To search, Click below search items.
All Published Papers Search Service
Title
Comparison of Security Patterns
Author
David G. Rosado, Eduardo Fern?ndez-Medina, Mario Piattini
Vol. 6 No. 2 pp. 139~146
Keywords
Security, Security Patterns, Security Architecture
A Method for Face and Iris Feature Fusion in Identity Authentication
Jun-ying Gan, Yu Liang
Vol. 6 No. 2 pp. 135~138
Novel Authentication Algorithm ? Public Key Based Cryptography in Mobile Phone Systems
Gy?z? G?dor, S?ndor Imre Dr.
Vol. 6 No. 2 pp. 126~134
Authentication, public-key, cryptography, mobile security
A Novel Solution of Mobile Agent Security:Task-Description-Based Mobile Agent
Haiyan Che, Dali Li, Jigui Sun, Haibo Yu
Vol. 6 No. 2 pp. 121~125
mobile agent, security, task description, Proxy/Manage Agency, trust model