Protection Against Internal Intruding using Host Identifier Authentication
Network security has become one of the most important interesting areas for researches. Protecting the network can be done by many mechanisms. Among the most effective one is the network firewall. While the firewall protecting the network from the external intruding, it does upward nothing about the...
Saved in:
| Main Authors: | Basil Alkhayaat, Abdulsattar khidhir, Omar Ibraheem |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Mosul University
2009-03-01
|
| Series: | Al-Rafidain Journal of Computer Sciences and Mathematics |
| Subjects: | |
| Online Access: | https://csmj.mosuljournals.com/article_163780_6d3d2fade6c910f54b539808edcb4a07.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Identity authentication scheme of Android client based on identifiers
by: Ya-wei WANG, et al.
Published: (2017-04-01) -
Researcb on Progress of Identifier Mecbanisms in Future Internet Arcbitecture
by: Ling Cai, et al.
Published: (2014-09-01) -
On the issue of ensuring secure access to information systems using biometric authentication based on a fuzzy image of the user’s identity and neural network transformations
by: O. I. Bokova, et al.
Published: (2024-01-01) -
The Legal Protection in The Use of Authentic Deeds in The Patent License Agreements
by: Silvia Sofiatunnisa Mulyana, et al.
Published: (2024-08-01) -
Development and trend of IoT identifier technology
by: Ye TIAN, et al.
Published: (2018-06-01)