Now showing items 1-4 of 4

    • Authenticated collaborative key agreement for dynamic peer groups 

      Rajaram, M.; Thilagavathy, D. (Universiti Malaysia Perlis, 2009-10-11)
      Many emerging network applications are based upon a group communication model. In a peer-to-peer or adhoc network which do not have a previously agreed upon common secret key, communication is susceptible to eavesdropping, ...
    • Des enabled fingerprint system 

      Gobinath, Subramaniam; Kalyani, Subramanian; Senthil, Raja Balakrishnan; Baskaran, Kaliaperumal (Universiti Malaysia Perlis, 2009-10-11)
      Biometrics systems function to identify individuals by matching a specific personal characteristic, the biometrics identifier, with one previously recorded. Biometric identification considers individual physiological ...
    • Keystroke pressure based typing biometrics authentication system by combining ANN and ANFIS-based classifiers 

      Hasimah, Ali; Martono, Wahyudi; Momoh Jimoh E., Salami (Institute of Electrical and Electronics Engineers (IEEE), 2009-03-06)
      Security of an information system depends to a large extent on its ability to authenticate legitimate users as well as to withstand attacks of various kinds. Confidence in its ability to provide adequate authentication is, ...
    • Safety & security on digital information 

      Chand, Salek (Universiti Sains MalaysiaPerpustakaan, 2007-10-31)
      The fast technological developments in recent years, especially in the field of Telecommunication, Multimedia and Digital technology, have fundamentally changed the way we generate, collect, organize, present and ...