Advanced Search Results For "Alhothaily, Abdulrahman"
Your filters
An Attribute-Based Encryption Scheme to Secure Fog Communications
Publication Type: Academic Journal
Source(s): IEEE Access, Vol 5, Pp 9131-9138 (2017)
Abstract: Fog computing is deemed as a highly virtualized paradigm that can enable computing at the Internet of Things devices, residing in the edge of the network, for the purpose of delivering services and applications more efficiently and effectively. Since f...
A Secure and Practical Authentication Scheme Using Personal Devices
Publication Type: Academic Journal
Source(s): IEEE Access, Vol 5, Pp 11677-11687 (2017)
Abstract: Authentication plays a critical role in securing any online banking system, and many banks and various services have long relied on username/password combos to verify users. Memorizing usernames and passwords for a lot of accounts becomes a cumbersome ...
QuickCash: Secure Transfer Payment Systems
Publication Type: Academic Journal
Source(s): Sensors, Vol 17, Iss 6, p 1376 (2017)
Abstract: Payment systems play a significant role in our daily lives. They are an important driver of economic activities and a vital part of the banking infrastructure of any country. Several current payment systems focus on security and reliability but pay les...
SecureGuard: A Certificate Validation System in Public Key Infrastructure.
Publication Type: Academic Journal
Source(s): IEEE Transactions on Vehicular Technology; Jun2018, Vol. 67 Issue 6, p5399-5408, 10p
Abstract: Copyright of IEEE Transactions on Vehicular Technology is the property of IEEE and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, d...
QuickCash: Secure Transfer Payment Systems.
Publication Type: Academic Journal
Source(s): Sensors (14248220); Jun2017, Vol. 17 Issue 6, p1376, 20p
Abstract: Copyright of Sensors (14248220) is the property of MDPI and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email artic...
X.509 Check: A Tool to Check the Safety and Security of Digital Certificates.
Publication Type: Conference
Source(s): 2015 International Conference on Identification, Information & Knowledge in the Internet of Things (IIKI); 2015, p130-133, 4p
A novel verification method for payment card systems.
Publication Type: Academic Journal
Source(s): Personal & Ubiquitous Computing; Oct2015, Vol. 19 Issue 7, p1145-1156, 12p, 7 Diagrams, 1 Chart
Abstract: Copyright of Personal & Ubiquitous Computing is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, ...
Fog Computing for the Internet of Things: Security and Privacy Issues
Publication Type: Periodical
Source(s): IEEE Internet Computing; March 2017, Vol. 21 Issue: 2 p34-42, 9p
Abstract: The inherent characteristics of Internet of Things (IoT) devices, such as limited storage and computational power, require a new platform to efficiently process data. The concept of fog computing has been introduced as a technology to bridge the gap be...
Secure Authentication Scheme Using Dual Channels in Rogue Access Point Environments.
Publication Type: Book
Source(s): Wireless Algorithms, Systems & Applications (9783319077819); 2014, p554-563, 10p
Towards More Secure Cardholder Verification in Payment Systems.
Publication Type: Book
Source(s): Wireless Algorithms, Systems & Applications (9783319077819); 2014, p356-367, 12p