Showing 61 - 80 results of 81 for search '"Attacker"', query time: 0.04s Refine Results
  1. 61
    by Abu-Baker Alkalaaf, Howida
    Published 2014
    .... The weakness of current key agreement makes user privacy vulnerable to attack. To address that issue...
    Thesis
  2. 62
    by Boujarian, Sima
    Published 2013
    ... that is connected to this technology is keeping data secure. Many attackers try to obtain secret information...
    Get full text
    Thesis
  3. 63
    by Nateghizad, Majid
    Published 2014
    ... attacks. Furthermore, the search performances of proposed searchable encryption algorithms that are index...
    Thesis
  4. 64
    by Abd. Rahim, Mohd. Hafiz
    Published 2013
    ..., the vulnerabilities of web application and the attacks also increase rapidly too. Many web developers ignore...
    Get full text
    Thesis
  5. 65
    by Khudhair, Samar Kamil
    Published 2014
    ... 54.95db and 0.98 respectively. In terms of robustness against adding noise attacks, the performance...
    Get full text
    Thesis
  6. 66
    by Hosseini, Kambiz Mohammad
    Published 2013
    ... of security on them. In this research MITM attacks are analysed and a new model is introduced to enhance...
    Get full text
    Thesis
  7. 67
    by Noor Saaid, Nur Afeza Ajirah
    Published 2017
    ... to be accessed, downloaded and vulnerable to image processing attacks. Digital watermarking is a technique used...
    Get full text
    Thesis
  8. 68
    by Hidar, Ahmad M. Saeed
    Published 2014
    ... types of attacks. The security of Kerberos protocol that has been implemented for authentication ensures...
    Get full text
    Thesis
  9. 69
    by Mohammed Hasan, Sabah
    Published 2015
    ... and for detecting the possibility of attacks. The proposed scheme improves watermarking quality by using the sparse...
    Get full text
    Thesis
  10. 70
    by Suhaimi, Asiah Mastura
    Published 2017
    ... attackers, appropriate key management is necessary. Besides that, all the data is virtual and cloud...
    Get full text
    Thesis
  11. 71
  12. 72
    by Mohammed, Abubakar
    Published 2014
    .... The proposed incident response model can help the organization to reduce the number of attacks and assist...
    Get full text
    Thesis
  13. 73
    by Sabeeh, Ahmed A.
    Published 2010
    ... replacements for personal computers. On the other hand, this development has raised the number of attacks...
    Get full text
    Thesis
  14. 74
    by Fadhil, Ammar Mohammedali
    Published 2016
    ... is distributed over the entire image to maintain high level of security against any kind of attack. One-bit...
    Get full text
    Thesis
  15. 75
    by Naraei, Parisa
    Published 2013
    ... characteristic makes non-mobile device an easy target to attack. Therefore, the security level they require...
    Get full text
    Thesis
  16. 76
    by Mohammed Atoum, Mohammed Salem
    Published 2014
    ... the contents of the secret message. To enhance difficulty for attackers to retrieve the secret message...
    Get full text
    Thesis
  17. 77
    by Husain, Affandi
    Published 2015
    .... Information either in printed document or in digital form must be protected from threats and attacks...
    Get full text
    Thesis
  18. 78
    by Naraei, Parisa
    Published 2013
    ... characteristic makes non-mobile device an easy target to attack. Therefore, the security level they require...
    Get full text
    Thesis
  19. 79
    ... should be ready installed and resistance to various numbers of potential attacks. In Information Security...
    Get full text
    Thesis
  20. 80
    by Asadi, Ali
    Published 2016
    ... to attacks due to the mobility of nodes and wireless nature of their communications. These applications...
    Get full text
    Thesis