The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network security is often neglected even by users. This paper deals with user authentication in a network environment and offers analysis of this topic and possibilities how to increase its security by cryptographic methods. A synthetic part provides a detailed description of the design of a simple web application to authenticate users with protection against selected attacks and also its practical...
This article observes ways and techniques that can be used to gain access to MySQL databases. HoneyPot that simulates main MySQL server functions was built in order to collect data about attacks. There is gathered a password dictionary that was collected based on attempts to gain access to MySQL HoneyPot. There are diagrams, that show distributions of attacks number at a specific time and region,...
SMS service is a basic feature that has been built into the cell phone, since a function of exchanging messages are practical and easily understood by all mobile phone users, when SMS is used for negative purposes then it can be used as evidence of the law. This applications was designed to help search a text messages as evidence in a crime that use SMS as a medium of communication, This Application...
The access to information globally and by a significant percentage of the world population is an indispensable part of our daily routine. With this global network access comes the increased possibility of malicious attacks and unauthorized access to identity, information, and other resources. In order to curb the latest threats resulted from the internet revolution in the past few years many quick...
Measuring strength of passwords is important in order to ensure the security of password-based authentication. Since passwords are still the most widely used method for authentication, there has been a considerable research on passwords and password strength. Yet, studies related to password still lack of access to plaintext passwords that are created under a specific password policy. Our research...
Problems of impersonation and other malpractices of various degrees have continued to mar the electronic-assessment (e-assessment) of students at various levels. The use of traditional methods of password and token passing for identity management and control has failed to provide acceptable solution to these problems, due to their susceptibility to theft and various forms of violations. The failure...
This paper aims at presenting a possible solution for solving problems that may occur during the admission process in higher education system related to the high school diplomas submitted by candidates. Without questioning the good faith of candidates, there are situations that can raise suspicions about the authenticity of the diplomas. In this regard, it would be useful to have a portal through...
Textual passwords were first identified as a weak point in information system's security by Morris and Thompson in 1979. They found that 86% of the passwords were weak: being too short, containing lowercase letters only, digits only or a combination of the two, being easily found in dictionaries. OBJECTIVE: Despite the importance of passwords as the first line of defense in most information systems,...
At present time the unregistered SIM cards (here unregistered means the SIM cards which are registered with false information provided by dealer) are widely used for committing crimes in the perspective of Bangladesh. Due to the complexity of the present SIM card registration process, the subscribers are reluctant to register themselves. In this paper we propose a cloud based system model which demonstrates...
To solve the security problems in low-cost RFID system, we propose a protocol based on key-chain. Taking full advantage of features that the back-end database can store a lot of keys and the PUF circuit can generate a large number of non-replication keys, the protocol compares challenge/response key pairs obtained from PUF operation in the tag with key stored in the back-end database. And then the...
A technique of online face authentication has been proposed which may be used for the user identification. Pre processing of acquired image has been accomplished through consecutive steps viz. image reading and subsequent adjustment of illumination level and feature extraction from a certain portion of the clipped image to form a template. Provision for automatic uploading of the template through...
Web based learning or e-learning is growing day by day. But the evaluation system is always questioned by the authority if it is conducted remotely. The questions mainly arise about the authenticity of the examinee and fairness during the examination. In this paper a biometric authentication and tracking system has been proposed. Here iris recognition is used as biometric authentication tool. The...
This article presents proposition of using quantum cryptography protocols in authentication process. Model is based on BB84 protocol. It is certain that protocol needs a little modification but most fundamental features are kept. Article presents an example model of authentication process.
This article att1empted to build a network based classroom for users to communicate with each other and edit collaboratively based on the CSCW concept. It proposed a web based “Online Collaborative Editor System” which based on CSCW to establish a visualized collaborative learning group to prompt the discussion, communication and experience sharing between teachers and students, students and students...
In order to better ensure the Web security, we designed a CAPTCHA mechanism. It took the RIA areas flexibility combined with interaction design field and used to CAPTCHA design field. This kind of mechanism improves the safety of the CAPTCHA from four aspects. First, we used interactions of man - machines; Second, by comparing the server-side SessionID, random ID and flag variable, it prevents malicious...
User management is one of the most time consuming tasks for administrators of large networks. This paper presents some techniques developed at Carnegie Mellon University to improve handling of accounts and access rights in a corporate environment. Directory information is typically handled by a hierarchy of LDAP servers maintained by different support groups on different administrative levels, from...
Security plays a large role in e-commerce application system, the physical layer structure, anti-SQL injection, RBAC, password policy are important aspects of E-commerce application system security policy which will be analyzed in this paper.
Research topic covered was the identification of a characteristic method of authentication based on biometric fingerprint reading to achieve a solution to secure communications. Biometric identification solution based on fingerprint reading was combined with conventional authentication methods to achieve more secure communications and computers better protected.
Continuous biometric authentication schemes (CBAS) are built around the biometrics supplied by user behavioural characteristics and continuously check the identity of the user throughout the session. The current literature for CBAS primarily focuses on the accuracy of the system in order to reduce false alarms. However, these attempts do not consider various issues that might affect practicality in...
Fisheries management is continually frustrated by the lack, or poor quality, of critical data on fishing operations. While quantitative methods for managing fisheries have developed considerably, the quality of available data prevents advances in fisheries management. With the advent of satellite communication systems and broadband on larger vessels, the transmission of reports from fishing vessels...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.