Showing 1 - 19 results of 19 for search '"data protection"', query time: 0.08s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Strengthening user authentication for better protection of mobile application systems by Mohamed, Kartini, A. Jabar, Marzanah, Ishak, Iskandar, Salimin, Norahana, Salleh, Nor Safwan Amirul, Hamzah, Abdul Qaiyum, Jarno, Ahmad Dahari, Pauzi, Muhamad Faeez

    Published 2016
    Subjects: “…User authentication; Data protection; Data transmission; Wireless communication; Mobile application systems…”
    Get full text
    Article
  11. 11

    Architecture for high data availibility using server virtualization for disaster recovery by Mohd Sahalan @ Salam, Maznifah

    Published 2015
    “…Recovery platform using virtualization technology can protect a larger share of disaster recovery workloads in terms of high availability and data protection.…”
    Get full text
    Thesis
  12. 12

    Framework architecture on High Data Availability Server Virtualization for Disaster Recovery by Kassim, Murizah, Mohd Sahalan @ Salam, Maznifah, Udzir, Nur Izura

    Published 2018
    “…Thus this technique protects a larger share of disaster recovery workloads in terms of high availability and data protection.…”
    Get full text
    Article
  13. 13

    User generated content and the Muslim consumer in cyberspace by Saidin, Aznan Zuhid, Abu Bakar, Elistina

    Published 2012
    “…This situation raises some issues concerning privacy, data protection and defamation with the responsibility now being more in the hands of the consumer in exercising self-restraint. …”
    Get full text
    Conference or Workshop Item
  14. 14

    An integrated controller for car-accessories and home/ office multimedia devices using mobile phone with security features. by Khatun, Sabira, Zarrin, Javad, Mamdouhi, Fatemeh

    Published 2009
    “…Today people have to use many remote controllers (or smart cards) for different applications, such as, home/ office devices, door-access, laptop/ PC data protection and cars accessories. Besides, there is a lack of a system to integrate and smartly manage all these accessories, especially remotely by using personal mobile/ hank phone. …”
    Patent
  15. 15

    Effect of age on information security awareness level among young internet users in Malaysia by Omar, Siti Zobidah, Kovalan, Krishnapriyaa, Bolong, Jusang

    Published 2021
    “…The findings of this study reveals that there is strong significant relationship between age (18-20 years old; 21-30 years old; 31-40 years old) and information security awareness (password usage, data protection, and data backup). Besides, there is no significant relationship between age and personal data sharing. …”
    Get full text
    Article
  16. 16

    A new approach to data encryption based on the synchronous stream cipher with bit-level diffusion by Muda, Zaiton, Ab. Ahfaidha, Abdeladeem, Udzir, Nur Izura, Mahmod, Ramlan

    Published 2013
    “…We believe that the proposed method can achieve a throughput rate that is fast enough for real-time data protection with better security.…”
    Get full text
    Article
  17. 17

    Light database encryption design utilizing multicore processors for mobile devices by Alomari, Mohammad Ahmed, Yusoff, Mohd Hafiz, Samsudin, Khairulmizam, Ahmad, R. Badlishah

    Published 2019
    “…This paper addresses the problem of ensuring data protection in embedded and mobile devices while maintaining suitable device performance by mitigating the impact of encryption. …”
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Secured route optimization in mobile IPv6 wireless networks in terms of data integrity by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…There is no authentication and data protection method in RO when MN moving from one network to another, in RFC 3775, standard for MIPv6. …”
    Get full text
    Conference or Workshop Item