The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ever since, internet banking came into existence it has been a bull's eye for the hackers. Up to date, several cases have been reported by internet banking users for missing money or misuse of their accounts unknowingly. Well designed malwares are written to attack internet banking websites and its customers. Today botnets are emerging as the most significant threat facing online ecosystems. Identity...
Although electronic documents have been greatly improved in the transferring speed and processing speed, it would also result that electronic documents information is disclosed, counterfeited, tampered, repudiated and so on. In order to solve the above problems and greatly improve the security of electronic documents, this paper researches a hybrid encryption technology, that is, encryption technology,...
Introduced the credible computation's background and analyzed the TCG organization had Issued two authentication standard agreement: The trusted third party agreement and the direct anonymous authentication agreement, practice prove that the direct anonymous authentication agreement cannot be under the very good control in actual anonymous, this article proposed the improvement mentality in the original...
Nowadays, Radio Frequency Identification (RFID) technology has recently aroused great interest due to its convenience and economic efficiency, and the RFID technology has become mature and its manufacturing cost is reduced constantly, this technology has already widely used in a lot of field such as supply chain management, entrance guard system, intelligent home appliances, electronic payment, production...
A proposed identity management framework provides privacy protection, by means of virtual identities, and cross-layer single sign-on for users who subscribe to multiple service and identity providers.
One of the most useful features in any personal digital assistant (PDA) is that it can accumulate information needed including easy-to-forget details. Some of the information stored is likely to be very sensitive including credit card numbers, personal identification, and passwords. To protect this sensitive data, most PDAs offer password protection as a basic authentication. However, to rely on this...
Bardram introduced a new concept of activity-based computing as a way of thinking about supporting human activities in ubiquitous environments. In such environments where users are using a multitude of heterogeneous computing devices, the need for supporting users at the activity level becomes essential. However, without considering basic security issues, it could be rife with vulnerabilities. Security...
For many Internet-based service providers, client authentication is required before the delivery of services. Currently, most client authentication mechanism is only focusing on the identity authentication. In this paper, we claim that more business opportunities will be created if service providers obtain more information about clients. Then we propose the concept of the integrated authentication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.