Two Novel E-Visas Verification Schemes Based On Public Key Infrastructure (Pki) And Identity Based Encryption (Ibe).
Visa merupakan dokumen perjalanan yang sangat penting yang membenarkan kita memasuki sesebuah negara yang akan kita lawati. Visa is a very important traveling document, which is an essential need at the point of entry of any country we are visiting.
| Auteur principal: | Abuadhmah, Najlaa Abdullah |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2010
|
| Sujets: | |
| Accès en ligne: | http://eprints.usm.my/24562/ |
| Abstract | Abstract here |
Documents similaires
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
par: S. Alsayfi, Majed Salam
Publié: (2010)
par: S. Alsayfi, Majed Salam
Publié: (2010)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
par: Alfin Syafalni, Alfin Syafalni
Publié: (2016)
par: Alfin Syafalni, Alfin Syafalni
Publié: (2016)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
par: Omolara, Abiodun Esther
Publié: (2020)
par: Omolara, Abiodun Esther
Publié: (2020)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
par: Younes, Mohammad Ali Moh'd Bani
Publié: (2009)
par: Younes, Mohammad Ali Moh'd Bani
Publié: (2009)
Partial Verification Bias Correction In Diagnostic Accuracy Studies Using Propensity Score-Based Methods
par: Wan Mansor, Wan Nor Arifin
Publié: (2023)
par: Wan Mansor, Wan Nor Arifin
Publié: (2023)
Data Integrity For Cloud Computing With Homomorphic Encryption
par: Awadallah, Ruba N S
Publié: (2022)
par: Awadallah, Ruba N S
Publié: (2022)
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
par: A. Alia, Mohammad Ahmad
Publié: (2008)
par: A. Alia, Mohammad Ahmad
Publié: (2008)
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
par: Jaafar, Abdullah Mohammed Abdo Ali
Publié: (2011)
par: Jaafar, Abdullah Mohammed Abdo Ali
Publié: (2011)
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
par: Jahani, Shahram
Publié: (2016)
par: Jahani, Shahram
Publié: (2016)
Passive operating system fingerprinting based on multi-layered sub-signature matching scheme (MLSMS).
par: Aljammal, Ashraf Hamdan Rashid
Publié: (2011)
par: Aljammal, Ashraf Hamdan Rashid
Publié: (2011)
Enhanced 3-Tier Storage Management Scheme For Flash Memory-Based Solid State Disk
par: Alsalibi, Ahmed I N
Publié: (2017)
par: Alsalibi, Ahmed I N
Publié: (2017)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
par: Alieyan, Kamal Ibrahim Ahmed
Publié: (2018)
par: Alieyan, Kamal Ibrahim Ahmed
Publié: (2018)
Enhancing Svd-Based Image
Watermarking Strategies Based On
Digital Chaos
par: Alshoura, Wafa’hamdan Suleiman
Publié: (2022)
par: Alshoura, Wafa’hamdan Suleiman
Publié: (2022)
Analogical Learner For Natural Language Processing Based On Structured String-tree Correspondence (sstc) And
Case-based Reasoning
par: Lim, Huan Ngee
Publié: (2009)
par: Lim, Huan Ngee
Publié: (2009)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
par: Keshkeh, Kinan
Publié: (2022)
par: Keshkeh, Kinan
Publié: (2022)
Harmony Search-Based Hyper-Heuristic For Scheduling Problems
par: Anwar, Khairul
Publié: (2018)
par: Anwar, Khairul
Publié: (2018)
Division-Based Methods For Large Point Sets Registration
par: Chen , Junfen
Publié: (2016)
par: Chen , Junfen
Publié: (2016)
A behavior based algorithm to detect spam bots
par: Zamil, Mohammed Fadhil
Publié: (2009)
par: Zamil, Mohammed Fadhil
Publié: (2009)
Analysable Chaos-based Design Paradigms For Cryptographic Applications
par: Abba, Abubakar
Publié: (2024)
par: Abba, Abubakar
Publié: (2024)
Harmony search-based fuzzy clustering algorithms for image segmentation.
