223 results on '"Muhammad Khurram"'
Search Results
2. Correction: Moderating effect of vertical integration on the relationship between sustainability and performance: evidence from oil and gas energy sector
3. Moderating effect of vertical integration on the relationship between sustainability and performance: evidence from oil and gas energy sector
4. Systematic survey of mobile payments, protocols, and security infrastructure
5. Stem taper functions for Betula platyphylla in the Daxing’an Mountains, northeast China
6. An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
7. Contactless Biometrics in Wireless Sensor Network: A Survey
8. Using Arabic CAPTCHA for Cyber Security
9. One-Time Password System with Infinite Nested Hash Chains
10. Digital Quran Computing: Review, Classification, and Trend Analysis
11. Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions
12. Cryptanalysis of Truong et al.’s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device
13. Weaknesses of 'Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol'
14. Information Security Awareness Campaign: An Alternate Approach
15. A Framework for Detecting Malformed SMS Attack
16. Embedding High Capacity Covert Channels in Short Message Service (SMS)
17. Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion
18. Two-Directional Two-Dimensional Random Projection and Its Variations for Face and Palmprint Recognition
19. Security Analysis of ‘Two–Factor User Authentication in Wireless Sensor Networks’
20. Assertive Dynamic Power Management (AsDPM) Strategy for Globally Scheduled RT Multiprocessor Systems
21. Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding)
22. Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption
23. Robust Hiding of Fingerprint-Biometric Data into Audio Signals
24. An Intelligent Fingerprint-Biometric Image Scrambling Scheme
25. Enhancing the Transmission Security of Content-Based Hidden Biometric Data
26. An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards
27. Scheduling of Parallel Tasks with Proportionate Priorities
28. Provably Secure Pairing-Free Identity-Based Partially Blind Signature Scheme and Its Application in Online E-cash System
29. Effectiveness of power strategies for video applications: a practical study
30. Securing Biometric Templates for Reliable Identity Authentication
31. Protecting Biometric Data for Personal Identification
32. Cryptanalysis of Truong et al.’s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device
33. Weaknesses of “Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol”
34. Two-Directional Two-Dimensional Random Projection and Its Variations for Face and Palmprint Recognition
35. Security Analysis of ‘Two–Factor User Authentication in Wireless Sensor Networks’
36. Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption
37. Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding)
38. An Intelligent Fingerprint-Biometric Image Scrambling Scheme
39. Enhancing the Transmission Security of Content-Based Hidden Biometric Data
40. An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards
41. Protecting Biometric Data for Personal Identification
42. Cryptanalysis of Truong et al.’s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device
43. Computer Applications for Security, Control and System Engineering
44. Weaknesses of 'Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol'
45. Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion
46. Information Security Awareness Campaign: An Alternate Approach
47. Embedding High Capacity Covert Channels in Short Message Service (SMS)
48. A Framework for Detecting Malformed SMS Attack
49. Security Analysis of ‘Two–Factor User Authentication in Wireless Sensor Networks’
50. Assertive Dynamic Power Management (AsDPM) Strategy for Globally Scheduled RT Multiprocessor Systems
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.