An improved user authentication model for mobile application systems
In today’s digital communication era, people around the world can conveniently communicate with each other at any time and any places by just using mobile phones. Besides making phone calls and sending messages, mobile phones can also be used to download many interesting and useful apps for perso...
| Main Author: | Mohamed, Kartini |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2017
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/68736/ http://psasir.upm.edu.my/id/eprint/68736/1/68736.pdf |
Similar Items
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
Smart gate mobile application in residential area Putra Perdana using geofencing / Maisarah Mahazil
by: Mahazil, Maisarah
Published: (2020)
by: Mahazil, Maisarah
Published: (2020)
Secure authentication for sensitive digital systems in mobile devices
by: Hussein, Khalid Waleed
Published: (2016)
by: Hussein, Khalid Waleed
Published: (2016)
Strengthening user authentication for better protection of mobile application systems
by: Mohamed, Kartini, et al.
Published: (2016)
by: Mohamed, Kartini, et al.
Published: (2016)
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
by: Mustafa, Mohd Nawawi
Published: (2015)
by: Mustafa, Mohd Nawawi
Published: (2015)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Adaptive artificial neural network for power system security assessment and control action
by: Al-Masri, Ahmed Naufal A.
Published: (2012)
by: Al-Masri, Ahmed Naufal A.
Published: (2012)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
Designing and developing mobile application for college resident / Muhammad Amirul Aizat Mohd Rosdi
by: Mohd Rosdi, Muhammad Amirul Aizat
Published: (2020)
by: Mohd Rosdi, Muhammad Amirul Aizat
Published: (2020)
Understanding smartphone users' awareness of security and privacy in downloading third-party applications - A survey in UK and Japan
by: Kawakubo, Noriko
Published: (2013)
by: Kawakubo, Noriko
Published: (2013)
Porting process model for mobile application
by: Rajadorai @ Rajoo, Kesava Pillai
Published: (2017)
by: Rajadorai @ Rajoo, Kesava Pillai
Published: (2017)
Developing mobile application for event information dissemination (Campus Shout Out) / Mohamad Idham Md Sharif
by: Md Sharif, Mohamad Idham
Published: (2020)
by: Md Sharif, Mohamad Idham
Published: (2020)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
by: Javan, Ali
Published: (2011)
by: Javan, Ali
Published: (2011)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
by: Abiodun, Balogun Kamoru
Published: (2021)
by: Abiodun, Balogun Kamoru
Published: (2021)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
by: Mohd Nasir, Rinie Narinie
Published: (2015)
by: Mohd Nasir, Rinie Narinie
Published: (2015)
Security Improvement of Unicast Management Frames In Ieee 802.11 Mac Layer
by: Malekzadeh, Mina
Published: (2007)
by: Malekzadeh, Mina
Published: (2007)
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019)
by: Shojaee, Somayeh
Published: (2019)
Improving malicious detection rate for Facebook application in OSN platform
by: Angamuthu, Laavanya
Published: (2018)
by: Angamuthu, Laavanya
Published: (2018)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
by: Hydara, Isatou
Published: (2015)
by: Hydara, Isatou
Published: (2015)
Student Assistance Application (SAA) based on user availability and distance / Amin Shafiq Mohd Zuki
by: Mohd Zuki, Amin Shafiq
Published: (2017)
by: Mohd Zuki, Amin Shafiq
Published: (2017)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
“Kuliah Agama” notification based on location via mobile application / Mohamad Akmal Shukri Mahmud
by: Mahmud, Mohamad Akmal Shukri
Published: (2015)
by: Mahmud, Mohamad Akmal Shukri
Published: (2015)
Announcement system using wap over bluetooth / Azhan Ezra Abdul Aziz
by: Abdul Aziz, Azhan Ezra
Published: (2006)
by: Abdul Aziz, Azhan Ezra
Published: (2006)
Parent monitoring mobile application with geofencing / Muhammad Aizuddin Mohd Adha
by: Mohd Adha, Muhammad Aizuddin
Published: (2019)
by: Mohd Adha, Muhammad Aizuddin
Published: (2019)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
Mobile application of nutrition information on malay breakfast (NIMB) / Muhammad Khairuddin Abd. Mutalib
by: Muhammad Khairuddin, Abd. Mutalib
Published: (2011)
by: Muhammad Khairuddin, Abd. Mutalib
Published: (2011)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
by: Khalid, Roszelinda
Published: (2018)
by: Khalid, Roszelinda
Published: (2018)
Watermark blending technique for securing user authentication data in mobile application systems
by: Mohamed, Kartini, et al.
Published: (2019)
by: Mohamed, Kartini, et al.
Published: (2019)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
A study on the effectiveness of new applications by providing up-to-date real time information guide for user of GoKL city bus / Nor Hasliny Rusli
by: Rusli, Nor Hasliny
Published: (2018)
by: Rusli, Nor Hasliny
Published: (2018)
Evaluating usability of mobile application for Dyslexia disability
by: Muhamad, Suhazli
Published: (2018)
by: Muhamad, Suhazli
Published: (2018)
Queue management mobile application with geo-fencing / Muhammad Aminuddin Abdul Basir
by: Abdul Basir, Muhammad Aminuddin
Published: (2019)
by: Abdul Basir, Muhammad Aminuddin
Published: (2019)
Enhancing the strength of user's authentication using multifactor approach for use in mobile application system
by: Mohamed, Kartini, et al.
Published: (2015)
by: Mohamed, Kartini, et al.
Published: (2015)
Mobile balanced and healthy diet on android system / Mohamad Khairul Amir Zaidan
by: Zaidan, Mohamad Khairul Amir
Published: (2015)
by: Zaidan, Mohamad Khairul Amir
Published: (2015)
Scientific forensic framework for smartphones
by: Shahpasand, Maryam
Published: (2015)
by: Shahpasand, Maryam
Published: (2015)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Similar Items
-
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024) -
Smart gate mobile application in residential area Putra Perdana using geofencing / Maisarah Mahazil
by: Mahazil, Maisarah
Published: (2020) -
Secure authentication for sensitive digital systems in mobile devices
by: Hussein, Khalid Waleed
Published: (2016) -
Strengthening user authentication for better protection of mobile application systems
by: Mohamed, Kartini, et al.
Published: (2016) -
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
by: Mustafa, Mohd Nawawi
Published: (2015)