Nigeria: Cyber Space Security Vis a Vis Computerisation, Miniaturisation and Location-Based Authentication.
Muhammad AdekaMohammad NgalaMohammad S. Bin-MelhaE. IbrahimSimon J. ShepherdIssa T. E. ElferganiAsh S. HussainiFauzi ElmegriRaed Abd-AlhameedPublished in: WICON (2014)
Keyphrases
- security requirements
- security analysis
- cyber defense
- security mechanisms
- user authentication
- identity authentication
- cyber security
- authentication protocol
- data encryption
- network security
- fuzzy vault
- intrusion detection
- authentication scheme
- identity based cryptography
- cyber physical
- biometric template
- encryption decryption
- elliptic curve cryptography
- authentication mechanism
- integrity verification
- authentication systems
- biometric authentication
- high security
- cyber physical systems
- security level
- cyber attacks
- smart card
- identity theft
- security model
- security issues
- social networking
- information security