关注
Galoh Haron
Galoh Haron
在 mimos.my 的电子邮件经过验证
标题
引用次数
引用次数
年份
Adaptive authentication based on analysis of user behavior
KAA Bakar, GR Haron
2014 Science and Information Conference, 601-606, 2014
322014
Adaptive authentication: Issues and challenges
KAA Bakar, GR Haron
2013 World Congress on Computer and Information Technology (WCCIT), 1-6, 2013
292013
Adaptive authentication: Implementing random canvas fingerprinting as user attributes factor
NI Daud, GR Haron, SSS Othman
2017 IEEE Symposium on Computer Applications & Industrial Electronics …, 2017
262017
User behaviour and interactions for multimodal authentication
GR Haron, D Maniam, LM Nen, NI Daud
2016 14th Annual Conference on Privacy, Security and Trust (PST), 309-316, 2016
102016
Re-engineering of web reverse proxy with shibboleth authentication
GR Haron, D Maniam, V Sadasivam, WH Loon
2012 International Conference for Internet Technology and Secured …, 2012
72012
A centralized multimodal unified authentication platform for web-based application
SC Seak, NK Siong, WH Loon, GR Haron
Proceedings of the World Congress on Engineering and Computer Science 1, 2014
62014
Extrapolating security requirements to an established software process: Version 1.0
GR Haron, NK Siong
2011 International Conference for Internet Technology and Secured …, 2011
62011
Revisiting secure documents with xml security: A component-based approach
GR Haron, D Maniam, STS Ngiap
2010 Developments in E-systems Engineering, 257-262, 2010
62010
Adaptive Authentication to determine login attempt penalty from multiple input sources
NI Daud, GR Haron, D Din
2019 IEEE Conference on Application, Information and Network Security (AINS …, 2019
42019
Context-Aware analysis for adaptive unified authentication platform
KAA Bakar, GR Haron
Proceedings of the 5Th International Conference on Computing & Informatics …, 2015
32015
Translation of RFC 3820 to software codes using OpenSSL primitives
GR Haron, NK Siong, TF Bee
Proceedings of the Fourth IASTED International Advances in Computer Science …, 2008
32008
Narrative of digital signature technology and moving forward
GR Haron, NI Daud, MS Mohamad
Int J Intell Comput Res (IJICR) 10 (3), 2019
12019
Executing security scanning in secure software process implementation within organization
NI Daud, SC Seak, GR Haron
Presented at International Association of Science and Technology for Development, 2011
12011
Extending security token to directly issue proxy certificate on P-GRADE portal
GR Haron, NK Siong, SC Seak, TF Bee
2009 IEEE Symposium on Industrial Electronics & Applications 2, 979-984, 2009
12009
Improvement from Proof Of Concept into the production environment: cater for highperformance capability
NI Daud, GR Haron, D Din, MS Mohamad
2020 8th International Conference on Information Technology and Multimedia …, 2020
2020
Context-aware analysis for adaptive unified authentication platform
KA Abu Bakar, GR Haron
2015
Introducing Pandanaceae Via IOS-Based Software Application
HF Mohsin, I Abdul Wahab, GR Haron
ICGSCE 2014: Proceedings of the International Conference on Global …, 2015
2015
Improvement and Enhancement in Configuration Management Process Area within the Organization
NI Daud, RA Bakar, GR Haron
International Workshop on CMMI based Software Process Improvement in Small …, 2011
2011
Issuance of Proxy Certificate Residing In Web Portal By Browser Based Digital Certificate Through HyperText Transfer Protocol
SC Seak, NK Siong, TF Bee, GR Haron
Proceedings of the International MultiConference of Engineers and Computer …, 2009
2009
Fostering evolutionary solution for Grid security with MyKad
N Abdullah, HA Shahrom, GR Haron
2008 International Symposium on Information Technology 3, 1-5, 2008
2008
系统目前无法执行此操作,请稍后再试。
文章 1–20