Search

Your search keyword '"Mohammad Iftekhar Husain"' showing total 34 results

Search Constraints

Start Over You searched for: Author "Mohammad Iftekhar Husain" Remove constraint Author: "Mohammad Iftekhar Husain"
34 results on '"Mohammad Iftekhar Husain"'

Search Results

15. Dynamic Security Analysis of Zoom, Google Meet and Microsoft Teams

20. An Approach to Developing EEG-Based Person Authentication System

21. An Authentication System using Neurological Responses to Music

22. Design and Development of a Mobile EEG Data Analytics Framework

23. Bidirectional data verification for cloud storage

24. Improving Network Management by XML to Relational Data Translation

26. Implementation Vulnerability Associated with OAuth 2.0 -- A Case Study on Dropbox

27. Facebook Privacy Management Simplified

28. Towards building a word similarity dictionary for personality bias classification of phishing email contents

29. Lightweight Reconfigurable Encryption Architecture for Moving Target Defense

30. Enabling Wide Area Single System Image Experimentation on the GENI Platform

31. PGV: A Storage Enforcing Remote Verification Scheme

32. CD-PHY: Physical Layer Security in Wireless Networks through Constellation Diversity

33. A Simple Cost-Effective Framework for iPhone Forensic Analysis

34. iForensics: Forensic Analysis of Instant Messaging on Smart Phones

Catalog

Books, media, physical & digital resources