To search, Click below search items.
All Published Papers Search Service
Title
Response Mechanism for Defending Computer Networks
Author
C. Onwubiko, A.P. Lenaghan
Vol. 6 No. 8 pp. 36-42
Keywords
Response mechanism, fuzzy responder, human assistance security threats, computer networks
A Secure Authentication System- Using Enhanced One Time Pad Technique
Raman Kumar, Roma Jindal, Abhinav Gupta, Sagar Bhalla, Harshit Arora
Vol. 11 No. 2 pp. 11-17
One Time Pad (OTP), Random, Attacks Security Threats, Cryptographic Techniques and Information Security
Security Analysis of Peer-to-Peer based Soft System Bus based Systems
Muhammad Anwarul Azim, Yuichi Goto, Jingde Cheng
Vol. 11 No. 2 pp. 164-172
Security analysis, Peer-to-Peer, Asynchronous middleware, Persistent Computing System, Security threat
Benefits of Honeypots in Education Sector
Ateeq Ahmad, Muhammad Ali, Jamshed Mustafa
Vol. 11 No. 10 pp. 24-28
Honeypot, Benefits, Security Threats, Types of Honeypot, History