Implementing Additional Security Measure on ATM Through Biometric
With the development of computer network technology and e-commerce, the self-service banking system has got extensive generalization with the characteristic offering high-quality 24 hours service for customer. Nowadays, using the ATM (Automatic Teller Machine) which provides customers with the conv...
| Main Author: | Azeez, Hayder Hussein |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/2576/1/Hayder_Hussein_Azeez.pdf https://etd.uum.edu.my/2576/2/1.Hayder_Hussein_Azeez.pdf https://etd.uum.edu.my/2576/ |
| Abstract | Abstract here |
Similar Items
Enterprise security architecture framework (ESAF) for banking industry / Mahathelge Nicholas Ruwan Dias
by: Mahathelge Nicholas , Ruwan Dias
Published: (2017)
by: Mahathelge Nicholas , Ruwan Dias
Published: (2017)
Load balancing and congestion control in ATM using fuzzy logic and spiking neuron network / Tan Jiann Shin
by: Tan, Jiann Shin
Published: (2005)
by: Tan, Jiann Shin
Published: (2005)
An efficient indexing and retrieval of iris biometrics data using hybrid transform and firefly based K-means algorithm title
by: Khalaf, Emad Taha
Published: (2019)
by: Khalaf, Emad Taha
Published: (2019)
Deep Learning Model with Attention Mechanism for Biometric Re-Identification of Green Sea Turtles in Long-Term Tracking Scenario
by: Khalif Amir, Zakry
Published: (2024)
by: Khalif Amir, Zakry
Published: (2024)
Budgetary control system for University of Karbala Iraq based on adaptive budgetary control framework
by: Hassan, Iman Mohsin
Published: (2015)
by: Hassan, Iman Mohsin
Published: (2015)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)
by: Akhyari, Nasir
Published: (2019)
Secure policies for the distributed virtual machines in mobile cloud computing
by: Annane, Boubakeur
Published: (2020)
by: Annane, Boubakeur
Published: (2020)
A security framework for mobile health applications on android platform / Muzammil Hussain
by: Muzammil , Hussain
Published: (2017)
by: Muzammil , Hussain
Published: (2017)
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
by: Yasir, Javed
Published: (2020)
by: Yasir, Javed
Published: (2020)
Shoulder surfing security threat prevention using shifting directions / Tey Boon Hau
by: Tey, Boon Hau
Published: (2018)
by: Tey, Boon Hau
Published: (2018)
A secure pin-entry method resistant to shoulder-surfing and recording attacks / Farid Binbeshr
by: Farid , Binbeshr
Published: (2022)
by: Farid , Binbeshr
Published: (2022)
Detecting Semantically Similar Constructs using Google Trigram Sentence Similarity Measures
by: Wong, Linda Lin Juan
Published: (2018)
by: Wong, Linda Lin Juan
Published: (2018)
A lightweight key management framework for secure dynamic group based applications / Salman Iqbal Malik
by: Salman Iqbal , Malik
Published: (2017)
by: Salman Iqbal , Malik
Published: (2017)
Enhancing Security in Mobile IPv6 with Private Key-Based Binding Update Protocol / Hero Modares
by: Modares, Hero
Published: (2013)
by: Modares, Hero
Published: (2013)
A scalable and secure position-based routing protocol for ad-hoc networks / Liana K. M. Qabajeh
by: Qabajeh, Liana K. M.
Published: (2012)
by: Qabajeh, Liana K. M.
