The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security and privacy are the two major concerns in VANETs. Due to highly dynamic environment in VANETs computation time for authentication is more. At the same time most of the privacy preserving schemes is prone to Sybil attacks. In this paper we propose a lightweight authentication scheme between vehicle to RSU, vehicle to vehicles and to build a secure communication system. In this method we make...
Textual passwords were first identified as a weak point in information system's security by Morris and Thompson in 1979. They found that 86% of the passwords were weak: being too short, containing lowercase letters only, digits only or a combination of the two, being easily found in dictionaries. OBJECTIVE: Despite the importance of passwords as the first line of defense in most information systems,...
The Digital Library of the security threatsfacing and the reasons, according to OSI securityarchitecture, examining the safety and security objectivesof digital library, based on the principle of new casks,from the security strategy of several major Digital Libraryin the process of data security issues and proposeappropriate safety measures and solutions, is intended tostrengthen the library data...
Nowadays, Radio Frequency Identification (RFID) technology has recently aroused great interest due to its convenience and economic efficiency, and the RFID technology has become mature and its manufacturing cost is reduced constantly, this technology has already widely used in a lot of field such as supply chain management, entrance guard system, intelligent home appliances, electronic payment, production...
Personal health information is constituted in its greatest part by complementary diagnostic tests which are an important medical aid. This information is generated dispersedly because the patient seeks medical care in many different places over his lifetime. Access to a comprehensive set of a patient's health information is a challenge. It revolves around the patient so any managing scheme must be...
This paper attempt to develop the technique of maximizing the degree of concurrency and consistency in distributed parallel processing environment by using Ricart and Agrawala's algorithm, which developed an algorithm to implement mutual exclusion between processes that is based upon multicast. This will support the mutual exclusion system in client/server distributed environment and avoid the deadlock...
Many companies want to use Internet as a sale channel and to perform e-business transactions. However, many companies doing business on the Web are faced with security issues which must be addressed in order to protect sensitive information. Businesses must find ways to authenticate employees, customers, suppliers and partners while ensuring the security of transactions, and sensitive information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.