Secure authentication for sensitive digital systems in mobile devices
| Main Author: | Hussein, Khalid Waleed |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/92130/ http://psasir.upm.edu.my/id/eprint/92130/1/FSKTM%202016%2019%20UPM.pdf |
Similar Items
Strengthening user authentication for better protection of mobile application systems
by: Mohamed, Kartini, et al.
Published: (2016)
by: Mohamed, Kartini, et al.
Published: (2016)
A relay attack for host-based card emulation (HCE) using NFC-enabled device for mobile payment
by: Che Hasan, Hafizah
Published: (2018)
by: Che Hasan, Hafizah
Published: (2018)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
by: Shaukat, Haafizah Rameeza
Published: (2014)
by: Shaukat, Haafizah Rameeza
Published: (2014)
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
by: Alomari, Mohammad Ahmed Mohammad
Published: (2017)
by: Alomari, Mohammad Ahmed Mohammad
Published: (2017)
An improved user authentication model for mobile application systems
by: Mohamed, Kartini
Published: (2017)
by: Mohamed, Kartini
Published: (2017)
Performance Modelling for Mobile Cellular Network Using Queueing System
by: Basi, Hussein Muzahim Aziz
Published: (1999)
by: Basi, Hussein Muzahim Aziz
Published: (1999)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Digital forensics framework for investigating client cloud storage applications on smartphones
by: Daryabar, Farid
Published: (2015)
by: Daryabar, Farid
Published: (2015)
Sharp-Edges Steganography in Arabic Characters for Information Hiding
by: Roslan, Nuur Alifah
Published: (2011)
by: Roslan, Nuur Alifah
Published: (2011)
Data caching framework and strategies for integrity constraint checking in mobile database system
by: Dzolkhifli, Zarina
Published: (2012)
by: Dzolkhifli, Zarina
Published: (2012)
Blockchain based security framework for device authentication and data communication in decentralized IoT network
by: Alahmed, Mahmoud Tayseer
Published: (2023)
by: Alahmed, Mahmoud Tayseer
Published: (2023)
Secure lightweight client for cloud-based E-Health Model
by: Zhang, Xiaowei
Published: (2023)
by: Zhang, Xiaowei
Published: (2023)
Scientific forensic framework for smartphones
by: Shahpasand, Maryam
Published: (2015)
by: Shahpasand, Maryam
Published: (2015)
Grid-based multi-touch gesture to enhance two-factor authentication graphical password for mobile phones
by: Zabidi, Nur Syabila
Published: (2021)
by: Zabidi, Nur Syabila
Published: (2021)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
Seamless and secure handover scheme in mobile WiMAX
by: Rashid, Hamzah Fareed
Published: (2015)
by: Rashid, Hamzah Fareed
Published: (2015)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
Mobility management schemes based on multiple criteria for optimization of seamless handover in long term evolution networks
by: Hussein, Yassein Soubhi
Published: (2014)
by: Hussein, Yassein Soubhi
Published: (2014)
Route Optimisation For Mobile Ipv6
by: Yahaya, Coulibaly
Published: (2002)
by: Yahaya, Coulibaly
Published: (2002)
Privacy-preserving computer forensics framework
by: Halboob, Waleed Abduljabbar
Published: (2015)
by: Halboob, Waleed Abduljabbar
Published: (2015)
Hybrid cryptography algorithm to improve security cloud storage
by: Abd Almohsen, Inam Razzaq
Published: (2017)
by: Abd Almohsen, Inam Razzaq
Published: (2017)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
Secure electronic commerce with mobile agents
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
The effectiveness of safety and security at shopping malls / Mohd Haris Mustafar
by: Mustafar, Mohd Haris
Published: (2009)
by: Mustafar, Mohd Haris
Published: (2009)
Adaptive artificial neural network for power system security assessment and control action
by: Al-Masri, Ahmed Naufal A.
Published: (2012)
by: Al-Masri, Ahmed Naufal A.
Published: (2012)
User requirement evaluation of channel coding schemes for 5G mobile communication system in transmitting short length messages
by: Hajiyat, Zahraa Raad Mayoof
Published: (2019)
by: Hajiyat, Zahraa Raad Mayoof
Published: (2019)
Robust communication in differential relay protection using wireless technique
by: Badar, Malik Qasim
Published: (2015)
by: Badar, Malik Qasim
Published: (2015)
Participant experiences of mobile device-based diary studies
by: Sun, Xu, et al.
Published: (2013)
by: Sun, Xu, et al.
Published: (2013)
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019)
by: Shojaee, Somayeh
Published: (2019)
Reputation aware obfuscation for mobile opportunistic networks
by: Radenkovic, Milena, et al.
Published: (2015)
by: Radenkovic, Milena, et al.
Published: (2015)
A reliable unicast routing protocol for mobile ad hoc network
by: Sargolzaey, Hadi
Published: (2013)
by: Sargolzaey, Hadi
Published: (2013)
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016)
by: Xie, Zeqiang
Published: (2016)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
by: Marzook, Ali Kamil
Published: (2013)
by: Marzook, Ali Kamil
Published: (2013)
Security Improvement of Unicast Management Frames In Ieee 802.11 Mac Layer
by: Malekzadeh, Mina
Published: (2007)
by: Malekzadeh, Mina
Published: (2007)
Character property method with biometric multifactor authentication for arabic text steganography
by: Roslan, Nuur Alifah
Published: (2018)
by: Roslan, Nuur Alifah
Published: (2018)
Dasar Keselamatan ICT Universiti Teknologi MARA / Pejabat Infrastruktur dan Infostruktur, UiTM
by: UiTM, Pejabat Infrastruktur dan Infostruktur
Published: (2018)
by: UiTM, Pejabat Infrastruktur dan Infostruktur
Published: (2018)
Remote Patient Monitoring System Using WLAN-Enabled Mobile Phones in Tikrit Educational Hospital
by: Hussein, Harith A.
Published: (2009)
by: Hussein, Harith A.
Published: (2009)
Similar Items
-
Strengthening user authentication for better protection of mobile application systems
by: Mohamed, Kartini, et al.
Published: (2016) -
A relay attack for host-based card emulation (HCE) using NFC-enabled device for mobile payment
by: Che Hasan, Hafizah
Published: (2018) -
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018) -
Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
by: Shaukat, Haafizah Rameeza
Published: (2014) -
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
by: Alomari, Mohammad Ahmed Mohammad
Published: (2017)