The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
At present time the unregistered SIM cards (here unregistered means the SIM cards which are registered with false information provided by dealer) are widely used for committing crimes in the perspective of Bangladesh. Due to the complexity of the present SIM card registration process, the subscribers are reluctant to register themselves. In this paper we propose a cloud based system model which demonstrates...
Although electronic documents have been greatly improved in the transferring speed and processing speed, it would also result that electronic documents information is disclosed, counterfeited, tampered, repudiated and so on. In order to solve the above problems and greatly improve the security of electronic documents, this paper researches a hybrid encryption technology, that is, encryption technology,...
Since the end users of intranet generally work in an open environment, user authentication has long been the cornerstone of intranet security. In this paper, we propose a lightweight USB-key based authentication system which can improve the system security and enhance the feasibility of the intranet computers. The system need not reform the BIOS and other basic hardware infrastructure; it completes...
The authentication is the key part of the network security. It is also the main problem we should resolve. This scheme, which is bi-directional, using multi-mechanism to ensure safety authentication and providing a uniform authentication service to other e-government application system, meets the need of current e-government system. But authentication technology and e-government system are continually...
Along with the rapid development of electronic commerce and the increasing Internet users, the market of electronic auction has expanded. However, online auction centers remain to be an insecure environment and the bidderspsila identities and private information may still be under threat by malicious hackers. To consider account security, among the main rules of online electronic auction is that the...
Recently, Lee et al. proposed a remote authentication model of information appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network of information appliances to hackers. In this paper, we propose a new secure remote control model for information appliances (SRCMIA) to fix this error. Besides, our model can also achieve both message authentication and one-time secret...
Advances in computer and communication technology have led to a growing concern on the part of commercial communication satellite operators over the vulnerability of their high valued assets in space. An antagonist with a modicum of satellite command system knowledge and modest financial means, could disrupt operations, or, in the worst case, jeopardize the health and safety of orbiting satellites...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.