Lawan Ahmed Mohammed

Lawan A. Mohammed is currently an Assistant Professor in Computer Science and Engineering Technology Department at King Fahd University of Petroleum and Minerals (HBCC Campus), Saudi Arabia. His main research interests are in the design of Authentication Protocols for both wired and wireless networks, Wireless Mobility, Group Oriented Cryptography, Smartcard Security, and Mathematical Programming.

Publications

Access Control Framework for Cloud Computing
Kashif Munir, Lawan A. Mohammed. © 2019. 14 pages.
Access control is generally a rule or procedure that allows, denies, restricts or limit access to system's resources. It may, as well, monitor and record all attempts made to...
Security Challenges for Cloud Computing Development Framework in Saudi Arabia
Lawan A. Mohammed, Kashif Munir. © 2018. 16 pages.
In recent years, cloud computing or on-demand computing technologies and applications have become ubiquitous, permeating every aspect of our personal and professional lives....
Handbook of Research on Security Considerations in Cloud Computing
Kashif Munir, Mubarak S. Al-Mutairi, Lawan A. Mohammed. © 2015. 408 pages.
Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the technology changing so rapidly, it is...
Security Challenges for Cloud Computing Development Framework in Saudi Arabia
Lawan A. Mohammed, Kashif Munir. © 2015. 16 pages.
In recent years, cloud computing or on-demand computing technologies and applications have become ubiquitous, permeating every aspect of our personal and professional lives....
Access Control Framework for Cloud Computing
Kashif Munir, Lawan A. Mohammed. © 2015. 12 pages.
Access control is generally a rule or procedure that allows, denies, restricts or limit access to system's resources. It may, as well, monitor and record all attempts made to...
ICT Security Policy: Challenges and Potential Remedies
Lawan A. Mohammed. © 2012. 17 pages.
Computer crime is now becoming a major international problem, with continual increases in incidents of cracking, hacking, viruses, worms, bacteria and the like having been...
Policy for Mobile Devices to Access Grid Infrastructure
Kashif Munir, Lawan A. Mohammed. © 2012. 16 pages.
Mobile devices are gradually becoming prevalent in our daily life, enabling users in the physical world to interact with the digital world conveniently. Mobile devices...
Cases on ICT Utilization, Practice and Solutions: Tools for Managing Day-to-Day Issues
Mubarak S. Al-Mutairi, Lawan Ahmed Mohammed. © 2011. 346 pages.
Information Communication Technology is one of the fastest advancing areas in our modern time. Gaining attention over the past few decades, ICT is one of the cornerstones of our...
ICT Security Policy: Challenges and Potential Remedies
Lawan A. Mohammed. © 2011. 17 pages.
Computer crime is now becoming a major international problem, with continual increases in incidents of cracking, hacking, viruses, worms, bacteria and the like having been...
Policy for Mobile Devices to Access Grid Infrastructure
Kashif Munir, Lawan A. Mohammed. © 2011. 16 pages.
Mobile devices are gradually becoming prevalent in our daily life, enabling users in the physical world to interact with the digital world conveniently. Mobile devices...
On The Design of Secure ATM System
Lawan A. Mohammed. © 2011. 21 pages.
Over the past three decades, consumers have been largely depending on and trust the Automatic Teller Machine, better known as ATM machine to conveniently meet their banking...
Wireless LAN Setup and Security Loopholes
Biju Issac, Lawan A. Mohammed. © 2009. 28 pages.
This chapter gives a practical overview of the brief implementation details of the IEEE802.11 wireless LAN and the security vulnerabilities involved in such networks....
Security Issues in Pervasive Computing
Lawan Ahmed Mohammed, Kashif Munir. © 2009. 22 pages.
The change in physical structures of computing facilities into small and portable devices, or even wearable computers, has enhanced ubiquitous information processing. The basic...
Vulnerability Analysis and Defenses in Wireless Networks
Lawan A. Mohammed, Biju Issac. © 2008. 16 pages.
This chapter shows that the security challenges posed by the 802.11 wireless networks are manifold and it is therefore important to explore the various vulnerabilities that are...
Cybercafé Systems Security
Lawan Ahmed Mohammed. © 2008. 17 pages.
This chapter introduces the vulnerability and security issues associated with the use and operations of Internet cafés or cybercafés by demonstrating different methods of...
Wireless LAN Setup and Security Loopholes
Biju Issac, Lawan A. Mohammed. © 2007. 31 pages.
This chapter gives a practical overview of the brief implementation details of the IEEE802.11 wireless LAN and the security vulnerabilities involved in such networks....