In today's rapidly evolving technological scenario, mobile computing devices are always at an increased risk of being attacked and exploited. Mobile security challenges comprise …
J Cashion, M Bassiouni - 7th International Conference on …, 2011 - ieeexplore.ieee.org
The proliferation of social and collaborative media has been accompanied by an increased level of cyber attacks on social networking and collaboration sites. One serious type of attack …
A Alabrah, J Cashion, M Bassiouni - International journal of information …, 2014 - Springer
The exponential growth in the use of mobile phones and tablets to gain wireless access to the Internet has been accompanied by a similar growth in cyber attacks over wireless links to …
J Cashion, M Bassiouni - Proceedings of the 7th ACM symposium on …, 2011 - dl.acm.org
With the recent explosion in wireless hotspots, more and more users find themselves browsing the internet in an insecure manner. This is due to the typical lack of security in the …
A Alabrah, M Bassiouni - 2012 IEEE Global Communications …, 2012 - ieeexplore.ieee.org
One-way hash chains are a popular cryptographic technique used in many security applications. In this paper, we present a two-tier one-way hash chain (TTOHC) protocol to …
Este periodo doctoral ha sido un camino de gran aprendizaje. Un camino con sus picos, valles, aventuras, obstáculos... todos ellos merecen ser vividos. Y es que una tesis no es …
Web-based applications often use cookies to maintain state in HTTP protocol. However the uses of cookie have grown far beyond their original intention. Cookies are used to store …
In this dissertation, new approaches that utilize the one-way cryptographic hash functions in designing improved network security protocols are investigated. The proposed approaches …
A large number of web sites, including e-commerce and famous websites such as Hotmail, Gmail, Yahoo mail, Hi5, and Face-book, are vulnerable to Session Hijacking, whereby a …