DE eng

Search in the Catalogues and Directories

Page: 1 2 3 4 5 6...37
Hits 21 – 40 of 723

21
Semantic-Directed Clumping of Disjunctive Abstract States *
In: POPL 2017 - 44th ACM SIGPLAN Symposium on Principles of Programming Languages ; https://hal.inria.fr/hal-01648679 ; POPL 2017 - 44th ACM SIGPLAN Symposium on Principles of Programming Languages, Jan 2017, Paris, France. pp.32-45, ⟨10.1145/3009837.3009881⟩ (2017)
BASE
Show details
22
Copredication in homotopy type theory
In: https://hal.archives-ouvertes.fr/hal-01628150 ; 2017 (2017)
BASE
Show details
23
Mobile user authentication system (MUAS) for e-commerce applications.
Molla, Rania. - 2017
Abstract: The rapid growth of e-commerce has many associated security concerns. Thus, several studies to develop secure online authentication systems have emerged. Most studies begin with the premise that the intermediate network is the primary point of compromise. In this thesis, we assume that the point of compromise lies within the end-host or browser; this security threat is called the man-in-the-browser (MITB) attack. MITB attacks can bypass security measures of public key infrastructures (PKI), as well as encryption mechanisms for secure socket layers and transport layer security (SSL/TLS) protocol. This thesis focuses on developing a system that can circumvent MITB attacks using a two-phase secure-user authentication system, with phases that include challenge and response generation. The proposed system represents the first step in conducting an online business transaction.The proposed authentication system design contributes to protect the confidentiality of the initiating client by requesting minimal and non-confidential information to bypass the MITB attack and transition the authentication mechanism from the infected browser to a mobile-based system via a challenge/response mechanism. The challenge and response generation process depends on validating the submitted information and ensuring the mobile phone legitimacy. Both phases within the MUAS context mitigate the denial-of-service (DOS) attack via registration information, which includes the client’s mobile number and the International Mobile Equipment Identity (IMEI) of the client’s mobile phone.This novel authentication scheme circumvents the MITB attack by utilising the legitimate client’s personal mobile phone as a detached platform to generate the challenge response and conduct business transactions. Although the MITB attacker may have taken over the challenge generation phase by failing to satisfy the required security properties, the response generation phase generates a secure response from the registered legitimate mobile phone by employing security attributes from both phases. Thus, the detached challenge- and response generation phases are logically linked.
Keyword: 005 Computer programming; E-commerce; Mobile User Authentication; programs & data; QA75 Electronic computers. Computer science; Security
URL: https://napier-surface.worktribe.com/1035289/1/Mobile%20user%20authentication%20system%20%28MUAS%29%20for%20e-commerce%20applications
http://researchrepository.napier.ac.uk/Output/1035289
BASE
Hide details
24
The mat sat on the cat : investigating structure in the evaluation of order in machine translation
McCaffery, Martin. - : University of St Andrews, 2017. : The University of St Andrews, 2017
BASE
Show details
25
Computational analysis of tongue image for health diagnosis
Zhang, Meng. - : University of Missouri--Columbia, 2017
In: Submited to University of Missouri--Columbia Graduate School. (2017)
BASE
Show details
26
Speech-to-text technology and education : pre-service teachers' collaborative professional development as case study
Wilcox, Kevin. - : Nipissing University, Faculty of Education, 2017
BASE
Show details
27
Speech-to-text technology and education : pre-service teachers' collaborative professional development as case study
Wilcox, Kevin. - : Nipissing University, 2017
BASE
Show details
28
Applications of Text Analytics in the Intelligence Community
Hall,Daniel M. - 2016
BASE
Show details
29
Bayesian natural language semantics and pragmatics
Zeevat, Henk; Schmitz, Hans-Christian. - Cham [u.a.] : Springer, 2015
Leibniz-Zentrum Allgemeine Sprachwissenschaft
Show details
30
Использование компьютерных программ, основанных на лингвистическом анализе ложной информации (обзор зарубежного исследования)
ХОЛЕВЧУК А.Г.. - : Общество с ограниченной ответственностью «Коллоквиум», 2015
BASE
Show details
31
Интерактивная компьютерная программа по развитию описательной связной речи для детей и взрослых с речевой патологией
ИВАНОВА НАТАЛИЯ НИКОЛАЕВНА. - : Федеральное государственное бюджетное образовательное учреждение высшего образования «Удмуртский государственный университет», 2015
BASE
Show details
32
Non-linear Second order Abstract Categorial Grammars and deletion
In: NLCS 2015: Natural Language and Computer Science ; https://hal.archives-ouvertes.fr/hal-01251127 ; NLCS 2015: Natural Language and Computer Science, Makoto Kanazawa, 2015, Kyoto, Japan (2015)
BASE
Show details
33
The Impact of the Use of Dynamic Software as a Teaching Tool in Geometry
Bouffard, Jason L., 1983-. - : Central Connecticut State University, 2015
BASE
Show details
34
Program Design: The Learner Path
In: Research Briefs and Case Studies (2015)
BASE
Show details
35
Program Design: Volunteering in a Digital Literacy Program
In: Research Briefs and Case Studies (2015)
BASE
Show details
36
Program Design: Tutor-Facilitated Digital Literacy Acquisition
In: Research Briefs and Case Studies (2015)
BASE
Show details
37
Program Design: Learning Digital Skills in a Corrections Setting
In: Research Briefs and Case Studies (2015)
BASE
Show details
38
Program Design: Learning Digital Skills in a Time-limited Program
In: Research Briefs and Case Studies (2015)
BASE
Show details
39
Dependency Tree Annotation Software
In: DTIC (2015)
BASE
Show details
40
Exploring Social Meaning in Online Bilingual Text through Social Network Analysis
In: DTIC (2015)
BASE
Show details

Page: 1 2 3 4 5 6...37

Catalogues
0
0
0
0
0
0
2
Bibliographies
0
0
0
0
0
0
0
0
19
Linked Open Data catalogues
0
Online resources
0
0
0
0
Open access documents
702
0
0
0
0
© 2013 - 2024 Lin|gu|is|tik | Imprint | Privacy Policy | Datenschutzeinstellungen ändern