par: Alia, Osama Moh’d Radi
Publié: (2011)
par: Alia, Osama Moh’d Radi
Publié: (2011)
A Framework For Dynamic Updating In Component-based
Software Systems
par: Mohammed Alhazbi , Saleh
Publié: (2009)
par: Mohammed Alhazbi , Saleh
Publié: (2009)
A Human Community-Based Genetic
Algorithm Model
(HCBGA)
par: Al-Madi, Nagham Azmi Qasim
Publié: (2009)
par: Al-Madi, Nagham Azmi Qasim
Publié: (2009)
A Fusion-Based Framework For Explainable Suicide Attempt Prediction
par: Nordin, Noratikah
Publié: (2024)
par: Nordin, Noratikah
Publié: (2024)
An Ontology And Constraint-based Approach For Dynamic Personalised Planning In Healthcare
par: Mahiddin , Normadiah
Publié: (2009)
par: Mahiddin , Normadiah
Publié: (2009)
Indexing Of Bilingual Knowledge Bank
Based On The Synchronous Sstc Structure
par: Ye , Hong Hoe
Publié: (2006)
par: Ye , Hong Hoe
Publié: (2006)
Rule Generation Based On Structural Clustering For Automatic Question Answering
par: Song , Shen
Publié: (2009)
par: Song , Shen
Publié: (2009)
Similarity Segmentation Approach For Sensor-Based Human Activity Recognition
par: Baraka, Abdulrahman M. A.
Publié: (2024)
par: Baraka, Abdulrahman M. A.
Publié: (2024)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
par: Elejla, Omar E. O.
Publié: (2018)
par: Elejla, Omar E. O.
Publié: (2018)
Ontology-Based Source Code Retrieval Model To Support Program Comprehension
par: Kadar, Rozita
Publié: (2019)
par: Kadar, Rozita
Publié: (2019)
Feature Selection Method Based On Hybrid Filter-Metaheuristic Wrapper Approach
par: Jothi, Neesha
Publié: (2020)
par: Jothi, Neesha
Publié: (2020)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
par: Ghanem, Waheed Ali Hussein Mohammed
Publié: (2019)
par: Ghanem, Waheed Ali Hussein Mohammed
Publié: (2019)
Enhanced Micro Genetic
Algorithm-Based Models For
Multi-Objective Optimization
par: Tan, Choo Jun
Publié: (2014)
par: Tan, Choo Jun
Publié: (2014)
Similarity-Based Weights For
Cross-Domain Sentiment Classification Of Product Reviews
par: Gupta, Aditi
Publié: (2023)
par: Gupta, Aditi
Publié: (2023)
Action-Based Help Technique To Improve Learnability And Understandability Of Web Applications
par: Shamsuddin, Nurul Afiqah
Publié: (2014)
par: Shamsuddin, Nurul Afiqah
Publié: (2014)
Gpu Based Fast Phylogenetic Tree
Construction Algorithm With Reduce
Dataset
par: Ibrahim, Najihah
Publié: (2016)
par: Ibrahim, Najihah
Publié: (2016)
A Context-Aware Based Authorization
System For Pervasive Grid Computing
par: Lim , Marilyn Chien Hui
Publié: (2015)
par: Lim , Marilyn Chien Hui
Publié: (2015)
Flood Prediction Based On Deep Learning Networks With Variational Mode Decomposition
par: Ni, Chenmin
Publié: (2024)
par: Ni, Chenmin
Publié: (2024)
Enhancing The Quality Of Service In Mobile Networks Based On Nemo Basic Support Protocol
par: Alshaibani, Badiea Abdulkarem Mohammed
Publié: (2018)
par: Alshaibani, Badiea Abdulkarem Mohammed
Publié: (2018)
Behavioural Factors Based Crowd
Evacuation Modelling Using
Fuzzy-Neural Approach
par: Zakaria, Wahida
Publié: (2020)
par: Zakaria, Wahida
Publié: (2020)
Layered Botnet Detection Framework Based On Signal
Processing And Discrete Time Analysis
par: Melhim, Loai Kayed Hassan Bani
Publié: (2012)
par: Melhim, Loai Kayed Hassan Bani
Publié: (2012)
Documents similaires
-
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
par: S. Alsayfi, Majed Salam
Publié: (2010) -
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
par: Alfin Syafalni, Alfin Syafalni
Publié: (2016) -
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
par: Omolara, Abiodun Esther
Publié: (2020) -
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
par: Younes, Mohammad Ali Moh'd Bani
Publié: (2009) -
Partial Verification Bias Correction In Diagnostic Accuracy Studies Using Propensity Score-Based Methods
par: Wan Mansor, Wan Nor Arifin
Publié: (2023)
