Master of Science in Information Security - 2014
Collection home page
Collection's Items (Sorted by Submit Date in Descending order): 1 to 11 of 11
Issue Date | Title | Author(s) |
2014-05-26 | Detecting the Ghost Riders in Android App's Based on Declared Permissions | Wickramasekara, L.A.D.L. |
2014-05-26 | Enhancing Tiger Auditing Tool for Linux Systems and Services | Jayamanna, N.K.I.S. |
2014-05-26 | Router Level Security
Solution For SOHO | Kodippili, N.H. |
2014-05-26 | Key Exchange Protocol for Cuubez|Rest Framework | Hewage, R.U. |
2014-05-26 | Secure Provident Fund Data Management System | Chandrasena, S. |
2014-05-26 | Security Framework to Protect NFC Mobile Wallet for Railway Ticketing | Samarakoon, K.C.T. |
2014-05-26 | Authentication As A Service (AAAS) | Tennakoon, T.M.K.B |
2014-05-26 | ILSB: Indexing with Least Significant Bit Algorithm for Effective Data Hiding | Senarathne, A.N. |
2014-05-26 | Database Pluggable Authentication
Server | Sampath, N.U.U. |
2014-05-26 | Credit Card Fraud Mitigation System | Ariyaratne, H.K.R.P. |
2014-05-23 | Access Control for RESTful Web Services | Jayaweera, R.D. |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 11 of 11