Secure login authentication system
| Main Author: | Chow, Wen Chai |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/2855/ http://eprints.utar.edu.my/2855/1/CS%2D2018%2D1405547%2D1.pdf |
Similar Items
System login authentication using voice recognition and other AI methods / Zati Hakim Azizul Hasan
by: Zati Hakim, Azizul Hasan
Published: (2000)
by: Zati Hakim, Azizul Hasan
Published: (2000)
Smart Home Security Using Facial Authentication
by: Rakshitha, M.V., et al.
Published: (2024)
by: Rakshitha, M.V., et al.
Published: (2024)
Virtual On-Premise Shopping System with Face Recognition Authentication
by: Yap, Choi Sen, et al.
Published: (2022)
by: Yap, Choi Sen, et al.
Published: (2022)
Enhancement Of Login Process Multi-Server Conmmnication For Multimedia Conferencing System (Mcs) Using Distributed Lightweight Directory Access Protocol (Ldap).
by: Abu Saleh, Mohammad Abdelmo'ti
Published: (2010)
by: Abu Saleh, Mohammad Abdelmo'ti
Published: (2010)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Authentication Model Based on Reformation Mapping Method
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
A Secured Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Stegano-image as a digital signature to improve security authentication system in mobile computing
by: Mantoro, Teddy, et al.
Published: (2016)
by: Mantoro, Teddy, et al.
Published: (2016)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
Enhancing user authentication for cloud web-based application / Detar Beqo
by: Detar , Beqo
Published: (2018)
by: Detar , Beqo
Published: (2018)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Fingerprint Authentication System using a low-priced Webcam
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Multimodality to improve Security and Privacy in Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
A secure authentication scheme using locimetric and press touch code techniques
by: Noor Elya Afiqah, Che Nordin
Published: (2019)
by: Noor Elya Afiqah, Che Nordin
Published: (2019)
Multimodality to improve Security and Privacy in Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
AuSR2: Image watermarking technique for authentication and self-recovery with image texture preservation
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
INTI International University Campus (INTI-IU) Security Monitoring System With Face Recognition Technology
by: Yap, Choi Sen, et al.
Published: (2020)
by: Yap, Choi Sen, et al.
Published: (2020)
Fingerprint synthesis toward construct enhanced Authentication System using low resolution Webcam
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Toolchain development and queue system enhanced security coprocessor for FPGA-based internet of things (IoT) processor
by: See, Jin Chuan
Published: (2019)
by: See, Jin Chuan
Published: (2019)
Graphical user authentication system (GUAS)
by: Tan, Woei Wen
Published: (2014)
by: Tan, Woei Wen
Published: (2014)
Smart information system personal expenses advisory system
by: Lew, Wen Xiong
Published: (2018)
by: Lew, Wen Xiong
Published: (2018)
Web-based internet security / Zuriani Karia
by: Zuriani, Karia
Published: (2003)
by: Zuriani, Karia
Published: (2003)
Secure And Effective Image Authentication And Copyright Protection Using Integer Wavelet Transform
by: Ng, Ching Onn
Published: (2023)
by: Ng, Ching Onn
Published: (2023)
A Novel Protocol For Enhancing The Security Of Electronic Transaction Using Gsm Authentication
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
Network security tools-firewall / Ding Khoon Chong
by: Ding, Khoon Chong
Published: (2005)
by: Ding, Khoon Chong
Published: (2005)
Software defined networking (SDN) and its security issues
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
Analysis of Information Security Resource Requirements in Local Governments
by: Toto, Suharto, et al.
Published: (2022)
by: Toto, Suharto, et al.
Published: (2022)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
Packet sniffing system / Chan Hai Chai
by: Chan , Hai Chai
Published: (2005)
by: Chan , Hai Chai
Published: (2005)
Field Service System / Khoo Chai Ee
by: Khoo , Chai Ee
Published: (2004)
by: Khoo , Chai Ee
Published: (2004)
Anti-theft security system using face recognition
by: Chong, Guang Yu
Published: (2018)
by: Chong, Guang Yu
Published: (2018)
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
Online used car advertising system / Lim Yeng Chai
by: Lim , Yeng Chai
Published: (2003)
by: Lim , Yeng Chai
Published: (2003)
An advanced and secure framework for conducting online examination using blockchain method
by: Sattar, Md Rahat Ibne, et al.
Published: (2023)
by: Sattar, Md Rahat Ibne, et al.
Published: (2023)
PESAT application Personal Security Administrator Tool / Law Yong Jin
by: Law , Yong Jin
Published: (2004)
by: Law , Yong Jin
Published: (2004)
Similar Items
-
System login authentication using voice recognition and other AI methods / Zati Hakim Azizul Hasan
by: Zati Hakim, Azizul Hasan
Published: (2000) -
Smart Home Security Using Facial Authentication
by: Rakshitha, M.V., et al.
Published: (2024) -
Virtual On-Premise Shopping System with Face Recognition Authentication
by: Yap, Choi Sen, et al.
Published: (2022) -
Enhancement Of Login Process Multi-Server Conmmnication For Multimedia Conferencing System (Mcs) Using Distributed Lightweight Directory Access Protocol (Ldap).
by: Abu Saleh, Mohammad Abdelmo'ti
Published: (2010) -
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)