The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Pidgin communicator is a multiprotocol instant messenger client, developed by open source community. It was originally a third party client of AIM (AOL Instant Messenger) protocol for Linux operating system founded in 1998. At present, its main goal is to provide common interface for every protocol it supports, so the user does not need care about protocol to use or peer's IM identifier, while he...
as data size is growing up, cloud storage is becoming more familiar to store a significant amount of private information. Government and private organizations require transferring plenty of business files from one end to another. However, we will lose privacy if we exchange information without data encryption and communication mechanism security. To protect data from hacking, we can use Asymmetric...
The TLS Internet Standard, previously known as SSL, is the default protocol for encrypting communications between clients and servers on the Web. Hence, TLS routinely protects our sensitive emails, health records, and payment information against network-based eavesdropping and tampering. For the past 20 years, TLS security has been analyzed in various cryptographic and programming models to establish...
Recently, those methods of protecting application from crack have a great development. Code obfuscation, dynamic link library, software shelling, those methods all have different levels of innovation and optimization [1]. However, various software crack technology also became increasingly mature. Static code analysis cooperating with dynamic code analysis makes mostly code reinforcement method failed...
This paper presents a new method of power payment based on USBKEY, it combine USBKEY hardware security methods and visualization software to provide a quick and easy secure measure of online payment method, meanwhile the integration of CARD Writer will operate electric card at the time when online payment complete, so users who use electric cards will be able to pay electricity bills indoors.
Crypt DB has been proposed as a practical and secure middleware to protect databases deployed on semi-honest cloud servers. While CD provides sufficient protection under Threat-1, here we demonstrate that when CD is deployed to secure the cloud hosted database of a realistic web application, an attacker to database or a Malicious Database Administrator (mDBA) can easily steal information, and even...
E-learning enables acquisition of knowledge and information through technologies such as computers, smartphones, tablets and wide area networks. The existence of e-learning does contribute in the field of education field such as in the university because its improve the education quality and distributing and sharing of teaching material efficiently. However, due to the open-network in which e-learning...
In this paper, we consider the problem of securing mobile-cloud storage services. We design and develop a novel and secure searchable encryption scheme for mobile devices. In the proposed algorithm, a content based index is constructed and a locality sensitive hashing is used to allow the user to store his files on the cloud in a secure way and then perform a secure query and a fuzzy search. Moreover,...
Advanced Encryption Standard (AES) is a symmetric key encryption algorithm which is extensively used in secure electronic data transmission. When introduced, although it was tested and declared as secure, in 2005, a researcher named Bernstein claimed that it is vulnerable to side channel attacks. The cache-based timing attack is the type of side channel attack demonstrated by Bernstein, which uses...
Electricity Transmission System Interconnectors are critical infrastructures at a national and European level, connecting different electricity areas. Phenomena of capacity demand congestion of the Transmission Interconnectors are handled with auction mechanisms. In this paper, we describe EWOS, a “sealed-bid, first price” method and auction system for electricity auctions. EWOS guarantees the auction...
With the continuous development of China's industrialization, the industrial revolution with the core of informatization and intellectualization has become the current mainstream of development trends, demanding the construction of information security system to escort the industrial informatization. According to the license control, information security control, user's operation permission and other...
Security KISS is a popular virtual private network tool used to protect privacy, ensure anonymity and bypass Internet restrictions. In this paper, we use Black-box analysis method and White-box analysis method to analyze the communication behavior and the encryption algorithm of the software. We get the workflow and the internal structures of the software in detail. In addition, we analyze the security...
Data stealing botnets pose a great risk to the security of networks and the privacy of their users. Most of these botnets use the web as a medium for communication, making them difficult to detect given that web traffic constitutes about 70% of Internet traffic. In addition, they use obfuscation techniques, primarily encryption, to hide their communications and data exfiltration attempts making current...
Mobile phone users are being increasingly directed to WEB sites through the identification of the WEB address from a two-dimensional code on the phone. However, incidents where mobile phones direct users to malicious WEB sites are also increasing. The direct lead mechanism, in which mobile phones directly send users to an uninspected WEB address, is the most common mechanism by which users are misdirected...
This paper introduces a novel method for diagnosing embedded systems and updating embedded software installed on the electronics control units of vehicles through the Internet using client and server units. It also presents the communication protocols between the vehicle and the manufacturer for instant fault diagnosis and software update while ensuring security for both parties. AiroDiag ensures...
Means for classified documents protection have been developing from simple and traditional ways like identity authentication, file encryption, host supervisory and operation audit to integrated and new style ways, like transparent encryption, intranet integrated supervisory, documents concentrated management and virtual security control. This paper introduces the principles and technologies taken...
BlackBerry is not just an ordinary smartphone which rich in its multimedia features. BlackBerry also has very reliable internet services, include BlackBerry Messenger, e-mail, other instant messaging, and other internet service that Blackberry Internet Service (BIS) covers. However, there's an open question that all services that go through BIS is safe or not; considering the data includes text and...
Physical hardware virtualization technology in IT services and operational systems into a virtual abstraction layer to achieve a cost-effective way. However, for the virtual services are running, when introducing virtualization layer was a potential attack intrusion channels. This paper analyzes the potential of virtualization security risks; put forward in the design of virtualized applications should...
Authentication is the process of verifying a user's credentials when they are requesting services from any secure system. The most commonly form of authentication is the single-factor authentication, which only requires one factor for the user to log into the system. In this case, the username and password together act as a single-factor. A more secure technique is the multi-factor authentication,...
With the rapid development of Internet, network database security has become the focus of network security. The research of database protection technology against SQL attacks has become very urgent. In this paper, we analyse principles of SQL attacks, study a database protection system which is used between the Web application and the database. The system provides different protective measures for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.