A novel security system for computer networks / Nermin Hamza Abdelghafar ; Supervised Mervat Hassan Gheith , Bahaa Eldin M . Hassan
Material type:
- نظام آمن جديد لشبكات الحاسب [Added title page title]
- Issued also as CD
Item type | Current library | Home library | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
قاعة الرسائل الجامعية - الدور الاول | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.18.02.Ph.D.2010.Ne.N (Browse shelf(Opens below)) | Not for loan | 01010110054648000 | ||
![]() |
مخـــزن الرســائل الجـــامعية - البدروم | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.18.02.Ph.D.2010.Ne.N (Browse shelf(Opens below)) | 54648.CD | Not for loan | 01020110054648000 |
Browsing المكتبة المركزبة الجديدة - جامعة القاهرة shelves Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | ||
Cai01.18.02.Ph.D.2009.Pe.I The influence of culture on systems usability / | Cai01.18.02.Ph.D.2009.Pe.I The influence of culture on systems usability / | Cai01.18.02.Ph.D.2010.Ne.N A novel security system for computer networks / | Cai01.18.02.Ph.D.2010.Ne.N A novel security system for computer networks / | Cai01.18.02.Ph.D.2011.Ah.N A novel fuzzy cognitive map - based multiagent system / | Cai01.18.02.Ph.D.2011.Ah.N A novel fuzzy cognitive map - based multiagent system / | Cai01.18.02.Ph.D.2011.Mo.G A grid - based multi - agent system for realizng adaptive service organizations / |
Thesis (Ph.D.) - Cairo University - Institute of Statistical Studies and Research - Department of Computer and Information Science
We designed system security focusing on two main security layers which are : Authentication and database layers . In authentication layers ; we present a dynamic ID - Based authentication scheme using hardware smart token with a public key cryptography layer . The usage of smart token enhanced the scheme security and added more flexibility
Issued also as CD
There are no comments on this title.