Introduction
Authentication is central to any security issue, involving the verification process of the identity of a person or a process to access a secured system. Therefore, authentication is extremely important to guarantee the smooth flow of information without troubles. Authentication process is implemente...
| Main Authors: | Kabir, M. Nomani, Alginahi, Yasser M. |
|---|---|
| Format: | Book Chapter |
| Language: | English English |
| Published: |
The Institution of Engineering and Technology (IET)
2019
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/27932/ http://umpir.ump.edu.my/id/eprint/27932/1/Chapter%201.Introduction1.pdf http://umpir.ump.edu.my/id/eprint/27932/7/nomani2019-authentication%20technologies-ch1.pdf |
Similar Items
Conclusion
by: Alginahi, Yasser M., et al.
Published: (2019)
by: Alginahi, Yasser M., et al.
Published: (2019)
Simulation of Building Evacuation: Performance Analysis and Simplified Model
by: Alginahi, Yasser M., et al.
Published: (2016)
by: Alginahi, Yasser M., et al.
Published: (2016)
Simulation of Oxidation Catalyst Converter for After-Treatment in Diesel Engines
by: M. Nomani, Kabir, et al.
Published: (2015)
by: M. Nomani, Kabir, et al.
Published: (2015)
Assessment of Wireless Technologies for deployment in Intelligent Transportation System based on Internet of Things
by: Ali, Jahan, et al.
Published: (2017)
by: Ali, Jahan, et al.
Published: (2017)
Optimal search algorithm in a big database using interpolation–extrapolation method
by: Kabir, M. Nomani, et al.
Published: (2019)
by: Kabir, M. Nomani, et al.
Published: (2019)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Analysis of a Transportation System with Correlated Network Intersections: A Case Study for a Central Urban City With High Seasonal Fluctuation Trends
by: Tayan, Omar, et al.
Published: (2017)
by: Tayan, Omar, et al.
Published: (2017)
Data Protection Laws
by: Alginahi, Hiba, et al.
Published: (2019)
by: Alginahi, Hiba, et al.
Published: (2019)
A mathematical model of lung functionality using pressure signal for volume-controlled ventilation
by: Al-Hetari, Husam Y., et al.
Published: (2020)
by: Al-Hetari, Husam Y., et al.
Published: (2020)
A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents
by: M. Nomani, Kabir, et al.
Published: (2014)
by: M. Nomani, Kabir, et al.
Published: (2014)
An Arabic Script Recognition System
by: Alginahi, Yasser M., et al.
Published: (2015)
by: Alginahi, Yasser M., et al.
Published: (2015)
A Robust Image Watermarking Technique With an Optimal DCT-Psychovisual Threshold
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
A block-based RDWT-SVD image watermarking method using human visual system characteristics
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Availability Analysis Of Shared Backup Path Protection Under Multiple-Link Failure Scenario In WDM Networks
by: Mohamed Mostafa, A. Azim, et al.
Published: (2015)
by: Mohamed Mostafa, A. Azim, et al.
Published: (2015)
Towards optimal search: a modified secant method for efficient search in a big database
by: M. Nomani, Kabir, et al.
Published: (2018)
by: M. Nomani, Kabir, et al.
Published: (2018)
Bit Allocation Strategy Based on Psychovisual Threshold in Image Compression
by: Ernawan, Ferda, et al.
Published: (2017)
by: Ernawan, Ferda, et al.
Published: (2017)
Artificial neural network modeling for predicting thermal conductivity of EG/water-based CNC nanofluid for engine cooling using different activation functions
by: Hasan, Md. Munirul, et al.
Published: (2024)
by: Hasan, Md. Munirul, et al.
Published: (2024)
A blind watermarking technique based on DCT psychovisual threshold for a robust copyright protection
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Introduction of computer systems and applications
Published: (2011)
Published: (2011)
A Performance Investigation on IoT Enabled Intra-Vehicular Wireless Sensor Networks
by: Rahman, Md. Arafatur, et al.
Published: (2017)
by: Rahman, Md. Arafatur, et al.
