An improved user authentication model for mobile application systems
In today’s digital communication era, people around the world can conveniently communicate with each other at any time and any places by just using mobile phones. Besides making phone calls and sending messages, mobile phones can also be used to download many interesting and useful apps for perso...
| Auteur principal: | Mohamed, Kartini |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2017
|
| Sujets: | |
| Accès en ligne: | http://psasir.upm.edu.my/id/eprint/68736/1/68736.pdf |
Documents similaires
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
par: Hydara, Isatou
Publié: (2024)
par: Hydara, Isatou
Publié: (2024)
Smart gate mobile application in residential area Putra Perdana using geofencing / Maisarah Mahazil
par: Mahazil, Maisarah
Publié: (2020)
par: Mahazil, Maisarah
Publié: (2020)
Secure authentication for sensitive digital systems in mobile devices
par: Hussein, Khalid Waleed
Publié: (2016)
par: Hussein, Khalid Waleed
Publié: (2016)
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
par: Mustafa, Mohd Nawawi
Publié: (2015)
par: Mustafa, Mohd Nawawi
Publié: (2015)
Adaptive artificial neural network for power system security assessment and control action
par: Al-Masri, Ahmed Naufal A.
Publié: (2012)
par: Al-Masri, Ahmed Naufal A.
Publié: (2012)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
par: Draib, Najla'a Ateeq Mohammed
Publié: (2022)
par: Draib, Najla'a Ateeq Mohammed
Publié: (2022)
A multi-factor authentication scheme using attack recognition and key generator technique
par: Mohd Ariffin, Noor Afiza
Publié: (2017)
par: Mohd Ariffin, Noor Afiza
Publié: (2017)
Designing and developing mobile application for college resident / Muhammad Amirul Aizat Mohd Rosdi
par: Mohd Rosdi, Muhammad Amirul Aizat
Publié: (2020)
par: Mohd Rosdi, Muhammad Amirul Aizat
Publié: (2020)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
par: Ismail, Haqi Khalid
Publié: (2021)
par: Ismail, Haqi Khalid
Publié: (2021)
Developing mobile application for event information dissemination (Campus Shout Out) / Mohamad Idham Md Sharif
par: Md Sharif, Mohamad Idham
Publié: (2020)
par: Md Sharif, Mohamad Idham
Publié: (2020)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
par: Javan, Ali
Publié: (2011)
par: Javan, Ali
Publié: (2011)
Porting process model for mobile application
par: Rajadorai @ Rajoo, Kesava Pillai
Publié: (2017)
par: Rajadorai @ Rajoo, Kesava Pillai
Publié: (2017)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
par: Abdu Muthana, Abdulrahman Ahmad
Publié: (2008)
par: Abdu Muthana, Abdulrahman Ahmad
Publié: (2008)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
par: Mohd Nasir, Rinie Narinie
Publié: (2015)
par: Mohd Nasir, Rinie Narinie
Publié: (2015)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
par: Abiodun, Balogun Kamoru
Publié: (2021)
par: Abiodun, Balogun Kamoru
Publié: (2021)
Security Improvement of Unicast Management Frames In Ieee 802.11 Mac Layer
par: Malekzadeh, Mina
Publié: (2007)
par: Malekzadeh, Mina
Publié: (2007)
Fake review annotation model and classification through reviewers' writing style
par: Shojaee, Somayeh
Publié: (2019)
par: Shojaee, Somayeh
Publié: (2019)
Improving malicious detection rate for Facebook application in OSN platform
par: Angamuthu, Laavanya
Publié: (2018)
par: Angamuthu, Laavanya
Publié: (2018)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
par: Hydara, Isatou
Publié: (2015)
par: Hydara, Isatou
Publié: (2015)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
par: Hussein, Noor Sabeeh
Publié: (2016)
par: Hussein, Noor Sabeeh
Publié: (2016)
“Kuliah Agama” notification based on location via mobile application / Mohamad Akmal Shukri Mahmud
