Attack containment in mobile ad-hoc networks through fair distribution of processing resources | 0 | 0.34 | 2014 |
Authorization as a Service in Cloud Environments | 1 | 0.40 | 2013 |
Cyber Security Using Arabic Captcha Scheme | 2 | 0.39 | 2013 |
Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network | 2 | 0.39 | 2013 |
Environment recognition for digital audio forensics using MPEG-7 and mel cepstral features. | 8 | 0.64 | 2013 |
Mobile one-time passwords: two-factor authentication using mobile phones | 5 | 0.49 | 2012 |
Representing Access Control Policies In Use Cases | 2 | 0.51 | 2012 |
Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes | 2 | 0.42 | 2012 |
Analysis of existing remote attestation techniques | 1 | 0.36 | 2012 |
Intrinsic Authentication Of Multimedia Objects Using Biometric Data Manipulation | 3 | 0.45 | 2012 |
Identity-based online/offline signcryption for low power devices | 11 | 0.55 | 2012 |
SIMOnt: A Security Information Management Ontology Framework | 0 | 0.34 | 2011 |
Challenge-response-based biometric image scrambling for secure personal identification | 21 | 1.19 | 2011 |
Two-directional two-dimensional random projection and its variations for face and palmprint recognition | 17 | 0.52 | 2011 |
Privacy-preserving and tokenless chaotic revocable face authentication scheme | 5 | 0.46 | 2011 |
Authenticated key agreement with rekeying for secured body sensor networks. | 4 | 0.70 | 2011 |
Secure chaotic map based block cryptosystem with application to camera sensor networks. | 5 | 0.90 | 2011 |
Secure Instant Messaging Protocol for Centralized Communication Group. | 1 | 0.37 | 2011 |
Quaternary privacy-levels preservation in computer forensics investigation process. | 4 | 0.42 | 2011 |
An Ontology Based Information Security Requirements Engineering Framework | 4 | 0.39 | 2011 |
Information Security Awareness Campaign: An Alternate Approach. | 3 | 0.39 | 2011 |
OTP-Based Two-Factor Authentication Using Mobile Phones | 10 | 0.78 | 2011 |
Web content mining for alias identification: A first step towards suspect tracking. | 2 | 0.36 | 2011 |
A Framework for Detecting Malformed SMS Attack | 0 | 0.34 | 2011 |
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme' | 115 | 3.17 | 2011 |
Energy Efficient Distributed Face Recognition in Wireless Sensor Network | 8 | 0.53 | 2011 |
Security analysis of 'two-factor user authentication in wireless sensor networks' | 4 | 0.43 | 2010 |
Face Recognition using Layered Linear Discriminant Analysis and Small Subspace | 8 | 0.61 | 2010 |
Information Assurance in Saudi Organizations - An Empirical Study. | 0 | 0.34 | 2010 |
NMACA Approach Used to Build a Secure Message Authentication Code. | 0 | 0.34 | 2010 |
Novel algorithmic countermeasures for Differential Power Analysis attacks on smart cards. | 1 | 0.43 | 2010 |
Bio-inspired Hybrid Face Recognition System for Small Sample Size and Large Dataset | 2 | 0.37 | 2010 |
One-Time Password System with Infinite Nested Hash Chains. | 3 | 0.43 | 2010 |
Issues of Security and Network Load in Presence - A Survey. | 0 | 0.34 | 2010 |
Using Arabic CAPTCHA for Cyber Security. | 5 | 0.50 | 2010 |
Broadcast authentication for wireless sensor networks using nested hashing and the Chinese remainder theorem. | 14 | 0.83 | 2010 |
Contactless Biometrics in Wireless Sensor Network: A Survey. | 0 | 0.34 | 2010 |
Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in Pakistan. | 0 | 0.34 | 2010 |
Security Analysis of Firewall Rule Sets in Computer Networks | 2 | 0.36 | 2010 |
Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'. | 150 | 4.68 | 2010 |
Chaos-based secure satellite imagery cryptosystem | 21 | 1.04 | 2010 |
Face Detection and Count Estimates in Surveillance Color Images. | 0 | 0.34 | 2009 |
Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding) | 1 | 0.39 | 2009 |
Acceptance and Applications of Smart Cards Technology in University Settings | 0 | 0.34 | 2009 |
A New Accelerated RC4 Scheme Using "Ultra Gridsec and "HIMAN and use this Scheme to Secure "HIMAN Data | 0 | 0.34 | 2009 |
Enhancement of Use Case Diagram to Capture Authorization Requirements | 1 | 0.36 | 2009 |
Enforcing Security Policies in Requirements Engineering Using AFUML | 0 | 0.34 | 2008 |
Practical ERP Implementation in Government Organization | 0 | 0.34 | 2008 |
Validating the enforcement of access control policies and separation of duty principle in requirement engineering | 11 | 0.52 | 2007 |
Securing UML Information Flow Using FlowUML | 5 | 0.44 | 2005 |