Published: (2017)
Numerical solution of bio-nano-convection transport from a horizontal plate with blowing and multiple slip effects
by: Uddin, Md. Jashim, et al.
Published: (2019)
by: Uddin, Md. Jashim, et al.
Published: (2019)
An Efficient Image Compression Technique using Tchebichef Bit Allocation
by: Ernawan, Ferda, et al.
Published: (2017)
by: Ernawan, Ferda, et al.
Published: (2017)
Development of a web-extension for authentication of online hadith texts
by: Kabir, M. Nomani, et al.
Published: (2018)
by: Kabir, M. Nomani, et al.
Published: (2018)
Blockchain Security Hole: Issues and Solutions
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
Introduction to E- learning
by: Aldhlan, Kawther A., et al.
Published: (2011)
by: Aldhlan, Kawther A., et al.
Published: (2011)
Staircase Detection to Guide Visually Impaired People: A Hybrid Approach
by: Habib, Ahsan, et al.
Published: (2019)
by: Habib, Ahsan, et al.
Published: (2019)
Modeling and Simulation of Emergency Evacuation from Industry Buildings under Toxic Cloud Release
by: Benseghir, Hocine, et al.
Published: (2018)
by: Benseghir, Hocine, et al.
Published: (2018)
A racial recognition method based on facial color and texture for improving demographic classification
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
IoT Enabled Intra-Vehicular Communication for Designing A Smart Car
by: Mohammad Hameez, Mat Zin, et al.
Published: (2016)
by: Mohammad Hameez, Mat Zin, et al.
Published: (2016)
On the development of a web extension for text authentication on google chrome
by: M. Nomani, Kabir, et al.
Published: (2019)
by: M. Nomani, Kabir, et al.
Published: (2019)
A secure and sustainable framework to mitigate hazardous activities in online social networks
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
Modeling lung functionality in volume-controlled ventilation for critical care patients
by: Al-Hetari, Husam Yousef, et al.
Published: (2020)
by: Al-Hetari, Husam Yousef, et al.
Published: (2020)
A novel approach towards tamper detection of digital holy Quran generation
by: Islam, Md. Milon, et al.
Published: (2020)
by: Islam, Md. Milon, et al.
Published: (2020)
Computational investigation on protein sequence of non-O157 VTEC for potentiality of vaccine production
by: Karim Khan, Md Fazlul, et al.
Published: (2020)
by: Karim Khan, Md Fazlul, et al.
Published: (2020)
A connection probability model for communications networks under regional failures
by: Kabir, M. Nomani, et al.
Published: (2018)
by: Kabir, M. Nomani, et al.
Published: (2018)
Introduction of affinity set and its application in data-mining example of delayed diagnosis
by: Chen, Yuh-Wen, et al.
Published: (2009)
by: Chen, Yuh-Wen, et al.
Published: (2009)
E-Learning: Introduction To Personal Computers/ Anwar Ahmad
by: Anwar, Ahmad
Published: (2001)
by: Anwar, Ahmad
Published: (2001)
Block-based Tchebichef image watermarking scheme using psychovisual threshold
by: Ernawan, Ferda, et al.
Published: (2017)
by: Ernawan, Ferda, et al.
Published: (2017)
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al.
by: Esmeel, Thamer Khalil, et al.
CPT104 - INTRODUCTION TO LOGIC AND ABSTRACTION MAC 05.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
Similar Items
-
Conclusion
by: Alginahi, Yasser M., et al.
Published: (2019) -
Simulation of Building Evacuation: Performance Analysis and Simplified Model
by: Alginahi, Yasser M., et al.
Published: (2016) -
Simulation of Oxidation Catalyst Converter for After-Treatment in Diesel Engines
by: M. Nomani, Kabir, et al.
Published: (2015) -
Assessment of Wireless Technologies for deployment in Intelligent Transportation System based on Internet of Things
by: Ali, Jahan, et al.
Published: (2017) -
Optimal search algorithm in a big database using interpolation–extrapolation method
by: Kabir, M. Nomani, et al.
Published: (2019)