CCL

Összesen 6 találat.
#/oldal:
Részletezés:
Rendezés:

1.

001-es BibID:BIBFORM122235
035-os BibID:(Scopus)85110265329
Első szerző:Ahmed, Alaa H.
Cím:Designing a secure campus network and simulating it using Cisco packet tracer / Ahmed, Alaa H. ; A. Al-Hamadani, Mokhaled N.
Dátum:2021
ISSN:2502-4752 2502-4760
Megjegyzések:The network is a massive part of life today. It participates not only on one side of life but in nearly every station, especially in educational organizations. The key aim of education is to share data and knowledge, making the network important for education. In particular, it is essential to ensure the exchange of information; thus, no one can corrupt it. To safe and trustworthy transfers between users, integrity and reliability are crucial questions in all data transfer problems. Therefore, we have developed a secure campus network (SCN) for sending and receiving information among high-security end-users. We created a topology for a campus of multi networks and virtual local area networks (VLANs') using cisco packet tracer. We also introduced the most critical security configurations, the networking used in our architecture. We used a large number of protocols to protect and accommodate the users of the SCN scheme.
Tárgyszavak:Műszaki tudományok Informatikai tudományok idegen nyelvű folyóiratközlemény külföldi lapban
folyóiratcikk
IP addresses
Network
Security
Trunk
VLAN
Megjelenés:Indonesian Journal of Electrical Engineering and Computer Science. - 23 : 1 (2021), p. 479-489. -
További szerzők:Al-Hamadani, Mokhaled N. A. (1987-) (informatics)
Internet cím:Szerző által megadott URL
DOI
Intézményi repozitóriumban (DEA) tárolt változat
Borító:

2.

001-es BibID:BIBFORM136209
Első szerző:Aldarwish, Abdulla J. Y.
Cím:Design a sturdy and secure authentication scheme capable of early detection of COVID-19 patients using WBANs / Abdulla J. Y. Aldarwish, Ali A. Yassin, Abdullah Mohammed Rashid, Hamid Ali Abed Alasadi, Aqeel Adel Yaseen, Eman Thabet Khalid
Dátum:2022
ISSN:2502-4752 2502-4760
Megjegyzések:COVID-19 was first reported in China Wuhan and rapidly grown up to more than 58 countries based on the World Health Organization (WHO). Well ahead of any health emergency, the health care server has the ability to access these data via authorization and then s/he performs necessary actions. In order to protect medical data from malicious activities, authentication is the starting point for this. Authentication systems represent a network support factor to reduce ineffective users and radically eliminate phishing because authentication determines the identity of the real user. Many schemes and technologies have been suggested for authentication in wireless body area networks (WBANs). In this paper, we suggest a strong dynamic password authentication system for WBANs. We adopt a (different/new) way to calculate a password and make it coherent and dynamic for each login session. Our work also provides additional security properties to get rid of hub node impersonation attacks and resolve key escrow issues. Our scheme resist fishing attach which keep patient from any illegal change of drugs. By comparison, the proposed scheme is considered active and has strong security based on formal security analysis tools such as AVISPA.
Tárgyszavak:Műszaki tudományok Informatikai tudományok idegen nyelvű folyóiratközlemény külföldi lapban
folyóiratcikk
Authentication
AVISPA
COVID-19
Health care
Wireless body area networks
Megjelenés:Indonesian Journal of Electrical Engineering and Computer Science. - 27 : 2 (2022), p. 900-910. -
További szerzők:Yassin, Ali A. Al-Bazooni, Abdullah Mohammed Rashid (1986-) (mérnök, informatikus) Al-Asadi, Hamid Ali Abed Yaseen, Aqeel A. Khalid, Eman Thabet
Internet cím:Szerző által megadott URL
DOI
Intézményi repozitóriumban (DEA) tárolt változat
Borító:

3.

001-es BibID:BIBFORM074144
035-os BibID:(Scopus)85050350055
Első szerző:Alhamzawi, Hussein Ali Mezher (informatikus)
Cím:Location of eyes in images of human faces through analysis variance shine intensity / Hussein Alhamzawi
Dátum:2018
ISSN:2502-4752 2502-4760
Megjegyzések:Extraction of facial features is an important step in automatic visual interpretation and recognitionof human faces. Among the facial features, the eyes play a major role in the recognition process. In thisarticle, we present an approach to detect and locate the eyes in frontal face images. Eye regions areidentified using the technique of voucher detection based on mathematical morphology. After thisidentification is made a comparison between the variances of three different portions of each candidateregion to eye (set of pixels belonging to the candidate region as a whole, set of pixels contained in aminimum rectangle circumscribed to the candidate region and set of pixels of the candidate regionbelonging to a horizontal band that crosses the center of mass of this region). The calculation of thesevariances also considers the R, G, and B channels, as well as the gray version of the input image.
Tárgyszavak:Műszaki tudományok Informatikai tudományok idegen nyelvű folyóiratközlemény külföldi lapban
folyóiratcikk
Face detection
eye center location
binarization
median filter
Megjelenés:Indonesian Journal of Electrical Engineering and Computer Science. - 11 : 3 (2018), p. 949-953. -
Internet cím:Intézményi repozitóriumban (DEA) tárolt változat
DOI
Borító:

4.