Published: (2012)
A DNA Based Lightweight Cryptography Framework Integrating ECC and RNN Based Deep Learning for IoT Security
by: Sehrish, Aqeel
Published: (2025)
by: Sehrish, Aqeel
Published: (2025)
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
by: Seyed Asadollah, Abdiesfandani
Published: (2016)
by: Seyed Asadollah, Abdiesfandani
Published: (2016)
A novel secure mud-based real time intrusion detection and prevention mechanism for IoT network / Noman Mazhar
by: Noman , Mazhar
Published: (2023)
by: Noman , Mazhar
Published: (2023)
A secure approach for health information exchange using mobile personal health records / Mohamed Shabbir Hamza Abdulnabi
by: Mohamed Shabbir Hamza , Abdulnabi
Published: (2018)
by: Mohamed Shabbir Hamza , Abdulnabi
Published: (2018)
Identification of ECG anomalies through deep deterministic learning / Uzair Iqbal
by: Uzair , Iqbal
Published: (2020)
by: Uzair , Iqbal
Published: (2020)
A post-implementation evaluation method for enterprise architecture / Fatemeh Nikpay
by: Fatemeh, Nikpay
Published: (2017)
by: Fatemeh, Nikpay
Published: (2017)
Enhanced ontological query expansion model using bigram combinations and combined similarity measure for improving information retrieval
by: Raza, Muhammad Ahsan
Published: (2020)
by: Raza, Muhammad Ahsan
Published: (2020)
Studies on flat CORDIC implementation in field programmable gate arrays (FPGA) / Meera Subramaniam
by: Meera , Subramaniam
Published: (2004)
by: Meera , Subramaniam
Published: (2004)
Design and implementation of a hybrid RFID-GPS human tracking system / Muhammad Sadiq Rohei
by: Muhammad Sadiq , Rohei
Published: (2019)
by: Muhammad Sadiq , Rohei
Published: (2019)
Hybrid Schemes for Social-based Heterogeneous Information Dissemination Through Peer-to-Peer Interactions in Opportunistic Networks
by: Abdalla Hassan, Gharib
Published: (2021)
by: Abdalla Hassan, Gharib
Published: (2021)
Lightweight security schemes for internet of things resource-constrained devices / Usman Ali
by: Usman , Ali
Published: (2024)
by: Usman , Ali
Published: (2024)
Automated intrusion prevention mechanism in enhancing network security / He Xiao Dong
by: He , Xiao Dong
Published: (2008)
by: He , Xiao Dong
Published: (2008)
Secure Trust-Based Algorithm using Blockchain Technology to Prevent Attacks in VANET
by: Kuhanraj, Balan
Published: (2020)
by: Kuhanraj, Balan
Published: (2020)
Engaging students in critical thinking through
information competency assessment: A single group repeated measures design / Lleuvelyn Areglado Cacha
by: Lleuvelyn, Areglado Cacha
Published: (2013)
by: Lleuvelyn, Areglado Cacha
Published: (2013)
Dynamic remote data auditing for securing big data storage in cloud computing / Mehdi Sookhak
by: Sookhak, Mehdi
Published: (2015)
by: Sookhak, Mehdi
Published: (2015)
Social cognitive framework for secure information sharing on Islamic NGO social media / Nurul’Adilah Nazri
by: Nurul’Adilah , Nazri
Published: (2022)
by: Nurul’Adilah , Nazri
Published: (2022)
Security Analysis Techniques Using Differential Relationships For Block Ciphers
by: Buja, Alya Geogiana
Published: (2018)
by: Buja, Alya Geogiana
Published: (2018)
Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei
by: Hamid , Tahaei
Published: (2018)
by: Hamid , Tahaei
Published: (2018)
Knowledge based semantic representation for semantic relatedness measurements
by: Ali Muttaleb, Hasan
Published: (2022)
by: Ali Muttaleb, Hasan
Published: (2022)
An efficient CSMA/CA protocol for IEEE 802.11
by: Hussein Abbas, Ali Muhammad
Published: (2018)
by: Hussein Abbas, Ali Muhammad
Published: (2018)
Evaluation model for knowledge sharing in information security professional virtual community / Alireza Tamjidyamcholo
by: Tamjidyamcholo, Alireza
Published: (2014)
by: Tamjidyamcholo, Alireza
Published: (2014)
Speaker identification through feature fusion based deep learning / Rashid Jahangir
by: Rashid , Jahangir
Published: (2021)
by: Rashid , Jahangir
Published: (2021)
Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan
by: Khan, Abdul Nasir
Published: (2014)
by: Khan, Abdul Nasir
Published: (2014)
Frame selection based on modified entropy and object motion for secured data hiding in videos
by: Muhammad Fuad, Abdullah
Published: (2021)
by: Muhammad Fuad, Abdullah
Published: (2021)
Similar Items
-
Enterprise security architecture framework (ESAF) for banking industry / Mahathelge Nicholas Ruwan Dias
by: Mahathelge Nicholas , Ruwan Dias
Published: (2017) -
Load balancing and congestion control in ATM using fuzzy logic and spiking neuron network / Tan Jiann Shin
by: Tan, Jiann Shin
Published: (2005) -
An efficient indexing and retrieval of iris biometrics data using hybrid transform and firefly based K-means algorithm title
by: Khalaf, Emad Taha
Published: (2019) -
Deep Learning Model with Attention Mechanism for Biometric Re-Identification of Green Sea Turtles in Long-Term Tracking Scenario
by: Khalif Amir, Zakry
Published: (2024) -
Budgetary control system for University of Karbala Iraq based on adaptive budgetary control framework
by: Hassan, Iman Mohsin
Published: (2015)