The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Having entered into the network printing times, we obtain great convenience and are confronted with many security problems. This paper focuses on the domain of network printer security which is still a blank field and proposes a whole security system for network printing which doesn't need to change the original architecture of network printers to solve the security problems of the existing network...
Identity authentication is an important component of network security to guarantee the security of the information and service on open network. In this paper, we propose a secure “strong two-factor identity authentication” which stores digital certificate in smart card, and then protects the PIN of smart card with fuzzy fingerprint vault. Only the legal user can release the securely stored PIN to...
After the analysis of the working principle of WAPI, its security weaknesses are pointed out: it does not securely realize the goal of identity authentication and key agreement. According to the security weaknesses, the key agreement part is improved without changing the framework of WAPI. The improved protocol is not only SK-secure but also UC-secure, thus realizing identity authentication and key...
The main weakness of passwords is that it is vulnerable to dictionary attacks implemented by automated programs. As the EKE protocol could resist the offline dictionary attack and the CAPTCHA could avoid automatic on-line dictionary attack implemented by the attacker, in this paper, based on the two protocols, we proposed the hybrid password authentication protocols. Our new password authentication...
For the open architecture of application platform and security issue of attacks, a new trusted application platform architecture based on trusted platform module (TPM) is proposed, the new architecture can achieve self-recovery while the trusted bootstarp failed and provide the identity authentication below operation system level. Through integrality measurement of TPM, trusted chain pass, trusted...
Mouse dynamics has recently become an interesting new topic in the area of behavioral biometrics due to its non-intrusiveness and convenience. Some promising results have been shown by previous researches on identity authentication and monitoring using characteristics in users' mouse actions. This paper explores mouse dynamics further by focusing on an important issue not addressed previously: behavioral...
Distributed systems have been used to solve some complicated problems. In order to make better use of resources in distributed systems, people have designed many approaches and developed many systems to manage processes in distributed systems, but most of the management systems are paid little attention on reliability of them. There may be some attacks in complex network environment. Therefore the...
For many Internet-based service providers, client authentication is required before the delivery of services. Currently, most client authentication mechanism is only focusing on the identity authentication. In this paper, we claim that more business opportunities will be created if service providers obtain more information about clients. Then we propose the concept of the integrated authentication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.