To search, Click below search items.

 

All Published Papers Search Service

Results for EDH; Total 3

Title

EDH: A Powerful method for the modeling of Irregular Dimensions

Author

Zehai Li, Jigui Sun, Haihong, Yu

Citation

Vol. 6  No. 4  pp. 36-41

Keywords

EDH, Irregular dimension, OLAP


Title

An Image Based Authentication System- Using Needham Schroeder Protocol

Author

Raman Kumar, Asmita Puri, Vivek Gautam, Saumya Singla

Citation

Vol. 10  No. 11  pp. 135-140

Keywords

Image Based Authentication (IBA), Needham Schroeder Protocol (NSP), Protocol, Attacks, Shoulder Attack, Tempest Attack, Brute Force Attack, Replay Attack and Other Attacks


Title

Smart and Secure Point of Sale Framework with Threat Modeling and Formal Verification

Author

Mona faraj Nasser alwahabi1 and Shaik Shakeel Ahamad2

Citation

Vol. 24  No. 6  pp. 41-48

Keywords

Smart and Secure PoS (SSPoS), Smart Point of Sale (SPOS); Burrows?Abadi?Needham (BAN); POS Payment Application (PPA); Point-to-Point encryption (P2PE); Application hardening and Application wrapping


[1]