Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
The advent of Industry 4.0 has propelled the Industrial Internet of Things (IIoT) as one of the essential enabling technologies for its successful adoption and implementation. IIoT links devices and enables connection and access to the Internet, providing various manufacturing and industrial practic...
| Auteur principal: | Ismail, Haqi Khalid |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2021
|
| Sujets: | |
| Accès en ligne: | http://psasir.upm.edu.my/id/eprint/104037/1/HAQI%20KHALID%20ISMAIL%20-%20IR.pdf |
Documents similaires
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
par: Mohamed Yassin, Warusia
Publié: (2015)
par: Mohamed Yassin, Warusia
Publié: (2015)
A multi-factor authentication scheme using attack recognition and key generator technique
par: Mohd Ariffin, Noor Afiza
Publié: (2017)
par: Mohd Ariffin, Noor Afiza
Publié: (2017)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
par: Hadi, Ahmed Adnan
Publié: (2022)
par: Hadi, Ahmed Adnan
Publié: (2022)
Design of a lightweight virtual honeynet based on linux container virtualization
par: Memari, Nogol
Publié: (2014)
par: Memari, Nogol
Publié: (2014)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
par: Abdu Muthana, Abdulrahman Ahmad
Publié: (2008)
par: Abdu Muthana, Abdulrahman Ahmad
Publié: (2008)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
par: Javan, Ali
Publié: (2011)
par: Javan, Ali
Publié: (2011)
Network security situation awareness based on indicators extracted
par: Xie, Zeqiang
Publié: (2016)
par: Xie, Zeqiang
Publié: (2016)
Fake review annotation model and classification through reviewers' writing style
par: Shojaee, Somayeh
Publié: (2019)
par: Shojaee, Somayeh
Publié: (2019)
Steganography in webpages using CSS color attributes enhanced by rule-based system
par: Nehzati, Seyedeh Sheida
Publié: (2016)
par: Nehzati, Seyedeh Sheida
Publié: (2016)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
par: Khalid, Roszelinda
Publié: (2018)
par: Khalid, Roszelinda
Publié: (2018)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
par: Mohd Nasir, Rinie Narinie
Publié: (2015)
par: Mohd Nasir, Rinie Narinie
Publié: (2015)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
par: Abiodun, Balogun Kamoru
Publié: (2021)
par: Abiodun, Balogun Kamoru
Publié: (2021)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
par: Hydara, Isatou
Publié: (2015)
par: Hydara, Isatou
Publié: (2015)
Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli
par: Rosli, Mohamad AfiqHakimi
Publié: (2019)
par: Rosli, Mohamad AfiqHakimi
Publié: (2019)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
par: H. Belgassem, Seddeq
Publié: (2004)
par: H. Belgassem, Seddeq
Publié: (2004)
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
par: Mustafa, Mohd Nawawi
Publié: (2015)
par: Mustafa, Mohd Nawawi
Publié: (2015)
Security Enhancement of Route Optimization in Mobile IPv6 Networks
par: Zare Anari, Abbas Mehdizadeh
Publié: (2008)
par: Zare Anari, Abbas Mehdizadeh
Publié: (2008)
An efficient anomaly intrusion detection method with evolutionary neural network
par: Sarvari, Samira
Publié: (2020)
par: Sarvari, Samira
Publié: (2020)
Grid-based multi-touch gesture to enhance two-factor authentication graphical password for mobile phones
par: Zabidi, Nur Syabila
Publié: (2021)
par: Zabidi, Nur Syabila
Publié: (2021)
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
par: ‘Asri, Nur Nadia Syahirah
Publié: (2017)
par: ‘Asri, Nur Nadia Syahirah
Publié: (2017)
Honeynet as a service deployment approach in enabling virtual crime scene investigation
par: Hasheminejad, Hamidreza
Publié: (2015)
par: Hasheminejad, Hamidreza
Publié: (2015)
Windows 10 instant messaging application forensics
par: Shehu, Aliyu Usman
Publié: (2018)
par: Shehu, Aliyu Usman
Publié: (2018)
Enhanced IP spoofing defense through clustered interdomain packet filtering strategy
par: Lee, Soon
Publié: (2011)
par: Lee, Soon
Publié: (2011)
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
par: Abdulkader, Zaid A.
Publié: (2018)
par: Abdulkader, Zaid A.
Publié: (2018)
Mobility schemes in clustered proxy mobile IPv6
par: Al-Humrany, Adnan Jumaa Jabir
Publié: (2015)
par: Al-Humrany, Adnan Jumaa Jabir
Publié: (2015)
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
par: M. Abulkhirat, Esam
Publié: (2003)
par: M. Abulkhirat, Esam
Publié: (2003)
Zero distortion-based steganography for handwritten signature
par: Iranmanesh, Vahab
Publié: (2018)
par: Iranmanesh, Vahab
Publié: (2018)
An efficient crime group of secured data sharing scheme in cloud
par: Rashid, Mustafa Noori
Publié: (2018)
par: Rashid, Mustafa Noori
Publié: (2018)
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
par: Sadeghi, Mohammad Mehdi Gilanian
Publié: (2015)
par: Sadeghi, Mohammad Mehdi Gilanian
Publié: (2015)
Features selection for intrusion detection system using hybridize PSO-SVM
par: Tabaan, Alaa Abdulrahman
Publié: (2016)
par: Tabaan, Alaa Abdulrahman
Publié: (2016)
Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network
par: Ng, Roger Cheng Yong
Publié: (2006)
par: Ng, Roger Cheng Yong
Publié: (2006)
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
par: Malekzadeh, Mina
Publié: (2011)
par: Malekzadeh, Mina
Publié: (2011)
New compendium of RSA vulnerabilities
par: Abd Ghafar, Amir Hamzah
Publié: (2020)
par: Abd Ghafar, Amir Hamzah
Publié: (2020)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
par: Hussein, Noor Sabeeh
Publié: (2016)
par: Hussein, Noor Sabeeh
Publié: (2016)
Kesedaran dan amalan keselamatan siber dalam kalangan pengguna internet di Malaysia
par: Pitchan, Muhammad Adnan
Publié: (2017)
par: Pitchan, Muhammad Adnan
Publié: (2017)
Performance analysis on detection and prevention of wormhole attack in wireless network
par: Apandi, Mohamad Aiman Hanif
Publié: (2019)
par: Apandi, Mohamad Aiman Hanif
Publié: (2019)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
par: Mohamed, Amir Mohamed Talib
Publié: (2012)
par: Mohamed, Amir Mohamed Talib
Publié: (2012)
Minimising coverage holes for prediction-based mobile object target tracking in wireless sensor networks
par: Ali, Khalid Abdullahi
Publié: (2017)
par: Ali, Khalid Abdullahi
Publié: (2017)
Character property method with biometric multifactor authentication for arabic text steganography
par: Roslan, Nuur Alifah
Publié: (2018)
par: Roslan, Nuur Alifah
Publié: (2018)
Improved TLS protocol for platform integrity assurance using mutual attestation
par: Abd Aziz, Norazah
Publié: (2014)
par: Abd Aziz, Norazah
Publié: (2014)
Documents similaires
-
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
par: Mohamed Yassin, Warusia
Publié: (2015) -
A multi-factor authentication scheme using attack recognition and key generator technique
par: Mohd Ariffin, Noor Afiza
Publié: (2017) -
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
par: Hadi, Ahmed Adnan
Publié: (2022) -
Design of a lightweight virtual honeynet based on linux container virtualization
par: Memari, Nogol
Publié: (2014) -
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
par: Abdu Muthana, Abdulrahman Ahmad
Publié: (2008)