Now showing items 1-3 of 3
Design, Privacy and Authentication of Challenge Questions in Online Examinations
(IEEE COMPUTER SOC, 2013-12)
Online examination is an essential part of the online learning and secure authentication is considered vital for the success of online learning. This study is part of an ongoing research on student authentication approaches ...
An Adaptive Access Control Model for Medical Data in Wireless Sensor Networks
Wireless Sensor Networks (WSNs) have recently attracted a lot of interest in the research community. The security mechanism with large overhead of computation and communication, are infeasible to apply in WSNs due to many ...
A Candour-based Trust and Reputation Management System for Mobile Ad Hoc Networks
(University of York, 2013)
The decentralized administrative controlled-nature of mobile ad hoc networks (MANETs) presents security vulnerabilities which can lead to attacks such as malicious modification of packets. To enhance security in MANETs, ...