Strengthening user authentication for better protection of mobile application systems
For most of us now, life is incomplete if living without mobile phones. This is because mobile phones are like a necessity to many people nowadays. Statistics have shown that more than seven billion people in the world are having these devices in 2015. This also means 97% of the human world populati...
| Main Authors: | Mohamed, Kartini, A. Jabar, Marzanah, Ishak, Iskandar, Salimin, Norahana, Salleh, Nor Safwan Amirul, Hamzah, Abdul Qaiyum, Jarno, Ahmad Dahari, Pauzi, Muhamad Faeez |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Little Lion Scientific R&D
2016
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/53899/ http://psasir.upm.edu.my/id/eprint/53899/1/Strengthening%20user%20authentication%20for%20better%20protection%20of%20mobile%20application%20systems.pdf |
Similar Items
Two-round relay selection and joint massive MIMO transmission technique to enhance wireless information and power transfer
by: Oussama, Messadi
Published: (2021)
by: Oussama, Messadi
Published: (2021)
Multicast-unicast key management and data delivery method in wireless IPv6 networks
by: Zare Anari, Abbas Mehdizadeh
Published: (2012)
by: Zare Anari, Abbas Mehdizadeh
Published: (2012)
Performance enhancement of high data rate real-time wireless transmission system using superposition coding and unequal error protection
by: Al-Hasan, Yaseen Hasan Tahir
Published: (2011)
by: Al-Hasan, Yaseen Hasan Tahir
Published: (2011)
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
A framework of authentication and authorization for e-health services
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Multi-channel support for data-gathering trees in wireless sensor networks
by: Alfraihat, Wasan Ahmad Sulieman
Published: (2010)
by: Alfraihat, Wasan Ahmad Sulieman
Published: (2010)
Implementation of Data Transmission Using X-10 Protocol within Household Wiring
by: Tan, Lay Khim
Published: (2007)
by: Tan, Lay Khim
Published: (2007)
Value-adding mobile payment services
Published: (2009)
Published: (2009)
Parametric analysis of a double E-shaped meander line monopole antenna for UHF applications / Nabilah Ripin … [et al.]
by: Ripin, Nabilah, et al.
Published: (2017)
by: Ripin, Nabilah, et al.
Published: (2017)
The disruptions and the opportunities in FinTech / Ilham Adli Azahar.
by: Azahar, Ilham Adli
Published: (2019)
by: Azahar, Ilham Adli
Published: (2019)
Efficient beamforming and spectral efficiency maximization in a joint transmission LTE-A system
by: Faisal, Ali Raed
Published: (2016)
by: Faisal, Ali Raed
Published: (2016)
Mobile application of nutrition information on malay breakfast (NIMB) / Muhammad Khairuddin Abd. Mutalib
by: Muhammad Khairuddin, Abd. Mutalib
Published: (2011)
by: Muhammad Khairuddin, Abd. Mutalib
Published: (2011)
Distributed authentication for the Western Australian University Libraries
by: Green, Peter
Published: (2004)
by: Green, Peter
Published: (2004)
Physical characteristics of plasma monopole antenna constructed through rf charging of different gases / Nur Aina Halili
by: Halili, Nur Aina
Published: (2015)
by: Halili, Nur Aina
Published: (2015)
A Distributed Authentication Infrastructure for Western Australian Universities
by: Green, Peter, et al.
Published: (2003)
by: Green, Peter, et al.
Published: (2003)
Participant experiences of mobile device-based diary studies
by: Sun, Xu, et al.
Published: (2013)
by: Sun, Xu, et al.
Published: (2013)
Multi-point collaborative authentication method based on user image intelligent collection in the internet of things
by: Li, Yunfa, et al.
Published: (2019)
by: Li, Yunfa, et al.
Published: (2019)
Building a shared authentication infrastructure: a matter of trust
by: Green, Peter
Published: (2002)
by: Green, Peter
Published: (2002)
Design and analysis of a dynamic code division multiple access communication system based on tunable optical filter
by: Hamarsheh, Mohammad M. Naji, et al.
Published: (2005)
by: Hamarsheh, Mohammad M. Naji, et al.
