubana , Vijaya Kumar
Published: (2020) -
End-to-end delay performance for VoIP on LTE system in access network
by: Ng, Liang Shen, et al.
Published: (2013) -
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014) -
Unidirectional and bidirectional optimistic modes IP header compression for real-time video streaming
by: Bouthiba Farouq, Douma, et al.
Published: (2020) -
Fabric authenticity method using fast Fourier transformation detection
by: Norislina, Ismail, et al.
Published: (2011)