Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
The advent of Industry 4.0 has propelled the Industrial Internet of Things (IIoT) as one of the essential enabling technologies for its successful adoption and implementation. IIoT links devices and enables connection and access to the Internet, providing various manufacturing and industrial practic...
| 主要作者: | Ismail, Haqi Khalid |
|---|---|
| 格式: | Thesis |
| 语言: | 英语 |
| 出版: |
2021
|
| 主题: | |
| 在线阅读: | http://psasir.upm.edu.my/id/eprint/104037/1/HAQI%20KHALID%20ISMAIL%20-%20IR.pdf |
相似书籍
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
由: Mohamed Yassin, Warusia
出版: (2015)
由: Mohamed Yassin, Warusia
出版: (2015)
A multi-factor authentication scheme using attack recognition and key generator technique
由: Mohd Ariffin, Noor Afiza
出版: (2017)
由: Mohd Ariffin, Noor Afiza
出版: (2017)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
由: Hadi, Ahmed Adnan
出版: (2022)
由: Hadi, Ahmed Adnan
出版: (2022)
Design of a lightweight virtual honeynet based on linux container virtualization
由: Memari, Nogol
出版: (2014)
由: Memari, Nogol
出版: (2014)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
由: Abdu Muthana, Abdulrahman Ahmad
出版: (2008)
由: Abdu Muthana, Abdulrahman Ahmad
出版: (2008)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
由: Javan, Ali
出版: (2011)
由: Javan, Ali
出版: (2011)
Network security situation awareness based on indicators extracted
由: Xie, Zeqiang
出版: (2016)
由: Xie, Zeqiang
出版: (2016)
Fake review annotation model and classification through reviewers' writing style
由: Shojaee, Somayeh
出版: (2019)
由: Shojaee, Somayeh
出版: (2019)
Steganography in webpages using CSS color attributes enhanced by rule-based system
由: Nehzati, Seyedeh Sheida
出版: (2016)
由: Nehzati, Seyedeh Sheida
出版: (2016)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
由: Khalid, Roszelinda
出版: (2018)
由: Khalid, Roszelinda
出版: (2018)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
由: Mohd Nasir, Rinie Narinie
出版: (2015)
由: Mohd Nasir, Rinie Narinie
出版: (2015)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
由: Abiodun, Balogun Kamoru
出版: (2021)
由: Abiodun, Balogun Kamoru
出版: (2021)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
由: Hydara, Isatou
出版: (2015)
由: Hydara, Isatou
出版: (2015)
Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli
由: Rosli, Mohamad AfiqHakimi
出版: (2019)
由: Rosli, Mohamad AfiqHakimi
出版: (2019)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
由: H. Belgassem, Seddeq
出版: (2004)
由: H. Belgassem, Seddeq
出版: (2004)
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
由: Mustafa, Mohd Nawawi
出版: (2015)
由: Mustafa, Mohd Nawawi
出版: (2015)
Security Enhancement of Route Optimization in Mobile IPv6 Networks
由: Zare Anari, Abbas Mehdizadeh
出版: (2008)
由: Zare Anari, Abbas Mehdizadeh
出版: (2008)
An efficient anomaly intrusion detection method with evolutionary neural network
由: Sarvari, Samira
出版: (2020)
由: Sarvari, Samira
出版: (2020)
Grid-based multi-touch gesture to enhance two-factor authentication graphical password for mobile phones
由: Zabidi, Nur Syabila
出版: (2021)
由: Zabidi, Nur Syabila
出版: (2021)
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
由: ‘Asri, Nur Nadia Syahirah
出版: (2017)
由: ‘Asri, Nur Nadia Syahirah
出版: (2017)
Honeynet as a service deployment approach in enabling virtual crime scene investigation
由: Hasheminejad, Hamidreza
出版: (2015)
由: Hasheminejad, Hamidreza
出版: (2015)
Windows 10 instant messaging application forensics
由: Shehu, Aliyu Usman
出版: (2018)
由: Shehu, Aliyu Usman
出版: (2018)
Enhanced IP spoofing defense through clustered interdomain packet filtering strategy
由: Lee, Soon
出版: (2011)
由: Lee, Soon
出版: (2011)
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
由: Abdulkader, Zaid A.
出版: (2018)
由: Abdulkader, Zaid A.
出版: (2018)
Mobility schemes in clustered proxy mobile IPv6
由: Al-Humrany, Adnan Jumaa Jabir
出版: (2015)
由: Al-Humrany, Adnan Jumaa Jabir
出版: (2015)
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
由: M. Abulkhirat, Esam
出版: (2003)
由: M. Abulkhirat, Esam
出版: (2003)
Zero distortion-based steganography for handwritten signature
由: Iranmanesh, Vahab
出版: (2018)
由: Iranmanesh, Vahab
出版: (2018)
An efficient crime group of secured data sharing scheme in cloud
由: Rashid, Mustafa Noori
出版: (2018)
由: Rashid, Mustafa Noori
出版: (2018)
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
由: Sadeghi, Mohammad Mehdi Gilanian
出版: (2015)
由: Sadeghi, Mohammad Mehdi Gilanian
出版: (2015)
Features selection for intrusion detection system using hybridize PSO-SVM
由: Tabaan, Alaa Abdulrahman
出版: (2016)
由: Tabaan, Alaa Abdulrahman
出版: (2016)
Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network
由: Ng, Roger Cheng Yong
出版: (2006)
由: Ng, Roger Cheng Yong
出版: (2006)
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
由: Malekzadeh, Mina
出版: (2011)
由: Malekzadeh, Mina
出版: (2011)
New compendium of RSA vulnerabilities
由: Abd Ghafar, Amir Hamzah
出版: (2020)
由: Abd Ghafar, Amir Hamzah
出版: (2020)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
由: Hussein, Noor Sabeeh
出版: (2016)
由: Hussein, Noor Sabeeh
出版: (2016)
Kesedaran dan amalan keselamatan siber dalam kalangan pengguna internet di Malaysia
由: Pitchan, Muhammad Adnan
出版: (2017)
由: Pitchan, Muhammad Adnan
出版: (2017)
Performance analysis on detection and prevention of wormhole attack in wireless network
由: Apandi, Mohamad Aiman Hanif
出版: (2019)
由: Apandi, Mohamad Aiman Hanif
出版: (2019)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
由: Mohamed, Amir Mohamed Talib
出版: (2012)
由: Mohamed, Amir Mohamed Talib
出版: (2012)
Minimising coverage holes for prediction-based mobile object target tracking in wireless sensor networks
由: Ali, Khalid Abdullahi
出版: (2017)
由: Ali, Khalid Abdullahi
出版: (2017)
Character property method with biometric multifactor authentication for arabic text steganography
由: Roslan, Nuur Alifah
出版: (2018)
由: Roslan, Nuur Alifah
出版: (2018)
Improved TLS protocol for platform integrity assurance using mutual attestation
由: Abd Aziz, Norazah
出版: (2014)
由: Abd Aziz, Norazah
出版: (2014)
相似书籍
-
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
由: Mohamed Yassin, Warusia
出版: (2015) -
A multi-factor authentication scheme using attack recognition and key generator technique
由: Mohd Ariffin, Noor Afiza
出版: (2017) -
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
由: Hadi, Ahmed Adnan
出版: (2022) -
Design of a lightweight virtual honeynet based on linux container virtualization
由: Memari, Nogol
出版: (2014) -
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
由: Abdu Muthana, Abdulrahman Ahmad
出版: (2008)