The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Text password is a very common user authentication technique. Users face a major problem, namely that of managing many site-unique and strong (i.e. non-guessable) passwords. One way of addressing this is by using a password generator, i.e. a client-side scheme which generates (and regenerates) site-specific strong passwords on demand, with minimal user input. This paper gives a detailed specification...
Service infrastructures operated by different operators with own policies are being federated to agglomerate various services. To join a federation, an operator must comply with a federation agreement. As a result, it takes time for the operator to check the consistency between own policies and the agreement, and to establish a network connection to federation's infrastructure. To ease these concerns,...
The challenges posed by the Internet of Things (IoT) render existing security measures ineffective against emerging networks and devices. These challenges include heterogeneity, operation in open environments, and scalability. In this paper, we propose SST (Secure Swarm Toolkit), an open-source toolkit for construction and deployment of an authorization service infrastructure for the IoT. The infrastructure...
This paper focuses on research device management mechanisms such as routers and switches, based on the NETCONF protocol, considered user authentication mechanisms using RADIUS-server and implementation of these mechanisms in currently being developed Eltex Network OS. Reflected the main features of NETCONF protocol — Network Configuration Protocol, produced theoretical and experimental comparison...
In order to resist unauthorized access, consumer storage devices are typically protected using a low entropy password. However, storage devices are not fully protected against an adversary because the adversary can utilize an off-line dictionary attack to find the correct password and/or run an existing algorithm for resetting the existing password. In addition, a password protected device may also...
This article observes ways and techniques that can be used to gain access to MySQL databases. HoneyPot that simulates main MySQL server functions was built in order to collect data about attacks. There is gathered a password dictionary that was collected based on attempts to gain access to MySQL HoneyPot. There are diagrams, that show distributions of attacks number at a specific time and region,...
In today's life, the mobile phone is an essential device for the modern human. The people play installed games in the mobile device to pass the time and express emotions. However, stand-alone off-line game may not require internet connection but pro-longed use predisposes bored. Therefore, multiplayer on-line game meets the needs of groups of human activity. In the almost multiplayer on-line games,...
To evaluate the security of software effectively, we built an evaluation model for software security and presented a relative calculation method. We verified the proposed evaluation metrics and method by applying them to a real web application. The evaluation results indicated the security function weakness of the web application at different time and presented a direct measurable method for the entire...
One of the major issues that must be addressed in the emerging Internet of Things (IoT) is balancing the needs of security and reasonable installation and maintenance efforts. If the security infrastructure is not relatively easy to use, it will ultimately be compromised. This paper describes the industrial deployment experience of the EZConnect security infrastructure implemented by BECS Technology,...
This paper proposes an asymmetric key based authentication framework, QRToken, for easy - to - use login to websites, SSH servers, etc., QRToken authentication use client - side locally stored RSA private key to encrypt identification information as well as other parameters, and prese nt a QR code in the form of a small two - dimensional picture that encodes the encrypted information. User takes a...
The rapid growth of the urban population is expected to further increase to 70% by 2050, therefore the demand for transport is growing exponentially and this has resulted in a cheap offer of transport systems that use yet fossil fuels, that have caused, especially in large urban agglomerations, major pollution problems, traffic congestion, oil demand [1].
Increasing numbers of remotely accessed software applications are adopting Two Factor Authentication (TFA) methods, particularly when performing sensitive actions such as payment transactions. TFA methods, though addressed several weaknesses of purely password based authentication systems, have their own challenges such as their adverse effect on usability and, most notably, the operating cost. For...
A physical security is best described as securing the perimeter of an area. Most organisation tends to focus on securing their data over the wires and overlooked threats coming from inside their premises. Servers are protected with maximum security configurations and firewall, however the server room are accessible by unauthorized personnel, access card often left behind, broken or missing main door...
This paper presents a new method of power payment based on USBKEY, it combine USBKEY hardware security methods and visualization software to provide a quick and easy secure measure of online payment method, meanwhile the integration of CARD Writer will operate electric card at the time when online payment complete, so users who use electric cards will be able to pay electricity bills indoors.
Mobile authentication systems for mobile payment often use either the web or mobile channel individually to confirm the identity request of a remote user. Most common activity in mobile commerce is done through mobile phones. The mobile phones are vulnerable to numerous security threats due to involvement of valuable financial and personal information.
Passwords had been the common mechanism for authentication in the earlier day's client-server based systems as well as in the modern day online applications. However, it is the weakest form of authentication. In today's digital world, attacker easily bypasses this form of security. The efforts of strengthening passwords are rendered meaningless by the tools that attackers use. In order to design and...
Nowadays the use of Dynamic Biometric Signature (DBS) is already an important alternative to the standard electronic signatures based on cryptographic methods. In our previous work we have concluded that every individual's movement can be defined by a set of parameters unique to that individual. Hence the verification of signature is ensured by the stability of the unique parameters during the creation...
Business operation systems in the design period, not only consider the development of related technologies, but also the selection of different kinds of software platform solutions, such as application server and relational database are particularly important. In addition to the platform operability, cost considerations also affect a large portion of the decision results. If system programmers do...
E-learning enables acquisition of knowledge and information through technologies such as computers, smartphones, tablets and wide area networks. The existence of e-learning does contribute in the field of education field such as in the university because its improve the education quality and distributing and sharing of teaching material efficiently. However, due to the open-network in which e-learning...
RFID system is one of the most important components for the construction of the Internet of Things. The wireless communication between the tag reader and the RFID tag is based on electromagnetic radiation, which is fully accessible by adversaries and brings the security and privacy problems. The RFID-based applications that are related to personal information urgently require the practical solution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.