To search, Click below search items.
All Published Papers Search Service
Title
Analysis of Web based Structural Security Patterns by Employing Ten Security Principles
Author
Rabia Riaz, Sanam Shahla Rizvi, Farina Riaz, Nosheen Hameed, Sana Shokat
Vol. 17 No. 10 pp. 45-56
Keywords
Web applications security design patterns security principles mobile devices user authentication
A secure authentication model for Cloud federation
Belbergui Chaimaa, Elkamoun Najib, Hilal Rachid
Vol. 17 No. 9 pp. 53-58
Cloud computing Cloud Federation Security Identity Management Authentication Single Sign-On.
Mathematical Message Authentication Code Using S-Box key
Mohammed Ali Mohammed , Loay K. Abood and Makki Maliki
Vol. 17 No. 7 pp. 31-37
Message Authentication Code (MAC) Message Authentication Message Integrity Substitution-Box (S-Box).
Intrusion Analysis in Inter Process Communication
Ramzan Talib, M Kashif Hanif, M Yahya Saeed and M Umer Sarwar
Vol. 17 No. 7 pp. 1-7
Intrusion Detection System, Communication Architecture, Traffic Patterns, Pluggable Authentication Modules, Firewall.