Unreliable Network Re-Authentication Protocol Based On Hybrid Key Using CSP Approach.
Network security is becoming increasingly vital in today's fast growing mobile computing environment. Due to constraints in device size and portability, limited processing power, small disk capacity, intermittent network disconnections and frequent switching between network access points have b...
| Main Authors: | Ramadass, Sureswaran, Budiarto, Rahmat, Ho, Cheah Luan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Dr. Sang H. Lee
2007
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/9678/ http://eprints.usm.my/9678/1/Unreliable_Network_Re-Authentication_Protocol_Based_CSP_Approach.pdf |
Similar Items
A Framework For Detecting Bluetooth Mobile Worms.
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
Dawn Of The Mobile Malware: Reviewing Mobile Worms .
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
Development Of Penetration Testing Model For Increasing Network Security.
by: Budiarto, Rahmat, et al.
Published: (2004)
by: Budiarto, Rahmat, et al.
Published: (2004)
POSFinger: A New Fingerprint For Passive Remote Operating System Identification.
by: Manasrah, Ahmad, et al.
Published: (2007)
by: Manasrah, Ahmad, et al.
Published: (2007)
High Performance Network Worm Detection Engine Using Memory Efficient Circular Buffer.
by: Budiarto, Rahmat, et al.
Published: (2007)
by: Budiarto, Rahmat, et al.
Published: (2007)
A Study on Techniques for Handling Transmission Error of IPV6 Packets over Fmer Optic Links
by: Budiarto, Rahmat, et al.
Published: (2010)
by: Budiarto, Rahmat, et al.
Published: (2010)
CSP202-CSP204 - PENGKOMPUTERAN SAINTIFIK - APRIL 1987.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1987)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1987)
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004)
by: Ooi, Bee Sien, et al.
Published: (2004)
CSP 101 - Pengantar Sains Komputeran
by: PPSM, Pusat Pengajian Sains Matematik
Published: (1988)
by: PPSM, Pusat Pengajian Sains Matematik
Published: (1988)
CSP 102 - Algoritma & Struktur Data I
by: PPSM, Pusat Pengajian Sains Matematik
Published: (1988)
by: PPSM, Pusat Pengajian Sains Matematik
Published: (1988)
CSP 102 - ALGORITMA & STRUKTUR DATA JUN 1990
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1990)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1990)
CSP 301 - BAHASA PEMPROGRAMAN OKT-NOV 1989
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1989)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1989)
CSP 401 - GRAFIK KOMPUTER OKT-NOV 1989
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1989)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1989)
CSP 402 - KECERDASAN BUATAN OKT-NOV 1989
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1989)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1989)
CSP 301 - BAHASA PEMPROGRAMAN NOV 1987-88.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1987)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1987)
CSP 401 - GRAFIK KOMPUTER NOV 1987-88.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1987)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1987)
CSP 401 - GRAFIK KOMPUTER OKT - NOV 94.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1994)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1994)
CSP101 - PENGANTAR SAINS KOMPUTERAN - JUN 1989.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1989)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1989)
CSP101 - PENGANTAR SAINS KOMPUTERAN - OKTOBER 1988.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1988)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1988)
CSP 101 - PENGANTAR SAINS KOMPUTERAN OKT-NOV 1989
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1989)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1989)
CSP 101 - PENGANTAR SAINS KOMPUTERAN OKT - NOV 94.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1994)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1994)
CSP 101 PENGANTAR SAINS KOMPUTERAN OKT 1987-88.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1987)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1987)
CSP101 - PENGANTAR SAINS KOMPUTERAN - OKT-NOVEMBER 1991.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1991)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1991)
CSD2 02/CSP 203 Organisasi Pangkalan Data
by: PPSM, Pusat Pengajian Sains Matematik
Published: (1988)
by: PPSM, Pusat Pengajian Sains Matematik
Published: (1988)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
A New Approach to Enhance E-mail Performance through POP3 Protocol
by: Al Bazar, Hussein, et al.
Published: (2008)
by: Al Bazar, Hussein, et al.
Published: (2008)
CSP 102 - ALGORITMA & STRUKTUR DATA I MAC-APRIL 1989
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1990)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1990)
CSP 102 - ALGORITMA & STRUKTUR DATA I MAC-APRIL 1991
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1991)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1991)
CSP 202-CSK 203 - KOMPUTERAN SAINTIFIK APRIL 1992.pdf
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1992)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1992)
CSA 412/CSP 401 - GRAFIK KOMPUTER MAC-APR 1996.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1996)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1996)
CSE 401/CSP 402 - KECERDASAN BUATAN OKT-NOV 1995.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1995)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1995)
CSE401/CSP402 - Kecerdasan Buatan Oktober/November 1995
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1995)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1995)
Hybrid Hierarchical Approach For Addressing Service
Discovery Issues In MANETS.
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
CSP 102 - ALGORITMA DAN STRUKTUR DATA I MAC-APRIL 1990
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1990)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1990)
CSP 201 - ALGORITMA DAN STRUKTUR DATA II OKT-NOV 1989
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1989)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1989)
CSP 201 - ALGORITMA DAN STRUKTUR DATA II OKT 1987-88.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1987)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1987)
Future Internet With IPv6.
by: Budiarto, Rahmat
Published: (2009)
by: Budiarto, Rahmat
Published: (2009)
New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Similar Items
-
A Framework For Detecting Bluetooth Mobile Worms.
by: Sarwar, Usman, et al.
Published: (2007) -
Dawn Of The Mobile Malware: Reviewing Mobile Worms .
by: Sarwar, Usman, et al.
Published: (2007) -
Development Of Penetration Testing Model For Increasing Network Security.
by: Budiarto, Rahmat, et al.
Published: (2004) -
POSFinger: A New Fingerprint For Passive Remote Operating System Identification.
by: Manasrah, Ahmad, et al.
Published: (2007) -
High Performance Network Worm Detection Engine Using Memory Efficient Circular Buffer.
by: Budiarto, Rahmat, et al.
Published: (2007)