-
1
Cloud computing sensitive data protection using multi layered approach
Published 2016Get full text
Conference or Workshop Item -
2
Dynamic colour text steganography model using rgb coding and character spacing to improve capacity, invisibility and security
Published 2022Subjects: “…Data protection…”
Get full text
Thesis -
3
Access control model based on trust, purpose, and role in materialized view for privacy protection
Published 2019Subjects: “…Data protection…”
Get full text
Thesis -
4
Robust communication in differential relay protection using wireless technique
Published 2015Subjects: Get full text
Thesis -
5
Secure authentication for sensitive digital systems in mobile devices
Published 2016Subjects: “…Data protection…”
Get full text
Thesis -
6
-
7
Information security policy compliance model for government agency
Published 2018Subjects: Get full text
Thesis -
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019Subjects: “…Data protection…”
Get full text
Thesis -
9
Sharp-Edges Steganography in Arabic Characters for Information Hiding
Published 2011Subjects: Get full text
Thesis -
10
Strengthening user authentication for better protection of mobile application systems
Published 2016Subjects: “…User authentication; Data protection; Data transmission; Wireless communication; Mobile application systems…”
Get full text
Article -
11
Architecture for high data availibility using server virtualization for disaster recovery
Published 2015“…Recovery platform using virtualization technology can protect a larger share of disaster recovery workloads in terms of high availability and data protection.…”
Get full text
Thesis -
12
Framework architecture on High Data Availability Server Virtualization for Disaster Recovery
Published 2018“…Thus this technique protects a larger share of disaster recovery workloads in terms of high availability and data protection.…”
Get full text
Article -
13
User generated content and the Muslim consumer in cyberspace
Published 2012“…This situation raises some issues concerning privacy, data protection and defamation with the responsibility now being more in the hands of the consumer in exercising self-restraint. …”
Get full text
Conference or Workshop Item -
14
An integrated controller for car-accessories and home/ office multimedia devices using mobile phone with security features.
Published 2009“…Today people have to use many remote controllers (or smart cards) for different applications, such as, home/ office devices, door-access, laptop/ PC data protection and cars accessories. Besides, there is a lack of a system to integrate and smartly manage all these accessories, especially remotely by using personal mobile/ hank phone. …”
Patent -
15
Effect of age on information security awareness level among young internet users in Malaysia
Published 2021“…The findings of this study reveals that there is strong significant relationship between age (18-20 years old; 21-30 years old; 31-40 years old) and information security awareness (password usage, data protection, and data backup). Besides, there is no significant relationship between age and personal data sharing. …”
Get full text
Article -
16
A new approach to data encryption based on the synchronous stream cipher with bit-level diffusion
Published 2013“…We believe that the proposed method can achieve a throughput rate that is fast enough for real-time data protection with better security.…”
Get full text
Article -
17
Light database encryption design utilizing multicore processors for mobile devices
Published 2019“…This paper addresses the problem of ensuring data protection in embedded and mobile devices while maintaining suitable device performance by mitigating the impact of encryption. …”
Get full text
Conference or Workshop Item -
18
State-of-the-art in techniques of text digital watermarking: challenges and limitations
Published 2016“…Data protection from malicious attacks and misuse has become a crucial issue. …”
Get full text
Article -
19
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
Published 2008“…There is no authentication and data protection method in RO when MN moving from one network to another, in RFC 3775, standard for MIPv6. …”
Get full text
Conference or Workshop Item