The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
E-banking services vitally need comprehensive secure and simple authentication methods in order to be universally spread. In this paper, a new method of authentication was proposed and tested. This method uses templates in addition to passwords which are received in registration process. Template provides benefits of one-time passwords in practice, and can thwart common attacks of the context. Template...
An architecture that differentiates security according to service-specific characteristics avoids an unnecessary drain on IT resources by protecting a variety of cloud computing services at just the right level.
A light-PKI Fast Authentication Model is proposed to improve the speed of communications authentication. In the light-PKI model, the root public key, CRL and canceled certificate are stored safely in terminal. It dose not need the TTP when two terminals authenticate each other. So, this model can enhance the authentication speed of PKI systems.
Advances in the field of information technology also make information security an inseparable part of it. In order to deal with security, Authentication plays an important role. This paper presents a review on the biometric authentication techniques and some future possibilities in this field. In biometrics, a human being needs to be identified based on some characteristic physiological parameters...
Along with the never-ending changing and improving development of information technology, mankind is entering an information period with network as the main stream, and e-business based on Internet is becoming a new mode for commercial activities gradually. The greatest misgivings of enterprises to conduct e-business is safety, so this article is going to give an intensive study and analysis of identity...
By using of chaotic map and block-wise independent technology, a new chaotic fragile watermarking algorithm is proposed in this paper. Firstly, location key is looked as logistic chaotic initial value to iterate and create location matrix, according to this matrix we can generate mapping image and identify the embedding location of watermarking in image blocks. Then watermarking sequence related with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.