Informatics and Communication Technologies for Societal Development
Proceedings of ICICTS 2014
Article
Many of the network services (protocols like SSH, Telnet, HTTP, and FTP) implement password-based authentication for accessing system resources. Malicious entities carry out password guessing attacks to exploi...
Chapter and Conference Paper
Blockchain has broadened its boundaries from being a cryptocurrency application to a technology that comprises of varied domains and fields under its hood. However, applications are demanding quick services, f...
Book and Conference Proceedings
Article
With the improved processing power, graphic quality and high-speed wireless connection in recent generations of mobile phones, it looks more attractive than ever to introduce networked games on these devices. ...