Enhanced Bring your Own Device (BYOD) environment security based on blockchain technology
BYOD is a practice by many organizations where employees can use their personal devices for work purpose. BYOD may bring a lot of advantages, but it also leads to security issues such as data leakages. Data can be leaked because of the weak authentication technique used to verify the user and the de...
Saved in:
Main Authors: | Jamal, Fara, Abdullah@Selimun, Mohd. Taufik, Abdullah, Azizol, Mohd Hanapi, Zurina |
---|---|
Format: | Article |
Language: | English |
Published: |
Science Publishing Corporation
2018
|
Online Access: | http://psasir.upm.edu.my/id/eprint/72570/1/Enhanced%20Bring%20your%20Own%20Device.pdf http://psasir.upm.edu.my/id/eprint/72570/ https://www.sciencepubco.com/index.php/ijet/article/view/23345 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A systematic review of Bring Your Own Device (BYOD) authentication technique
by: Jamal, Fara, et al.
Published: (2020) -
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014) -
A review of bring your own device on security issues
by: Olalere, Morufu, et al.
Published: (2015) -
Bring Your Own Device (BYOD): legal protection of the employee in Malaysia
by: Ab Hamid, Zuraini, et al.
Published: (2022) -
The effect of Bring your own device (BYOD) implementation / Suhaimi Daud
by: Daud, Suhaimi
Published: (2016)