001-es BibID:BIBFORM136210
Első szerző:Hasson, Mushtaq A.
Cím:Password authentication scheme based on smart card and QR code / Hasson, Mushtaq ; Yassin, Ali A. ; Yassin, Abdulla J. ; Rashid, Abdullah Mohammed ; Yaseen, Aqeel A. ; Alasadi, Hamid
Dátum:2021
ISSN:2502-4752 2502-4760
Megjegyzések:As a hopeful computing paradigm, cloud services are obtainable to end users based on pay-as-you-go service. Security is represented one of the vital issues for the extended adoption of cloud computing, with the object of accessing several cloud service providers, applications, and services by using anonymity features to authenticate the user. We present a good authentication scheme based on quick response (QR) code and smart card. Furthermore, our proposed scheme has several crucial merits such as key management, mutual authentication, one-time password, user anonymity, freely chosen password, secure password changes, and revocation by using QR code. The security of proposed scheme depends on crypto-hash function, QR-code validation, and smart card. Moreover, we view that our proposed scheme can resist numerous malicious attacks and are more appropriate for practical applications than other previous works. The proposed scheme has proved as a strong mutual authentication based on burrows-abadi-needham (BAN) logic and security analysis. Furthermore, our proposed scheme has good results compared with related work
Tárgyszavak:Műszaki tudományok Informatikai tudományok idegen nyelvű folyóiratközlemény külföldi lapban
folyóiratcikk
Biometric
Cloud computing
Dynamic authentication
QR-code
Smart card
User anonymity
Megjelenés:Indonesian Journal of Electrical Engineering and Computer Science. - 23 : 1 (2021), p. 140-149. -
További szerzők:Yassin, Ali A. Yassin, Abdulla J. Al-Bazooni, Abdullah Mohammed Rashid (1986-) (mérnök, informatikus) Yaseen, Aqeel A. Alasadi, Hamid
Internet cím:Szerző által megadott URL
DOI
Intézményi repozitóriumban (DEA) tárolt változat
Borító:

5.

001-es BibID:BIBFORM136211
035-os BibID:(Scopus)85102489002
Első szerző:Leaby, Akeel Kassim
Cím:Towards design strong emergency and COVID-19 authentication scheme in VANET / Leaby, Akeel Kassim ; Yassin, A. ; Hasson, Mushtaq ; Rashid, Abdullah
Dátum:2021
ISSN:2502-4752 2502-4760
Megjegyzések:The wide use of vehicular ad hoc networks (VANETs) in the last decade has led many researchers to find efficient and reliable methods to obtain the desired benefits and offer services, such as healthcare and traffic management. However, VANETs suffer from security issues represented by authentication and data integrity. In this paper, we propose a robust mutual authentication scheme based on elliptic curve cryptography (ECC), cryptography Hash Function, and a pseudonym. The proposed work was twofold in focus: first, on healthcare in emergency cars which use VANETs, and second, on overcoming security issues, such as resisting familiar attacks (e.g. insider attacks and reply attacks). Because of the serious situation generated by the worldwide outbreak of the Covid-19 epidemic, we also found this research valuable in supporting global efforts to combat the rapid spread of this virus, by finding the safest and fastest routes to epidemic treatment centres for medical staff, assistance teams in medical operations, fumigation control, and all work teams associated with disease control. This research attempts to contribute by proposing a special signal used to define epidemic teams. The best route, fast route can be chosen by using VANETs infrastructure. This scheme also deals with metric security features, such as key management, data integrity, and data privacy. In the communication and computation cost, we noticed that our proposed scheme achieved good results compared with the related works.
Tárgyszavak:Műszaki tudományok Informatikai tudományok idegen nyelvű folyóiratközlemény külföldi lapban
folyóiratcikk
Authentication COVID-19 ECC Emergency vehicles Insider attacks VANET
Megjelenés:Indonesian Journal of Electrical Engineering and Computer Science. - 21 : 3 (2021), p. 1808-1819. -
További szerzők:Yassin, Ali A. Hasson, Mushtaq A. Al-Bazooni, Abdullah Mohammed Rashid (1986-) (mérnök, informatikus)
Internet cím:Szerző által megadott URL
DOI
Intézményi repozitóriumban (DEA) tárolt változat
Borító:

6.

001-es BibID:BIBFORM136212
Első szerző:Yassin, Ali A.
Cím:A novel image encryption scheme based on DCT transform and DNA sequence / A. Yassin, Ali; Mohammed Rashid, Abdullah; J. Yassin, Abdulla; Alasadi, Hamid
Dátum:2021
ISSN:2502-4752 2502-4760
Megjegyzések:Recently, the concept of DNA has been invested in computing technology in different ways which linking information technology and biological sciences. However, the DNA encryption scheme has drawbacks such as expensive experimental equipment and hard to hold its biotechnology. Additionally, during careful cryptanalysis that applied to most of these image encryption schemes, we notice that DNA can only influence one DNA base, which causes poor diffusion. Our proposed scheme is not applied complex biological operation but just is given to improve the diffusion ability of image encryption scheme by using DNA sequence and DCT transform. Furthermore, empirical results on real images and security analysis demonstrate that our scheme not only has flexibility and efficiency encryption scheme but also has the ability to resist well-known attacks such as entropy attack and statistical attack. Additionally, our work enjoys several strong characteristics as follows: (1) the decryption error is very low to recover the original image; (2) Once key for each encryption process and if the user wants to use the same key in many times, our scheme supports secret key sensitivity; (3) the value of correlation of the encrypted image is null.
Tárgyszavak:Műszaki tudományok Informatikai tudományok idegen nyelvű folyóiratközlemény külföldi lapban
folyóiratcikk
Cryptanalysis
DCT transform
DNA sequence
Image encryption
Megjelenés:Indonesian Journal of Electrical Engineering and Computer Science. - 21 : 3 (2021), p. 1455-1464. -
További szerzők:Al-Bazooni, Abdullah Mohammed Rashid (1986-) (mérnök, informatikus) Yassin, Abdulla J. Alasadi, Hamid
Internet cím:Szerző által megadott URL
DOI
Intézményi repozitóriumban (DEA) tárolt változat
Borító:
Rekordok letöltése1