Published: (2005)
Design of Data Transceiver Using Differential Quaternary Phase Shift Keying (DQPSK) Modulation Technique
by: Chuah, Khar Yee
Published: (1996)
by: Chuah, Khar Yee
Published: (1996)
Robust communication in differential relay protection using wireless technique
by: Badar, Malik Qasim
Published: (2015)
by: Badar, Malik Qasim
Published: (2015)
Encryption selection for WLAN IEEE802.11G
by: Ahmad, Zahrol Azam
Published: (2013)
by: Ahmad, Zahrol Azam
Published: (2013)
Computerized maintenance management system / Nur Naeliya Tamyes
by: Nur Naeliya, Tamyes
Published: (2019)
by: Nur Naeliya, Tamyes
Published: (2019)
The fantasy of authenticity: touring with Lacan
by: Knudsen, Daniel C., et al.
Published: (2016)
by: Knudsen, Daniel C., et al.
Published: (2016)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Bandwidth Enhancement of Microstrip Antenna for Wireless Local Area Network Applications
by: Doraisingam, Yoharaaj
Published: (2007)
by: Doraisingam, Yoharaaj
Published: (2007)
Developing the ZigBee Based Data Payload Coding for Data Communication in Microgrids
by: Setiawan, M., et al.
Published: (2014)
by: Setiawan, M., et al.
Published: (2014)
Integration of Services Onto Synchronous Digital Hierarchy Line Utilizing Wavelength Division Multiplexing
by: Ali @ Hasim, Norshamsuri
Published: (2005)
by: Ali @ Hasim, Norshamsuri
Published: (2005)
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
by: Mohammed Alaidaros, Hashem
Published: (2007)
by: Mohammed Alaidaros, Hashem
Published: (2007)
Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol
by: Zazali, Azyyati Adiah
Published: (2024)
by: Zazali, Azyyati Adiah
Published: (2024)
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
by: Mohammed, Lawan Ahmed
Published: (2004)
by: Mohammed, Lawan Ahmed
Published: (2004)
Traffic Adaptive Schedule-Based Mac Protocol For Wireless sensor Networks
by: Vahabi, Maryam
Published: (2008)
by: Vahabi, Maryam
Published: (2008)
Efficient and secured compression and steganography technique in wireless sensor network
by: Tuama, Ammar Yaseen
Published: (2016)
by: Tuama, Ammar Yaseen
Published: (2016)
Recognition of Diabetic Retinopathy / Farrah Murni Syamirah Mohd Affizan
by: Mohd Affizan, Farrah Murni Syamirah
Published: (2020)
by: Mohd Affizan, Farrah Murni Syamirah
Published: (2020)
Data Communication Network and its Delay Effect on the Dynamic Operation of Distributed Generation Units in a Microgrid
by: Setiawan, M., et al.
Published: (2014)
by: Setiawan, M., et al.
Published: (2014)
ZigBee-based communication system for data transfer within future microgrids
by: Setiawan, M., et al.
Published: (2015)
by: Setiawan, M., et al.
Published: (2015)
Different Power Sharing Techniques for Converter-Interfaced DERs in an Autonomous Microgrid
by: Hosseini Mehr, T., et al.
Published: (2014)
by: Hosseini Mehr, T., et al.
Published: (2014)
Measuring Consumer-Based Brand Authenticity
by: Napoli, Julie, et al.
Published: (2014)
by: Napoli, Julie, et al.
Published: (2014)
An ICT-supported intergenerational knowledge transfer framework for family firms / Sabiroh Md Sabri
by: Md Sabri, Sabiroh
Published: (2017)
by: Md Sabri, Sabiroh
Published: (2017)
Highly efficient magnetic resonance coupling wireless power transfer for 5G applications
by: Kamarudin, Saidatul Izyanie
Published: (2021)
by: Kamarudin, Saidatul Izyanie
Published: (2021)
Similar Items
-
Two-round relay selection and joint massive MIMO transmission technique to enhance wireless information and power transfer
by: Oussama, Messadi
Published: (2021) -
Multicast-unicast key management and data delivery method in wireless IPv6 networks
by: Zare Anari, Abbas Mehdizadeh
Published: (2012) -
Performance enhancement of high data rate real-time wireless transmission system using superposition coding and unequal error protection
by: Al-Hasan, Yaseen Hasan Tahir
Published: (2011) -
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010) -
A framework of authentication and authorization for e-health services
by: Han, Song, et al.
Published: (2006)