Quantcast
Channel: Faculty of Physical Sciences, University of Nigeria
Viewing all articles
Browse latest Browse all 693

Research Archive

$
0
0

Eneh, H. A., Singh, H., and Gemikonakli, O., A three-way authentication framework for IEEE 802.11b networks, Proceedings of the 4th International Network Conference INC’04, Plymouth, UK, ISBN 1-84102-125-3, (2004), pp 345-352

Eneh, H. A. and Gemikonakli, O., Analysis of security protocols for authentication in distributed systems, in the Proceedings of International Conference on Applied Computing IADIS’05, Algarve, Portugal, (2005), pp 301-305

Eneh, H. A. and Gemikonakli, O., An approach for the analysis of security standards for authentication in distributed systems, Proceedings of the 3rd International Workshop on Security in Information Systems, ICEIS WOSIS’05, Miami, USA, May 2005, pp 21-30.


Kirsal, Y., Eneh, H. A., and Gemikonakli, O., A solution to the problem of trusted third party in IEEE 802.11b networks, Proceedings of PGNET conference’05. Liverpool, June 2005, pp 333-340.

Eneh, H. A., Gemikonakli, O., and Comley, R., Towards the modeling of authentication protocol attacker, Proceedings of 5th Annual Security conference’06. Las Vegas, Nevada, USA, April 2006.

Eneh, H. A., Gemikonakli, O., and Comley, R., Security of electronic commerce authentication protocols in economically deprived communities, Proceedings of 5th Annual Security conference’06. Las Vegas, Nevada, USA, April 2006.

Eneh, H. A. (Extended Abstract), A methodology for analysis of security standards for authentication in distributed information processing systems, Proceedings of PREP 2005 Conference, Lancaster, UK, 2005, pp 46-47

Eneh, A., Design and analysis of pre-emptive authentication protocols: an assistive framework for securing distributed systems in hostile environments, A PhD Thesis submitted to the School of Computing Science, Middlesex University, London, August 2006.

Kirsal, Y., Eneh, A., Gemikonakli, O., and Mustarda, L., Modelling Attacker with Deciding Security Properties by Induction and Deduction, In the Proceedings of the Ninth International Symposium on Frontiers of Information Systems and Network Applications, In conjunction with the 27th IEEE

International Conference on Advanced Information and Networking Applications (AINA-2003), Barcelona, Spain, March 25-28, 2013

Kirsal, Y., Eneh, A., Gemikonakli, O., and Mustarda
L., Analysing the combined Kerberos Timed
Authentication Protocol and Frequent Key Renewal
using CSP and Rank Functions. Appearing in the
KSII Transactions on Internet and Information
Systems. ID: TIIS-RP-2014-Apr-0513.RI.


Viewing all articles
Browse latest Browse all 693

Trending Articles