Search

Your search keyword '"Atiquzzaman, Mohammed"' showing total 90 results

Search Constraints

Start Over You searched for: Author "Atiquzzaman, Mohammed" Remove constraint Author: "Atiquzzaman, Mohammed" Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
90 results on '"Atiquzzaman, Mohammed"'

Search Results

5. A New Approach to Malware Detection

6. ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION

7. A Deployment Value Model for Intrusion Detection Sensors

8. On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS)

9. Securing Mobile Phone Calls with Identity-Based Cryptography

10. A Kademlia-Based Node Lookup System for Anonymization Networks

11. Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN

12. A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network

13. Clustering-Based Frequency l-Diversity Anonymization

14. Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery

15. Efficient Secure Multiparty Computation Protocol in Asynchronous Network

16. A New Strongly Secure Authenticated Key Exchange Protocol

17. Improved Implementations of Cryptosystems Based on Tate Pairing

18. What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?

19. Tagging the Turtle: Local Attestation for Kiosk Computing

20. Methodology and Tools of IS Audit and Computer Forensics – The Common Denominator

21. Recognizing Partially Occluded Faces from a Single Exemplar Image Per Person

22. Adaptive Iris Segmentation

23. Formal Verification for Access Control in Web Information Sharing System

24. Selective Regression Test for Access Control System Employing RBAC

25. Grouping Provenance Information to Improve Efficiency of Access Control

26. Certificateless Signature Scheme without Random Oracles

27. Fine-Grain Access Control Using Shibboleth for the Storage Resource Broker

28. The Dark Side of Timed Opacity

29. Safety High Accuracy Context-Aware Matrix (CAM) Making Based on X.509 Proxy Certificate

30. A Study on Mosaic Based CCTV System Using Localization

31. A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment

32. Selecting the Wireless Communication Methods for Establishing Ubiquitous City-Gas Facilities in Korea

33. A Forward-Secrecy WTLS Handshake Protocol Based on XTR

34. CRYPTEX Model for E-Commercial Contract of Software Source Code Using Secrete Sharing Scheme

35. Free-Form Deformation Axis Aligned Bounding Box

36. Cryptanalysis of Secure Key Exchange Protocol between STB and Smart Card in IPTV Broadcasting

37. Domain Specific Intended Use Evaluation Method: Intrusion Detection Specific Intended Use Evaluation Method

38. A Study of International Trend Analysis on Web Service Vulnerabilities in OWASP and WASC

39. A Study on Feasibility and Establishment of a Security Grade Certification Scheme for the New IT Services

40. Fault Tolerant Secure Routing in Cluster Based Mobile Sensor Networks

41. Device Authentication/Authorization Protocol for Home Network in Next Generation Security

42. Aggregate and Verifiably Encrypted Signatures from Multilinear Maps without Random Oracles

43. Authenticated Encryption in WSN Using eSTREAM Ciphers

44. Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs)

45. A Secure Group Rekeying Scheme with Compromised Node Revocation in Wireless Sensor Networks

46. A Mathematical Approach towards Trust Based Security in Pervasive Computing Environment

47. A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks

48. HOTP-Based User Authentication Scheme in Home Networks

49. Protecting Global SOA from DoS and Other Security Threats

50. Application of 2D Barcode in Hardcopy Document Verification System

Catalog

Books, media, physical & digital resources