To search, Click below search items.
All Published Papers Search Service
Title
EDH: A Powerful method for the modeling of Irregular Dimensions
Author
Zehai Li, Jigui Sun, Haihong, Yu
Vol. 6 No. 4 pp. 36-41
Keywords
EDH, Irregular dimension, OLAP
An Image Based Authentication System- Using Needham Schroeder Protocol
Raman Kumar, Asmita Puri, Vivek Gautam, Saumya Singla
Vol. 10 No. 11 pp. 135-140
Image Based Authentication (IBA), Needham Schroeder Protocol (NSP), Protocol, Attacks, Shoulder Attack, Tempest Attack, Brute Force Attack, Replay Attack and Other Attacks
Smart and Secure Point of Sale Framework with Threat Modeling and Formal Verification
Mona faraj Nasser alwahabi1 and Shaik Shakeel Ahamad2
Vol. 24 No. 6 pp. 41-48
Smart and Secure PoS (SSPoS), Smart Point of Sale (SPOS); Burrows?Abadi?Needham (BAN); POS Payment Application (PPA); Point-to-Point encryption (P2PE); Application hardening and Application wrapping