Mohammed Al Zomai

According to our database1, Mohammed Al Zomai authored at least 6 papers between 2007 and 2010.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
The Mobile Phone as a Multi OTP Device Using Trusted Computing.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Display security for online transactions: SMS-based authentication scheme.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

2008
Strengthening SMS-Based Authentication through Usability.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems.
Proceedings of the Sixth Australasian Information Security Conference, 2008

2007
Usability and Privacy in Identity Management Architectures.
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007

Security Usability Principles for Vulnerability Analysis and Risk Assessment.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007


  Loading...