The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Providing Authentication to any system leads to provide more security to that system. There are many authentication techniques are available, such as textual password, biometric etc. Almost all securities are covered with textual password, still it has some drawbacks. It is not hard for hackers to hack computer system secured with textual password. When user types password, the hacker can trace the...
Dynamic password is one of important parts in the research on the Internet banking security. This paper classifies the popular dynamic password product used in the banking, analyzes the security challenges that the Internet banking faces, and finally puts forward its some countermeasures.
The secure authentication and transaction is one of the important parts in networking security. Because of the security flaws of some existing schemes, this paper proposes a secure authentication and transaction protocol based on digital certificates and dynamic password. The protocol not only can realize the mutual authentication of the client and server, but also can achieve secure authentication...
When the network is increasingly becoming a part of people's lives at the same time, network and information security has also become one of the issues of most concern,. This article is based on a brief introduction in terms of information security, several commonly used way of authentication technologies and their advantages and disadvantages. Different levels of security authentication methods are...
The traditional mechanical key of PC has only the device authentication or the static password authentication function, which is easily copied, decrypted and forgotten. To solve these problems, the PC lock software based on removable device is developed. The software design principles and the MD5 (Message-Digest Algorithm 5) encryption algorithm are introduced, and the modules of the software are...
The paper describes a new electronic official seal system scheme based on the technologies of MD5, RSA and USBkey. In order to guarantee the reliability of transmitting data, the system develops the toolbar by utilizing VBA to found the toolbar object in WORD and calling CryptoAPI to realize encryption and decryption, and USBkey is applied to save the key and the digital certificate. Moreover, we...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.