Browsing by Subject "security"

Sort by: Order: Results:

  • Unknown author (IEEE, 2011)
    In general service providing systems, user authentication is required for different purposes such as billing, restricting unauthorized access, etc. A good solution is to use pseudonyms as temporary identities. On the ...
  • Amro, Belal (MECS Press - I.J. Wireless and Microwave Technologies, 2018-09)
    According to Palestinian police records, cybercrimes have become common last few years in Palestine. The most commonly reported cybercrimes are mainly based on social networks to hack victims asking for some service. Many ...
  • Amro, Belal (International Journal of Mobile Network Communications & Telematics, 2017-12)
    Mobile devices have become very popular nowadays, due to is portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware ...
  • Amro, Belal (IJCSNS International Journal of Computer Science and Network Security,, 2018-01)
    Mobile malware has increased rapidly last 10 years. This rapid increase is due to the rapid enhancement of mobile technology and their power to do most work for their users. Since mobile devices are personal devices, then ...
  • Amro, Belal (AIRCC Publishing Corporation, 2018-01)
    Vehicular ad hoc networks VANETs use pseudonyms to communicate among them and with roadside units, these pseudonyms are used to authenticate these vehicles and to hide real identities behind these pseudonyms, to better ...
  • Amro, Belal; zaid, abu znaid (AL-Rafidain Journal of Computer Sciences and Mathematics, 2021-12-16)
    Mobile malware has become a very hot research topic in the last few years, and this was due to the widespread usage of mobile devices all over the world. Like other systems, mobile devices are prune to different attacks ...