A Dynamic Security Model for Addressing Hacking Risk Factors. | 0 | 0.34 | 2016 |
A Structuring Concept For Securing Modern Day Computing Systems | 0 | 0.34 | 2015 |
A Hybrid Mobile Authentication Model for Ubiquitous Networking | 0 | 0.34 | 2015 |
An Evolving Trust Paradigm For Enforcing Computing System Security | 0 | 0.34 | 2015 |
An Explicit Trust Model Towards Better System Security. | 1 | 0.37 | 2014 |
Analysis of mobile authentication protocols by SVO logic | 1 | 0.35 | 2012 |
Evaluating the Functionality of the Token Filtering Technique in Filtering Denial of Service Packets Using a New Formal Evaluation Model | 2 | 0.37 | 2011 |
Preventing Denial of Service Attacks in Government E-Services Using a New Efficient Packet Filtering Technique | 2 | 0.37 | 2011 |
Two-Party Mobile Authentication Protocols for Wireless Roaming Networks | 2 | 0.36 | 2011 |
Information Security Threats Classification Pyramid | 7 | 0.74 | 2010 |
A New Holistic Security Approach for Government Critical Systems: Flooding Prevention. | 0 | 0.34 | 2010 |
An Authentication Model for Wireless Network Services | 0 | 0.34 | 2010 |
A Novel Security Approach for Critical Information Systems: Preventing Flooding in the Non-authenticated Client Area Using a New Service from Local Network Service Providers | 2 | 0.37 | 2010 |
Dynamic Key Cryptography and Applications | 5 | 0.65 | 2010 |
A Framework to Measure the Effectiveness of Image Representations | 0 | 0.34 | 2010 |
Novel Hybrid Group Key Agreement for Sensitive Information Systems | 0 | 0.34 | 2010 |
Passport/Visa: Authentication and Authorisation Tokens for Ubiquitous Wireless Communications. | 3 | 0.39 | 2010 |
Holistic Approach for Critical System Security: Flooding Prevention and Malicious Packet Stopping | 2 | 0.37 | 2010 |
An Individual and Group Authentication Model for Wireless Network Services | 12 | 0.98 | 2010 |
Securing mobile access in ubiquitous networking via non-roaming agreement protocol | 1 | 0.36 | 2010 |
Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance | 2 | 0.41 | 2010 |
Toward a Ubiquitous Mobile Access Model: A Roaming Agreement-Less Approach | 2 | 0.37 | 2010 |
Flexible Authentication Technique for Ubiquitous Wireless Communication using Passport and Visa Tokens | 2 | 0.39 | 2010 |
Multicasting Key Management in Wireless Networks | 0 | 0.34 | 2009 |
A Membership-Oriented Group Key Management for Application Services | 1 | 0.37 | 2009 |
Novel Authentication & Authorization Management for Sensitive Information Privacy Protection Using Dynamic Key Based Group Key Management | 1 | 0.46 | 2009 |
A Novel Group Key Management Scheme for Privacy Protection Sensitive Information Systems | 0 | 0.34 | 2008 |
A Study of Wavelets-Based Image Representations and Their Effectiveness | 0 | 0.34 | 2008 |
A Method for Authentication Services in Wireless Networks. | 3 | 0.43 | 2008 |
Fraudulent Internet Banking Payments Prevention using Dynamic Key | 7 | 0.56 | 2008 |
Dynamic Keys Based Sensitive Information System | 5 | 0.45 | 2008 |
A methodology for deriving objective image comparison metrics | 0 | 0.34 | 2007 |
Security Analysis for Internet Banking Models | 5 | 0.47 | 2007 |
A new Dynamic Key Generation Scheme for Fraudulent Internet Payment Prevention | 1 | 0.37 | 2007 |
A New Group Key Management Structure for Fraudulent Internet Banking Payments Detection | 1 | 0.36 | 2007 |
The design & implementation of a wireless payment system | 1 | 0.35 | 2006 |
The Design and Implementation of a Smartphone Payment System based on Limited-used Key Generation Scheme | 0 | 0.34 | 2006 |
Group Key Management in Wireless Networks Using Session Keys | 5 | 0.48 | 2006 |
Efficient Group Key Management in Wireless Networks | 2 | 0.39 | 2006 |
An Efficient and Secure Code Sharing for Peer-to-Peer Communications | 0 | 0.34 | 2006 |
Wireless Internet Payment System Using Smart Cards | 3 | 0.45 | 2005 |
A limited-used key generation scheme for internet transactions | 12 | 0.74 | 2004 |
A Secure Account-Based Mobile Payment Protocol | 27 | 1.60 | 2004 |
A Secure Prepaid Wireless Micropayment Protocol | 0 | 0.34 | 2004 |
Accountability Logic for Mobile Payment Protocols | 8 | 0.64 | 2004 |
A Secure Wireless Prepaid Micropayment Protocol With Extension to Postpaid Micropayment | 0 | 0.34 | 2004 |
Lightweight Mobile Credit-Card Payment Protocol | 27 | 1.46 | 2003 |
Guard: A Tool for Migrating Scientific Applications to the .NET Framework | 3 | 0.42 | 2002 |
A Proposed Alternative for Layer 2 of Neocognitron | 0 | 0.34 | 2001 |
A measure for image quality | 0 | 0.34 | 1998 |