UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1
zadetkov: 9
1.
  • Modifications of the Formal... Modifications of the Formal Risk Analysis and Assessment for the Information System Security
    El Fray, Imed; Wiliński, Artur Advances in science & technology, research journal, 01/2024, Letnik: 18, Številka: 2
    Journal Article
    Odprti dostop

    In the article, a modification of Formal Model of Risk Analysis FoMRA was proposed. The Modified FoMRA (1) method takes into account the guidelines of ISO/IEC 27001 and ISO/IEC 27005 standards. The ...
Celotno besedilo
2.
  • User Authentication Protoco... User Authentication Protocol Based on the Location Factor for a Mobile Environment
    Bartlomiejczyk, Maciej; Fray, Imed El; Kurkowski, Miroslaw ... IEEE access, 2022, Letnik: 10
    Journal Article
    Recenzirano
    Odprti dostop

    The way the internet is used by billions of users around the world has been revolutionized by mobile devices. The capabilities of smartphones are constantly growing, and the number of services ...
Celotno besedilo

PDF
3.
Celotno besedilo

PDF
4.
  • New XML Signature Scheme Th... New XML Signature Scheme That is Resistant to Some Attacks
    Wawrzyniak, Gerard; El Fray, Imed IEEE access, 2020, Letnik: 8
    Journal Article
    Recenzirano
    Odprti dostop

    Supporting the execution of transactions through the use of electronic documents requires security. The scope of this security primarily involves ensuring the integrity, authenticity and ...
Celotno besedilo

PDF
5.
  • Multifactor Authentication ... Multifactor Authentication Protocol in a Mobile Environment
    Bartlomiejczyk, Maciej; Imed, El Fray; Kurkowski, Miroslaw IEEE access, 2019, Letnik: 7
    Journal Article
    Recenzirano
    Odprti dostop

    The implementation of services that process confidential data in a mobile environment requires an adequate level of security with the strictest possible mechanisms of information protection. The ...
Celotno besedilo

PDF
6.
Celotno besedilo

PDF
7.
Celotno besedilo
8.
Celotno besedilo

PDF
9.
  • Deniable File System--Appli... Deniable File System--Application of Deniable Storage to Protection of Private Keys
    Oler, B.; El Fray, I. 6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07), 2007-June
    Conference Proceeding

    This article discusses various ideas of deniable file systems, their advantages, drawbacks and use as a storage for sensitive data (e.g. private keys for the asymmetric algorithms). Also a design of ...
Celotno besedilo
1
zadetkov: 9

Nalaganje filtrov