Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
Quantum Key Distribution (QKD) can be considered as the best secured technol- ogy that appreciates the quantum mechanics principals in terms of information transmission over vulnerable quantum channel. QKD ensures that both parties can share the matched secret key through particular designated...
| Auteur principal: | Mohd Nasir, Rinie Narinie |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2015
|
| Sujets: | |
| Accès en ligne: | http://psasir.upm.edu.my/id/eprint/67775/1/fk%202015%20112.pdf |
Documents similaires
Design of a lightweight virtual honeynet based on linux container virtualization
par: Memari, Nogol
Publié: (2014)
par: Memari, Nogol
Publié: (2014)
Steganography in webpages using CSS color attributes enhanced by rule-based system
par: Nehzati, Seyedeh Sheida
Publié: (2016)
par: Nehzati, Seyedeh Sheida
Publié: (2016)
Fake review annotation model and classification through reviewers' writing style
par: Shojaee, Somayeh
Publié: (2019)
par: Shojaee, Somayeh
Publié: (2019)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
par: Abdu Muthana, Abdulrahman Ahmad
Publié: (2008)
par: Abdu Muthana, Abdulrahman Ahmad
Publié: (2008)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
par: Javan, Ali
Publié: (2011)
par: Javan, Ali
Publié: (2011)
Network security situation awareness based on indicators extracted
par: Xie, Zeqiang
Publié: (2016)
par: Xie, Zeqiang
Publié: (2016)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
par: Khalid, Roszelinda
Publié: (2018)
par: Khalid, Roszelinda
Publié: (2018)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
par: Ismail, Haqi Khalid
Publié: (2021)
par: Ismail, Haqi Khalid
Publié: (2021)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
par: Mohamed Yassin, Warusia
Publié: (2015)
par: Mohamed Yassin, Warusia
Publié: (2015)
A multi-factor authentication scheme using attack recognition and key generator technique
par: Mohd Ariffin, Noor Afiza
Publié: (2017)
par: Mohd Ariffin, Noor Afiza
Publié: (2017)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
par: Hydara, Isatou
Publié: (2015)
par: Hydara, Isatou
Publié: (2015)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
par: Hadi, Ahmed Adnan
Publié: (2022)
par: Hadi, Ahmed Adnan
Publié: (2022)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
par: Abiodun, Balogun Kamoru
Publié: (2021)
par: Abiodun, Balogun Kamoru
Publié: (2021)
Honeynet as a service deployment approach in enabling virtual crime scene investigation
par: Hasheminejad, Hamidreza
Publié: (2015)
par: Hasheminejad, Hamidreza
Publié: (2015)
An efficient anomaly intrusion detection method with evolutionary neural network
par: Sarvari, Samira
Publié: (2020)
par: Sarvari, Samira
Publié: (2020)
Security Enhancement of Route Optimization in Mobile IPv6 Networks
par: Zare Anari, Abbas Mehdizadeh
Publié: (2008)
par: Zare Anari, Abbas Mehdizadeh
Publié: (2008)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
par: H. Belgassem, Seddeq
Publié: (2004)
par: H. Belgassem, Seddeq
Publié: (2004)
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
par: Mustafa, Mohd Nawawi
Publié: (2015)
par: Mustafa, Mohd Nawawi
Publié: (2015)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
par: Mohamed, Amir Mohamed Talib
Publié: (2012)
par: Mohamed, Amir Mohamed Talib
Publié: (2012)
Scientific forensic framework for smartphones
par: Shahpasand, Maryam
Publié: (2015)
par: Shahpasand, Maryam
Publié: (2015)
Windows 10 instant messaging application forensics
par: Shehu, Aliyu Usman
Publié: (2018)
par: Shehu, Aliyu Usman
Publié: (2018)
Enhanced IP spoofing defense through clustered interdomain packet filtering strategy
par: Lee, Soon
Publié: (2011)
par: Lee, Soon
Publié: (2011)
Alternative discrete variable protocol for point to point Quantum Key Distribution system
par: Ahmad Ghazali, Lizal Iswady
Publié: (2012)
par: Ahmad Ghazali, Lizal Iswady
Publié: (2012)
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
par: Abdulkader, Zaid A.
Publié: (2018)
par: Abdulkader, Zaid A.
Publié: (2018)
Features selection for intrusion detection system using hybridize PSO-SVM
par: Tabaan, Alaa Abdulrahman
Publié: (2016)
par: Tabaan, Alaa Abdulrahman
Publié: (2016)
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
par: M. Abulkhirat, Esam
Publié: (2003)
par: M. Abulkhirat, Esam
Publié: (2003)
Zero distortion-based steganography for handwritten signature
par: Iranmanesh, Vahab
Publié: (2018)
par: Iranmanesh, Vahab
Publié: (2018)
Information security policy compliance model for government agency
par: Ramli, Muhamad Amirnazmi
Publié: (2018)
par: Ramli, Muhamad Amirnazmi
Publié: (2018)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
par: Hydara, Isatou
Publié: (2024)
par: Hydara, Isatou
Publié: (2024)
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
par: Malekzadeh, Mina
Publié: (2011)
par: Malekzadeh, Mina
Publié: (2011)
An efficient crime group of secured data sharing scheme in cloud
par: Rashid, Mustafa Noori
Publié: (2018)
par: Rashid, Mustafa Noori
Publié: (2018)
Kesedaran dan amalan keselamatan siber dalam kalangan pengguna internet di Malaysia
par: Pitchan, Muhammad Adnan
Publié: (2017)
par: Pitchan, Muhammad Adnan
Publié: (2017)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
par: Draib, Najla'a Ateeq Mohammed
Publié: (2022)
par: Draib, Najla'a Ateeq Mohammed
Publié: (2022)
Improved TLS protocol for platform integrity assurance using mutual attestation
par: Abd Aziz, Norazah
Publié: (2014)
par: Abd Aziz, Norazah
Publié: (2014)
New compendium of RSA vulnerabilities
par: Abd Ghafar, Amir Hamzah
Publié: (2020)
par: Abd Ghafar, Amir Hamzah
Publié: (2020)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
par: Hussein, Noor Sabeeh
Publié: (2016)
par: Hussein, Noor Sabeeh
Publié: (2016)
Hybrid cryptography algorithm to improve security cloud storage
par: Abd Almohsen, Inam Razzaq
Publié: (2017)
par: Abd Almohsen, Inam Razzaq
Publié: (2017)
Improving malicious detection rate for Facebook application in OSN platform
par: Angamuthu, Laavanya
Publié: (2018)
par: Angamuthu, Laavanya
Publié: (2018)
DDOS avoidance strategy for service avalibilty
par: AlRashidi, Bedour Fahhad Hamed
Publié: (2015)
par: AlRashidi, Bedour Fahhad Hamed
Publié: (2015)
An improved user authentication model for mobile application systems
par: Mohamed, Kartini
Publié: (2017)
par: Mohamed, Kartini
Publié: (2017)
Documents similaires
-
Design of a lightweight virtual honeynet based on linux container virtualization
par: Memari, Nogol
Publié: (2014) -
Steganography in webpages using CSS color attributes enhanced by rule-based system
par: Nehzati, Seyedeh Sheida
Publié: (2016) -
Fake review annotation model and classification through reviewers' writing style
par: Shojaee, Somayeh
Publié: (2019) -
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
par: Abdu Muthana, Abdulrahman Ahmad
Publié: (2008) -
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
par: Javan, Ali
Publié: (2011)