Enhancement of a simple user authentication scheme for grid computing
Grid computing means a multiple independent computing, because it is composed of resource nodes not located within a single administrative domain. The goal of grid is to only provide secure grid service resources to legal users. Even though grid computing is more than just a technology to abet high...
| Main Author: | Ramamoorthy, Viknesh |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/9591/ http://eprints.utm.my/9591/1/VikneshRamamoorthyMFSKSM2008.pdf |
Similar Items
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
by: Lim, Tsu Chean, et al.
Published: (2018)
by: Lim, Tsu Chean, et al.
Published: (2018)
Bilinear-pairing-based remote user authentication schemes using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Enhancing user authentication for cloud web-based application / Detar Beqo
by: Detar , Beqo
Published: (2018)
by: Detar , Beqo
Published: (2018)
Simple Authentication Scheme for Personal Digital Assistants using the Hidden Markov Model ToolKit
by: Ching, Ho Chiung, et al.
Published: (2007)
by: Ching, Ho Chiung, et al.
Published: (2007)
Grid computing is a work in progress
by: Oxley, A.
Published: (2009)
by: Oxley, A.
Published: (2009)
Rivisit grid computing security
by: Ismail, Saiful Adli, et al.
Published: (2008)
by: Ismail, Saiful Adli, et al.
Published: (2008)
Fast And Simple NEMO Authentication Via Random Number.
by: Tan, Tat Kin, et al.
Published: (2007)
by: Tan, Tat Kin, et al.
Published: (2007)
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
Behavioral Biometrics for User Authentication Using Self- Refreshing SOM
by: Teh, Chee Siong, et al.
Published: (2017)
by: Teh, Chee Siong, et al.
Published: (2017)
Tamper Localization and Lossless Recovery Watermarking Scheme with ROI Segmentation and Multilevel Authentication
by: Liew, Siau-Chuin, et al.
Published: (2013)
by: Liew, Siau-Chuin, et al.
Published: (2013)
Hybrid Resource Allocation Method for Grid Computing
by: Shah, S.N.M., et al.
Published: (2010)
by: Shah, S.N.M., et al.
Published: (2010)
Visualization pipeline for medical datasets on grid computing environment
by: Ahmed, A. A., et al.
Published: (2007)
by: Ahmed, A. A., et al.
Published: (2007)
A lightweight identity-based Rivest-Shamir-Adleman authentication scheme for mobile ad hoc networks
by: Eissa, Tameem
Published: (2011)
by: Eissa, Tameem
Published: (2011)
Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis
by: Eldow, Abdalla, et al.
Published: (2019)
by: Eldow, Abdalla, et al.
Published: (2019)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Press Touch Code: A Finger Press based Screen Size Independent Authentication Scheme for Smart Devices
by: Ranak, M. S. A. Noman, et al.
Published: (2017)
by: Ranak, M. S. A. Noman, et al.
Published: (2017)
Brute force password search using multithreading and grid computing
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
A Novel Protocol For Enhancing The Security Of Electronic Transaction Using Gsm Authentication
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
CST333 – Distributed & Grid Computing (Perkomputeran Teragih & Grid)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
The generative capacity of weighted simple and semi-simple splicing systems
by: Fong, Wan Heng, et al.
Published: (2016)
by: Fong, Wan Heng, et al.
Published: (2016)
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
by: Nur Alya Afikah, Usop
Published: (2024)
by: Nur Alya Afikah, Usop
Published: (2024)
Weighted simple and semi-simple splicing systems
by: Gan, Yee Siang, et al.
Published: (2014)
by: Gan, Yee Siang, et al.
Published: (2014)
A review of user authentication model for online banking system based on mobile IMEI number
by: Hammood, Waleed A., et al.
Published: (2020)
by: Hammood, Waleed A., et al.
Published: (2020)
Fuzzy C-Mean And Genetic Algorithms Based Scheduling For Independent Jobs In Computational Grid
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
Simplified link reliability enhancement schemes for wireless networks
by: Boon, Hoi Lim, et al.
Published: (2009)
by: Boon, Hoi Lim, et al.
Published: (2009)
An efficient bilateral remote user authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
An enhancement of authentication and energy efficient clustering protocol for wireless sensor network / Ahmed Abdulhadi Jasim
by: Ahmed Abdulhadi , Jasim
Published: (2021)
by: Ahmed Abdulhadi , Jasim
Published: (2021)
CST333 – DISTRIBUTED & GRID COMPUTING [PERKOMPUTERAN TERAGIH & GRID] DEC. 2016 - JAN. 2017
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
CST333 – DISTRIBUTED & GRID COMPUTING [PERKOMPUTERAN TERAGIH & GRID] DEC. 2015 - JAN. 2016
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
CST333 – DISTRIBUTED & GRID COMPUTING [PERKOMPUTERAN TERAGIH & GRID] DEC. 2014 - JAN. 2015
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
Probabilistic simple splicing systems
by: Selvarajoo, Mathuri, et al.
Published: (2014)
by: Selvarajoo, Mathuri, et al.
Published: (2014)
Mobile ad hoc network (MANET) performance through authentication approach by enhancing distributed trust model
by: Roslan, Irda
Published: (2007)
by: Roslan, Irda
Published: (2007)
CST333 - DISTRIBUTED & GRID COMPUTING APRIL 08.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CST333 – Distributed & Grid Computing January 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
by: PPSKOM, Pusat Pengajian Sains Komputer
Grid portal technology for web based education of parallel computing courses, applications and researches
by: Alias, Norma, et al.
Published: (2009)
by: Alias, Norma, et al.
Published: (2009)
Attacks on Shen et. al.’s remote user authentication scheme and defense*
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
A Context-Aware Based Authorization
System For Pervasive Grid Computing
by: Lim , Marilyn Chien Hui
Published: (2015)
by: Lim , Marilyn Chien Hui
Published: (2015)
A novel and efficient bilateral remote user authentication
scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Digital watermarking for medical image authentication
by: Noor Aqilah, Abdul Halim
Published: (2019)
by: Noor Aqilah, Abdul Halim
Published: (2019)
Probabilistic simple sticker systems
by: Selvarajoo, Mathuri, et al.
Published: (2017)
by: Selvarajoo, Mathuri, et al.
Published: (2017)
Similar Items
-
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
by: Lim, Tsu Chean, et al.
Published: (2018) -
Bilinear-pairing-based remote user authentication schemes using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2009) -
Enhancing user authentication for cloud web-based application / Detar Beqo
by: Detar , Beqo
Published: (2018) -
Simple Authentication Scheme for Personal Digital Assistants using the Hidden Markov Model ToolKit
by: Ching, Ho Chiung, et al.
Published: (2007) -
Grid computing is a work in progress
by: Oxley, A.
Published: (2009)