90 results on '"Atiquzzaman, Mohammed"'
Search Results
2. Network Traffic Analysis and SCADA Security
3. Network Requirement for Management of Multimedia over Wireless Channel
4. Network Requirement for Management of Multimedia over Wireless Channel
5. A New Approach to Malware Detection
6. ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
7. A Deployment Value Model for Intrusion Detection Sensors
8. On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS)
9. Securing Mobile Phone Calls with Identity-Based Cryptography
10. A Kademlia-Based Node Lookup System for Anonymization Networks
11. Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN
12. A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network
13. Clustering-Based Frequency l-Diversity Anonymization
14. Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery
15. Efficient Secure Multiparty Computation Protocol in Asynchronous Network
16. A New Strongly Secure Authenticated Key Exchange Protocol
17. Improved Implementations of Cryptosystems Based on Tate Pairing
18. What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?
19. Tagging the Turtle: Local Attestation for Kiosk Computing
20. Methodology and Tools of IS Audit and Computer Forensics – The Common Denominator
21. Recognizing Partially Occluded Faces from a Single Exemplar Image Per Person
22. Adaptive Iris Segmentation
23. Formal Verification for Access Control in Web Information Sharing System
24. Selective Regression Test for Access Control System Employing RBAC
25. Grouping Provenance Information to Improve Efficiency of Access Control
26. Certificateless Signature Scheme without Random Oracles
27. Fine-Grain Access Control Using Shibboleth for the Storage Resource Broker
28. The Dark Side of Timed Opacity
29. Safety High Accuracy Context-Aware Matrix (CAM) Making Based on X.509 Proxy Certificate
30. A Study on Mosaic Based CCTV System Using Localization
31. A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment
32. Selecting the Wireless Communication Methods for Establishing Ubiquitous City-Gas Facilities in Korea
33. A Forward-Secrecy WTLS Handshake Protocol Based on XTR
34. CRYPTEX Model for E-Commercial Contract of Software Source Code Using Secrete Sharing Scheme
35. Free-Form Deformation Axis Aligned Bounding Box
36. Cryptanalysis of Secure Key Exchange Protocol between STB and Smart Card in IPTV Broadcasting
37. Domain Specific Intended Use Evaluation Method: Intrusion Detection Specific Intended Use Evaluation Method
38. A Study of International Trend Analysis on Web Service Vulnerabilities in OWASP and WASC
39. A Study on Feasibility and Establishment of a Security Grade Certification Scheme for the New IT Services
40. Fault Tolerant Secure Routing in Cluster Based Mobile Sensor Networks
41. Device Authentication/Authorization Protocol for Home Network in Next Generation Security
42. Aggregate and Verifiably Encrypted Signatures from Multilinear Maps without Random Oracles
43. Authenticated Encryption in WSN Using eSTREAM Ciphers
44. Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs)
45. A Secure Group Rekeying Scheme with Compromised Node Revocation in Wireless Sensor Networks
46. A Mathematical Approach towards Trust Based Security in Pervasive Computing Environment
47. A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks
48. HOTP-Based User Authentication Scheme in Home Networks
49. Protecting Global SOA from DoS and Other Security Threats
50. Application of 2D Barcode in Hardcopy Document Verification System
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.