Zobrazeno 1 - 9
of 9
pro vyhledávání: '"M. Hussain"'
Publikováno v:
2020 International Conference on Cyber Warfare and Security (ICCWS).
Millions of people across the world are using internet for their day to day activities. People are highly dependent on internet as they are using internet resources for their work in every field. It connects billions of people across the world. Inter
Publikováno v:
2020 International Conference on Computing and Information Technology (ICCIT-1441).
A rapid rise in cyber-attacks on Cyber Physical Systems (CPS) has been observed in the last decade. It becomes even more concerning that several of these attacks were on critical infrastructures that indeed succeeded and resulted into significant phy
Autor:
Shakir M. Hussain, Hussein Al-Bahadili
Publikováno v:
American Journal of Applied Sciences. 5:1630-1634
The password-based authentication is widely used in client-server systems. This research presents a non-exchanged password scheme for password-based authentication. This scheme constructs a Digital Signature (DS) that is derived from the user passwor
Publikováno v:
WMNC
Large efforts are being performed globally by governments, industries and academic institutions for the reduction of high speed road traffic accidents. Alert messages dissemination protocols based on vehicular ad hoc networks (VANETs) have strong pot
Publikováno v:
2008 16th International Conference on Software, Telecommunications and Computer Networks.
Wireless Sensor Networks are being widely deployed for their inimitable characteristics. Besides benefiting through the features of scalability and coverage, these networks are prone to many security threats including Denial of Service (DoS) attacks.
Autor:
M. Hussain, D. Seret
Publikováno v:
2006 8th International Conference Advanced Communication Technology.
The popularity of home networks is appealing to an increasing need for security. Emerging social concepts such as telecommutation brought a new kind of sensitive data and consequently new security threats to the home environment. Besides, low-capacit
Autor:
D. Seret, M. Hussain
Publikováno v:
2006 8th International Conference Advanced Communication Technology.
Security protocols require more rigorous and detailed verification than normal communication protocols before their deployment because even a trivial flaw in their architecture may produce drastic results. These verification procedures are based upon
Publikováno v:
The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..
The importance of a key management scheme in any modern security protocol can never be over estimated. No matter how strong an encryption or an authentication algorithm is, if the distribution of keys is poorly managed and carelessly designed, that s
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030223533
CISIS
CISIS
High degree of distribution is one of the leading features in present computer systems. Cloud Computing, Internet of Things and Blockchains are nowadays very hot research topics and we are going to use these architectures in many critical domains, li
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d0458496c55c24563f24d386cda6cffb
http://hdl.handle.net/11591/428338
http://hdl.handle.net/11591/428338