[PDF][PDF] Design a resilient network infrastructure security policy framework

A Bhardwaj… - Indian Journal …, 2016 - sciresol.s3.us-east-2.amazonaws …
The information security policy development life cycle tend to lack focus on use of standard
terms and semantics. This results in blurred outlines for monitoring, evaluation and …

[PDF][PDF] Reliable and authenticated rumor riding protocol for unstructured peer-to-peer network

MS Christo, S Meenakshi - Indian Journal …, 2016 - sciresol.s3.us-east-2.amazonaws …
Objectives: Due to the distributed network topology of peer-to-peer network, there are high
possibilities for the malicious node, thereby making security a very important criterion in …

[PDF][PDF] An Efficient Approach to Resolve Covert Channels.

MA Elsadig, YA Fadlalla - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
The competitive edge of many companies and public trust in government institutions can
often depend on the security of the information held in their systems. Breaches of that …

[PDF][PDF] Authenticating Clients without using their Login IDs through Mind Metrics

DBK Kamesh, KR Krishna, JKR Sastry - Indian Journal of Science …, 2016 - academia.edu
Abstract Background/Objectives: The main objective of this paper is to provide a novel
method of identification and authentication of a user through a process of enhancing the …

[DOC][DOC] Authenticating Clients without using their Login IDs through Mind Metrics

KR Krishna, DBK Kamesh, JKR Sastry - researchgate.net
Authenticating Clients without using their Login IDs through Mind Metrics K.Rama Krishna, Dr.
DBKKamesh, Dr.JKRSastry kurapati438@gmail.com, kameshdbk@kluniversity.in …

[引用][C] A Survey on Mind Metrics

DBK Kamesh - 2016