Skip to main content

Showing 1–5 of 5 results for author: Syamsuddin, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:1310.3312  [pdf

    cs.CY cs.CR

    Multicriteria Evaluation and Sensitivity Analysis on Information Security

    Authors: Irfan Syamsuddin

    Abstract: Information security plays a significant role in recent information society. Increasing number and impact of cyber attacks on information assets have resulted the increasing awareness among managers that attack on information is actually attack on organization itself. Unfortunately, particular model for information security evaluation for management levels is still not well defined. In this study,… ▽ More

    Submitted 11 October, 2013; originally announced October 2013.

    Journal ref: International Journal of Computer Applications 69(24):22-25, May 2013

  2. A New Fuzzy MCDM Framework to Evaluate E-Government Security Strategy

    Authors: Irfan Syamsuddin, Junseok Hwang

    Abstract: Ensuring security of e-government applications and infrastructures is crucial to maintain trust among stakeholders to store, process and exchange information over the e-government systems. Due to dynamic and continuous threats on e-government information security, policy makers need to perform evaluation on existing information security strategy as to deliver trusted e-government services. This pa… ▽ More

    Submitted 12 November, 2010; originally announced November 2010.

    Comments: IEEE 4th International Conference on Application of Information and Communication Technologies AICT2010

  3. arXiv:1009.3626   

    cs.CR

    A Survey on Low-cost RFID Authentication Protocols

    Authors: Irfan Syamsuddin, Song Han, Vidyasagar Potdar, Tharam Dillon

    Abstract: This paper presents a survey on several RFID authentication protocols under low cost restrictions. Low cost RFID are mainly addressed with limited security and privacy protections. In this study, we explore several protocols with various authentication mechanisms found in literature that satisfy low cost restrictions. Assessments of these protocols are based on data protection, tracking protection… ▽ More

    Submitted 2 February, 2012; v1 submitted 19 September, 2010; originally announced September 2010.

    Comments: Submitted to the International Journal of Computer Systems Science and Engineering

  4. A Survey of RFID Authentication Protocols Based on Hash-Chain Method

    Authors: Irfan Syamsuddin, Tharam Dillon, Elizabeth Chang, Song Han

    Abstract: Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication. Although the protocols able to provide specific solution for RFID security and privacy problems, they fail to provide integrated solution. This arti… ▽ More

    Submitted 14 August, 2010; originally announced August 2010.

    Comments: Third ICCIT 2008 International Conference on Convergence and Hybrid Information Technology

  5. The Application of AHP Model to Guide Decision Makers: A Case Study of E-banking Security

    Authors: Irfan Syamsuddin, Junseok Hwang

    Abstract: Changes in technology have resulted in new ways for bankers to deliver their services to costumers. Electronic banking systems in various forms are the evidence of such advancement. However, information security threats also evolving along this trend. This paper proposes the application of Analytic Hierarchy Process (AHP) methodology to guide decision makers in banking industries to deal with info… ▽ More

    Submitted 2 July, 2010; originally announced July 2010.

    Comments: 5 pages