The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
In recent times, migrating from touch-based input systems to gesture recognition based touchless input systems has become one of the major research problems, considering the health hazards exposed in public usages of the devices. The problem still remains mostly unsolved as such a system having the properties of being low-cost, ultra-low-power and easy-to-use is yet to be proposed in the literature...
This paper proposes a new electronic voting (e-voting) scheme that exploits confirmation numbers (CNs) and revised simplified verifiable re-encryption mixnet (R-SVRM). R-SVRM is a recently introduced mechanism of mixnet also used to develop an e-voting scheme where a vote is decomposed to protect its voter from being coerced to cast a particular vote. Though the scheme avoids complicated zero knowledge...
Pedestrian counting is required in diversified places such as shopping malls, touristic spots, etc., however, a low-cost solution to this problem is yet to be proposed in the literature. Therefore, in this paper, we propose a new solution for pedestrian counting that exploits only a small number of COTS sensors (94% less than that used in the existing Eco-Counter [1] solution). To do so, we propose...
Due to the popularity of the Near Field Communication (NFC) applications, NFC technology is being adopted by a wide variety of devices suitable for the Internet of things (IoT). However, NFC is vulnerable to numerous networking attacks such as tag manipulation. In this paper, a security-aware architecture is introduced to protect the NFC devices and associated data from several attacks. The proposed...
The application scope of VPN is increasing day by day as the organizations are creating private networks through public Internet using VPN tunneling instead of leased line. VPN protocols are classified into site-to-site and remote access VPN which exhibits different set of characteristics in terms of security mechanism. But there is no VPN preferences based on the organizational application requirements...
Typosquatting means the act of purposefully registering a domain name that is a mistype of a popular domain name. Though the concept of typosquatting ages back to 15 years, it is still a new concept in a developing country like Bangladesh, where the Internet users are growing drastically. This paper aims at analysing the typosquatting scenario of popular domains of Bangladesh. Domains are checked...
With the continuous and rapid increase in quantity and diversity of Smartphone application usage, the storage of sensitive personal and even financial information of the users is also being augmented. It creates motivation for developers of malicious applications to put more effort on discovering ways to identify and exploit the vulnerabilities of utility applications and grab the sensitive information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.