par: Mahmud, Mohamad Akmal Shukri
Publié: (2015)
par: Mahmud, Mohamad Akmal Shukri
Publié: (2015)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
par: Mohamed, Amir Mohamed Talib
Publié: (2012)
par: Mohamed, Amir Mohamed Talib
Publié: (2012)
Mobile application of nutrition information on malay breakfast (NIMB) / Muhammad Khairuddin Abd. Mutalib
par: Muhammad Khairuddin, Abd. Mutalib
Publié: (2011)
par: Muhammad Khairuddin, Abd. Mutalib
Publié: (2011)
Steganography in webpages using CSS color attributes enhanced by rule-based system
par: Nehzati, Seyedeh Sheida
Publié: (2016)
par: Nehzati, Seyedeh Sheida
Publié: (2016)
Design of a lightweight virtual honeynet based on linux container virtualization
par: Memari, Nogol
Publié: (2014)
par: Memari, Nogol
Publié: (2014)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
par: Khalid, Roszelinda
Publié: (2018)
par: Khalid, Roszelinda
Publié: (2018)
Information security policy compliance model for government agency
par: Ramli, Muhamad Amirnazmi
Publié: (2018)
par: Ramli, Muhamad Amirnazmi
Publié: (2018)
A study on the effectiveness of new applications by providing up-to-date real time information guide for user of GoKL city bus / Nor Hasliny Rusli
par: Rusli, Nor Hasliny
Publié: (2018)
par: Rusli, Nor Hasliny
Publié: (2018)
Network security situation awareness based on indicators extracted
par: Xie, Zeqiang
Publié: (2016)
par: Xie, Zeqiang
Publié: (2016)
Mobile balanced and healthy diet on android system / Mohamad Khairul Amir Zaidan
par: Zaidan, Mohamad Khairul Amir
Publié: (2015)
par: Zaidan, Mohamad Khairul Amir
Publié: (2015)
Evaluating usability of mobile application for Dyslexia disability
par: Muhamad, Suhazli
Publié: (2018)
par: Muhamad, Suhazli
Publié: (2018)
Scientific forensic framework for smartphones
par: Shahpasand, Maryam
Publié: (2015)
par: Shahpasand, Maryam
Publié: (2015)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
par: Hadi, Ahmed Adnan
Publié: (2022)
par: Hadi, Ahmed Adnan
Publié: (2022)
Development of least square adjustment application for traversing / Harith Fadhillah Soeb
par: Soeb, Harith Fadhillah
Publié: (2019)
par: Soeb, Harith Fadhillah
Publié: (2019)
Predicting online safety behavior based on health belief model with internet literacy and gender as moderators
par: Abkooh, Elaheh Taheri
Publié: (2016)
par: Abkooh, Elaheh Taheri
Publié: (2016)
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
par: Goh, Kwang Yi
Publié: (2023)
par: Goh, Kwang Yi
Publié: (2023)
Secure lightweight client for cloud-based E-Health Model
par: Zhang, Xiaowei
Publié: (2023)
par: Zhang, Xiaowei
Publié: (2023)
Grid-based multi-touch gesture to enhance two-factor authentication graphical password for mobile phones
par: Zabidi, Nur Syabila
Publié: (2021)
par: Zabidi, Nur Syabila
Publié: (2021)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
par: H. Belgassem, Seddeq
Publié: (2004)
par: H. Belgassem, Seddeq
Publié: (2004)
An empirical investigation of software quality improvement / Mohd Zamri Md Zin
par: Md Zin, Mohd Zamri
Publié: (2004)
par: Md Zin, Mohd Zamri
Publié: (2004)
Documents similaires
-
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
par: Hydara, Isatou
Publié: (2024) -
Smart gate mobile application in residential area Putra Perdana using geofencing / Maisarah Mahazil
par: Mahazil, Maisarah
Publié: (2020) -
Secure authentication for sensitive digital systems in mobile devices
par: Hussein, Khalid Waleed
Publié: (2016) -
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
par: Mustafa, Mohd Nawawi
Publié: (2015) -
Adaptive artificial neural network for power system security assessment and control action
par: Al-Masri, Ahmed Naufal A.
Publié: (2012)