The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile agents, which are used for building distributed systems effectively, are autonomous programs that can travel through a computer network to fulfill their tasks. For practical use of mobile agents, protecting agents and platforms is an extremely important matter. Nevertheless, few security techniques exist for the DASH agent framework, which supports agent mobility. Other agent frameworks such...
Today, the world is moving beyond the imagination of the people, day by day new era in technology comes which create huge impact on their lives. As the invention of the computer takes place, now most of the work is performed with the help of computer. In order to protect the main resource of the people, it is important to make the modification in older technology or create a new one. Level of security...
A Cellular Automaton is one of the most engrossing fields of studies. At the present digital world where almost every communication is being done via internet, requirement of security and privacy of information is must. For securing big or small data over internet, cryptographic techniques are essential. Usage of cellular automata characteristics in the field of cryptography is still not much explored...
The online banking environment has grown tremendously over the past several years and will continue to grow as financial institutions continue to strive to allow customers to complete money transfers, pay bills, and access critical information online. During this same time, online banking has been plagued by Internet criminals and fraudsters attempting to steal customer information. Phishing, pharming,...
File encryption is an effective way for an enterprise to prevent its data from being lost. However, the data may still be deliberately or inadvertently leaked out by the insiders or customers. When the sensitive data are leaked, it often results in huge monetary damages and credit loss. In this paper, we propose a novel group file encryption/decryption method, named the Group File Encryption Method...
Single sign-on (SSO) is an identity management technique that provides users the ability to use multiple Web services with one set of credentials. However, when the authentication server is down or unavailable, users cannot access Web services, even if the services are operating normally. Therefore, enabling continuous use is important in single sign on. In this paper, we present security framework...
USBKey is a new kind of intelligent security product that comprises microprocessor, memory chip and operation system. This paper proposes a software protection method that utilizes efficient calculation ability and security space of USBKey in multiuser environment, which combines multiple protection methods, identity authentication and trusted computing technology. And this method provides a series...
As the Information Technology developing, kinds of the IT applications have entered various government sectors. The E-Gov. has been an important method to improve government's transparency and social services ability. Meanwhile, the varieties of cyber-attacks which against the IT system cause mass unrecoverable damages. Therefore IT system's security should be considered systematically. The system...
Scalable video using Cloud Computing is a potential solution for the distribution of media content to a large number of users. This may occur over a heterogeneous network connected to devices with different capabilities and diverse set of users. Although some of the problems are well known and understood in information and network security, there is still a need to improve the existing solutions to...
Analyzed some shortages of the existing one-time password (OTP) authentication schemes, a new OTP authentication scheme is designed. This scheme used the SM2 cryptographic algorithm and Hash function to ensure data transmission security, provided the mutual authentication between client and server, resisted different kinds of attacks, and protected the user's identity information effectively. Analysis...
By using contact less IC smart card as a media for identity authentication, the paper analyses the conditions and ways to implement cloud print, and researches the key technology of universal print driver, data encryption, identity authentication and Print center interactive platform.
Having entered into the network printing times, we obtain great convenience and are confronted with many security problems. This paper focuses on the domain of network printer security which is still a blank field and proposes a whole security system for network printing which doesn't need to change the original architecture of network printers to solve the security problems of the existing network...
With the rapid development of computer networks, network security has become a hot topic of concern to people, not just a simple network security threat network needs normal people, but also the pursuit of networking technology in innovative source of power. To address this issue, this article on network security solution to the problem definition and further discussion, and propose how to establish...
To solve the problem that the information of removable storage device can be easily disclosed and not be monitored effectively, a scheme of U disk remote monitoring system in trusted computing environment is proposed, which uses dual authentication technology to ensure that the users and removable storage device double-way reliable, it stores the cipher text of its internal documents to avoid being...
In online social networks (OSN), users' capabilities of accessing a resource depend on attributes they owning. Considering of privacy, authentication with attributes require the signer don't leak more information than the predicate over attributes involving. There're some works of attribute-based signatures (ABS) to satisfy this requirement, where users sign messages with their attributes issued from...
At present, most enterprises have high demand on system security in order to protect confidential business information. According to the successful application of USB key and virtualization in secure field, combining virtual disk image (VDI) files encryption, this article proposes a general business protection system for enterprise (GEBPS). With GEBPS, enterprises can use different virtual machines...
Means for classified documents protection have been developing from simple and traditional ways like identity authentication, file encryption, host supervisory and operation audit to integrated and new style ways, like transparent encryption, intranet integrated supervisory, documents concentrated management and virtual security control. This paper introduces the principles and technologies taken...
Information exchanged over open networks in many cases contain sensitive data, accordingly, security became an important issue to many people. Authentication has proven to be a deterrent to intruders and ensures that information is transmitted from trusted senders to a trusted receiver. This work is an extension of previous authentication work. It presents a scrambling and encrypting mechanism to...
Existing security of Internet has principally focused on preventing leakage of the user's data to others by applying the cryptographic technology to the data transmission and receiving process between the Internet system and the user's computers, and the source-viewing on the web browser. However, with an increasing number of government entities including the “e-government” of the Republic of Korea...
Authentication is the process of verifying a user's credentials when they are requesting services from any secure system. The most commonly form of authentication is the single-factor authentication, which only requires one factor for the user to log into the system. In this case, the username and password together act as a single-factor. A more secure technique is the multi-factor authentication,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.