Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
The Internet is a powerful tool in today's ever-growing society. Computer Information and Internet security has recently become a popular subject due to the explosive growth of the Internet and the migration of commerce practices to the electronic medium. We use the Internet for many things,...
| Main Author: | H. Belgassem, Seddeq |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2004
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/5953/ http://psasir.upm.edu.my/id/eprint/5953/1/FK_2004_67%20IR.pdf |
Similar Items
Internet - Based Security and Monitoring System
by: Suliman, Isameldin Mohammed
Published: (1998)
by: Suliman, Isameldin Mohammed
Published: (1998)
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018)
by: Iranmanesh, Vahab
Published: (2018)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Predicting online safety behavior based on health belief model with internet literacy and gender as moderators
by: Abkooh, Elaheh Taheri
Published: (2016)
by: Abkooh, Elaheh Taheri
Published: (2016)
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016)
by: Xie, Zeqiang
Published: (2016)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
Development of Security Identification and Monitoring System for Web Application
by: Dani, Norizawati
Published: (1999)
by: Dani, Norizawati
Published: (1999)
Kesedaran dan amalan keselamatan siber dalam kalangan pengguna internet di Malaysia
by: Pitchan, Muhammad Adnan
Published: (2017)
by: Pitchan, Muhammad Adnan
Published: (2017)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
New compendium of RSA vulnerabilities
by: Abd Ghafar, Amir Hamzah
Published: (2020)
by: Abd Ghafar, Amir Hamzah
Published: (2020)
Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network
by: Ng, Roger Cheng Yong
Published: (2006)
by: Ng, Roger Cheng Yong
Published: (2006)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019)
by: Shojaee, Somayeh
Published: (2019)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
by: Abiodun, Balogun Kamoru
Published: (2021)
by: Abiodun, Balogun Kamoru
Published: (2021)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
by: Javan, Ali
Published: (2011)
by: Javan, Ali
Published: (2011)
Electronic Book of Network Security: Introduction to Network Security
by: Hoo, Cheong Yee
Published: (2003)
by: Hoo, Cheong Yee
Published: (2003)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
Character property method with biometric multifactor authentication for arabic text steganography
by: Roslan, Nuur Alifah
Published: (2018)
by: Roslan, Nuur Alifah
Published: (2018)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Bandwidth Performance Analysis of a Remote Monitoring Surveillance System
by: Syed Nor Azlan, Syarifah Ezdiani
Published: (2006)
by: Syed Nor Azlan, Syarifah Ezdiani
Published: (2006)
Security Improvement of Unicast Management Frames In Ieee 802.11 Mac Layer
by: Malekzadeh, Mina
Published: (2007)
by: Malekzadeh, Mina
Published: (2007)
Adaptive artificial neural network for power system security assessment and control action
by: Al-Masri, Ahmed Naufal A.
Published: (2012)
by: Al-Masri, Ahmed Naufal A.
Published: (2012)
Water security and sustainable tourism as antecedents of local community’s quality of life in Mabul Island, Malaysia
by: Khairuddin, Fatin Nornajla
Published: (2019)
by: Khairuddin, Fatin Nornajla
Published: (2019)
Development of Pc-Based Multi-Channel Measurement Unit
by: Omer, Abdu Idris
Published: (1997)
by: Omer, Abdu Idris
Published: (1997)
Development of a Dual Frequency Microwave Moisture Sensor System Based Circular Microstrip Antenna
by: Ghretli, Mohamed Mustafa
Published: (2005)
by: Ghretli, Mohamed Mustafa
Published: (2005)
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
by: Mustafa, Mohd Nawawi
Published: (2015)
by: Mustafa, Mohd Nawawi
Published: (2015)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
by: Mohd Nasir, Rinie Narinie
Published: (2015)
by: Mohd Nasir, Rinie Narinie
Published: (2015)
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
by: Abdulkader, Zaid A.
Published: (2018)
by: Abdulkader, Zaid A.
Published: (2018)
An experimental evaluation of DoS attack and its impact on throughput of IEEE 802.11 wireless networks
by: Malekzadeh, Mina, et al.
Published: (2008)
by: Malekzadeh, Mina, et al.
Published: (2008)
Development of an Internet–Based System to Measure Thermal Comfort in Indoor Environments
by: Sanbasivam, Sivasankar
Published: (2006)
by: Sanbasivam, Sivasankar
Published: (2006)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Minimising coverage holes for prediction-based mobile object target tracking in wireless sensor networks
by: Ali, Khalid Abdullahi
Published: (2017)
by: Ali, Khalid Abdullahi
Published: (2017)
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
by: Malekzadeh, Mina
Published: (2011)
by: Malekzadeh, Mina
Published: (2011)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
Protecting network with Cisco solution
Published: (2008)
Published: (2008)
Security Enhancement of Route Optimization in Mobile IPv6 Networks
by: Zare Anari, Abbas Mehdizadeh
Published: (2008)
by: Zare Anari, Abbas Mehdizadeh
Published: (2008)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
by: Khalid, Roszelinda
Published: (2018)
by: Khalid, Roszelinda
Published: (2018)
Optical Transmission-Based Water Turbidity Measurement System
by: Ahmad Shauri, Ruhizan Liza
Published: (2006)
by: Ahmad Shauri, Ruhizan Liza
Published: (2006)
Similar Items
-
Internet - Based Security and Monitoring System
by: Suliman, Isameldin Mohammed
Published: (1998) -
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018) -
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022) -
Predicting online safety behavior based on health belief model with internet literacy and gender as moderators
by: Abkooh, Elaheh Taheri
Published: (2016) -
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016)