Volume 4 Number 1 March 2013

    
Password Security Awareness in African Countries within the Context of Password Security Purgatory

Muhammad Adeka, Simon Shepherd, Raed Abd-Alhameed

https://doi.org/

Abstract In spite of the existence of more attack-resistant authentication schemes, passwords are the most popular means of access control. They also constitute the first line of defence in cyber-based security systems. Unfortunately, the twin problem of multiplicity of passwords combined with destructive human factors has resulted in numerous rules which have made password management cumbersome. The resultant evasive tendency on... Read More


New Key Agreement Protocols Providing Explicit Authentication

Mohamed Nabil, Yasmine Abouelseoud, Galal Elkobrosy, Amr Abdelrazek

https://doi.org/

Abstract Establishing a common secret key between two or more entities is an essential component of any security system. In this paper, the problem of establishing a shared session key in an authenticated way is addressed. The proposed key agreement protocols support explicit authentication. The protocols are designed in such a way that permits a trusted third party, such as a... Read More


Security Countermeasures Selection Using Attack Graphs

Mohammed Alhomidi, Martin Reed

https://doi.org/

Abstract Enterprise organizations expend significant resources on security countermeasures to make sure that their networks are protected. Risk analysis is one area of information security research that aims to help organizations in making quick decisions and preventing attackers from compromising their networks. Here we use attack graphs to both display possible attack vectors in simple systems and as an analysis tool... Read More


The Particle Swarm Optimization (PSO) for Symbol Detection in MIMO-OFDM System

Abdessalem TRIMECHE, Asma BOUHLEL, Anis SAKLY, Abdellatif MTIBAA

https://doi.org/

Abstract This paper propose some solutions to improve the performance of terminals mobile transmissions at high speeds, low cost and low power consumption. Indeed, the increase in rates implies that the transmission channels are more difficult, making the task of receivers more difficult. , we are interested in solving the classical problem of detection of a linear mixture of Gaussian noise... Read More


A New Representation of Image Through Numbering Pixel Combinations

J. Said, R. Souissi, H. Hamam

https://doi.org/

Abstract A new way to represent Image consists in numbering all possible pixel combinations. Instead of defining it by a matrix of pixels, the number of the pixel combinations that corresponds to the given image is a unique identifier of this image. To store the image in a memory, we need only to write this number in a file. This new... Read More