Mutual Authentication with Malware Protection for RFID System
DOI: 10.5176/978-981-08-7656-2_ITS20100-37
Authors: Biplob Ray, Morshed U. Chowdhury and Thao Pham
Preventing Web Browser From Cyber Attack
DOI: 10.5176/2251-2233_ITS21
Authors: Nor Fatimah Awang, Arniyati Ahmad and Siti Rohaidah Ahmad
Privacy Protection by Anonymizing Based on Status of Provider and Community
DOI: 10.5176/2251-2233_ITS13
Authors: Kazutomo Hamamoto, Yasuyuki Tahara and Akihiko Ohsuga
Process Improving Web Automation for Construction Projects
DOI: 10.5176/2251-2233_ITS3
Authors: Kishore Kosuri, Murtaza Hussain Shaikh and Dilip Kosuri
SECREt: Potential Vulnerability Discovery using Loophole Analysis
DOI: 10.5176/978-981-08-7656-2_ITS20100-32
Authors: Curtis Busby-Earle and Ezra K. Mugisa
Secure Mobile Ad-Hoc Network (MANET) Using Trust Feature In Friendship Mechanism
DOI: 10.5176/978-981-08-7656-2_ITS20100-41
Authors: M.T Hatim, M.D Zulkhairi, P. Nurnasran, H.M.Zabidin, O. Azliza and Abas Md Said
Wireless Physical Layer Security
DOI: 10.5176/978-981-08-7656-2_ITS20100-20
Authors: Yue Wu, Ping Yi and Jianhua Li
