Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Currently computer systems and software used by the average user offer less security due to rapid growth of vulnerability techniques. This dissertation presents an approach to increase the level of security provided to users when interacting with otherwise unsafe applications and computing system...
| Main Author: | Mohammed, Lawan Ahmed |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2004
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/5939/ http://psasir.upm.edu.my/id/eprint/5939/1/FK_2004_47%20IR.pdf |
Similar Items
Smartcard as a payment Alternative: A Diffusion of Innovation Perspective
by: Yusman, Tina
Published: (2002)
by: Yusman, Tina
Published: (2002)
Smart Card Implementation Model
by: Lee, Chin Huat
Published: (2000)
by: Lee, Chin Huat
Published: (2000)
A study on users' perception towards cash card usage in UPM
by: Ismail, Maizatul Akmar
Published: (2001)
by: Ismail, Maizatul Akmar
Published: (2001)
Smart card : usability, transaction and problem at UiTM cafeteria (E-Cafe) / Siti Aishah Sahir
by: Sahir, Siti Aishah
Published: (2006)
by: Sahir, Siti Aishah
Published: (2006)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Effects of Authentication of Users in Mobile Internet Protocol Version 6
by: Obenofunde, Simon Tabi
Published: (2004)
by: Obenofunde, Simon Tabi
Published: (2004)
Multi-point collaborative authentication method based on user image intelligent collection in the internet of things
by: Li, Yunfa, et al.
Published: (2019)
by: Li, Yunfa, et al.
Published: (2019)
Distributed authentication for the Western Australian University Libraries
by: Green, Peter
Published: (2004)
by: Green, Peter
Published: (2004)
A Distributed Authentication Infrastructure for Western Australian Universities
by: Green, Peter, et al.
Published: (2003)
by: Green, Peter, et al.
Published: (2003)
Building a shared authentication infrastructure: a matter of trust
by: Green, Peter
Published: (2002)
by: Green, Peter
Published: (2002)
Measuring Consumer-Based Brand Authenticity
by: Napoli, Julie, et al.
Published: (2014)
by: Napoli, Julie, et al.
Published: (2014)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
The fantasy of authenticity: touring with Lacan
by: Knudsen, Daniel C., et al.
Published: (2016)
by: Knudsen, Daniel C., et al.
Published: (2016)
Enhancement of student learning and attitude towards mathematics through authentic learning experiences
by: Blum, Kathleen Mary
Published: (2002)
by: Blum, Kathleen Mary
Published: (2002)
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Aplikasi kad pintar di UTeM
Published: (2008)
Published: (2008)
An empirical investigation of pricing and competition in the UK credit card market
by: Knight, Helen Julie
Published: (2010)
by: Knight, Helen Julie
Published: (2010)
Authenticity and Diversity: Enhancing Australian Hepatitis C Prevention Messages
by: Winter, R., et al.
Published: (2013)
by: Winter, R., et al.
Published: (2013)
Chinese Credit Card Interest Rate: Recent Credit Card Pricing Model Progress and the Comparative Study
by: Wang, Ting
Published: (2008)
by: Wang, Ting
Published: (2008)
Authentic assessment and the Internet: contributions within knowledge networks
by: Allen, Matthew
Published: (2009)
by: Allen, Matthew
Published: (2009)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
The implementation of authentic activities for learning: a case study
by: Baccarini, David
Published: (2004)
by: Baccarini, David
Published: (2004)
Giving virtual world learning a pedagogical boost with a gamified authentic learning design
by: Teräs, H., et al.
Published: (2014)
by: Teräs, H., et al.
Published: (2014)
Testing the Role of Authenticity in Cultural Tourism Consumption: A Case of Mauritius
by: Ramkissoon, Haywantee, et al.
Published: (2010)
by: Ramkissoon, Haywantee, et al.
Published: (2010)
Contesting authentic practice and ethical authority in adventure tourism
by: Rickly, J.M., et al.
Published: (2017)
by: Rickly, J.M., et al.
Published: (2017)
Getting real in the language classroom: developing Japanese students' communicative competence with authentic materials
by: Gilmore, Alexander
Published: (2008)
by: Gilmore, Alexander
Published: (2008)
Musical stage theory: a novel account for the ontology of musical works and the authenticity of music
by: Moruzzi, Caterina
Published: (2018)
by: Moruzzi, Caterina
Published: (2018)
Incongruity between pedagogy of authenticity and contemporary educational apparatus: person-centred phenomenological studies
by: Plust, Urszula
Published: (2023)
by: Plust, Urszula
Published: (2023)
Delusions of grandeur? Aria and the development of Soviet metal music
by: Hazle, Dawn
Published: (2018)
by: Hazle, Dawn
Published: (2018)
Operationalising gamification in an educational authentic environment
by: Reiners, Torsten, et al.
Published: (2012)
by: Reiners, Torsten, et al.
Published: (2012)
Framework for evaluating suitability of graphical user authentication for mobile banking
by: Kingsley Ugochukwu, Ejike Ekeke
Published: (2016)
by: Kingsley Ugochukwu, Ejike Ekeke
Published: (2016)
The politics of protest in newspaper campaigns:
dissent, populism and the rhetoric of authenticity
by: Birks, Jen
Published: (2011)
by: Birks, Jen
Published: (2011)
Influence of positive organisational behaviour and authentic leadership towards organisational performance: a case study
by: Chay, Guo Wei
Published: (2020)
by: Chay, Guo Wei
Published: (2020)
Security and performance enhancement of authentication protocols in heterogeneous wireless networks
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
Internet - Based Security and Monitoring System
by: Suliman, Isameldin Mohammed
Published: (1998)
by: Suliman, Isameldin Mohammed
Published: (1998)
Developing Authentic and Virtual E-Learning Environments
by: Veenendaal, Bert, et al.
Published: (2005)
by: Veenendaal, Bert, et al.
Published: (2005)
The determinants of individual perception towards debit card product consumption in Malaysia / Adilah Md. Nor
by: Md. Nor, Adilah
Published: (2011)
by: Md. Nor, Adilah
Published: (2011)
Efficient, Authentication and Access control Implementation in Mobile Ad hoc Networks (MANET) as applied to Indoor Navigation Guidance System for Vision Impaired People
by: Rupasinghe, Prabath, et al.
Published: (2012)
by: Rupasinghe, Prabath, et al.
Published: (2012)
A framework of authentication and authorization for e-health services
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Similar Items
-
Smartcard as a payment Alternative: A Diffusion of Innovation Perspective
by: Yusman, Tina
Published: (2002) -
Smart Card Implementation Model
by: Lee, Chin Huat
Published: (2000) -
A study on users' perception towards cash card usage in UPM
by: Ismail, Maizatul Akmar
Published: (2001) -
Smart card : usability, transaction and problem at UiTM cafeteria (E-Cafe) / Siti Aishah Sahir
by: Sahir, Siti Aishah
Published: (2006) -
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)