The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There has been a recent rapid increase in the number of Internet of Things (IoT) devices, providing a wide range of services for smart homes such as surveillance cameras, smart lighting, and door locks that can be remotely accessed and controlled. User mobility makes static security mechanisms, such as usernames and passwords, tedious to use. In this paper, we introduce a context-aware authentication...
Today, the world is moving beyond the imagination of the people, day by day new era in technology comes which create huge impact on their lives. As the invention of the computer takes place, now most of the work is performed with the help of computer. In order to protect the main resource of the people, it is important to make the modification in older technology or create a new one. Level of security...
After a user logs into web server using a public personal computer or a mobile device such as mobile phone, the leakage of his personal information may occur because he often forgets to log out from web server. To prevent the leakage of the personal information instantaneously, we propose a new login status control method based on the connectivity of web servers and a single mobile application. The...
There's nothing wrong with having multiple smartphone authentication systems--each adapted to different device capabilities and mobile contexts--as long as they're complementary and don't detract from the user experience.
As mobiles become a ubiquitous, they are used more and more for operations that may involve sensitive data or huge amounts of money. The mobile is also increasingly being used as the tool of preference for browsing and using the Internet. Hence, new security measures must be developed to support increased functionality of these devices, to protect users in the case of any mishap. Authentication using...
Graphical passwords have been proposed as an alternative to textual passwords, due to its complexity that users are having in remembering their password combination. Graphical password was introduced by Blonder in 1996, which was easier to remember because of its graphical content. Therefore usability and memo ability are improved. In this paper, we propose and develop a new graphical password called...
At present time the unregistered SIM cards (here unregistered means the SIM cards which are registered with false information provided by dealer) are widely used for committing crimes in the perspective of Bangladesh. Due to the complexity of the present SIM card registration process, the subscribers are reluctant to register themselves. In this paper we propose a cloud based system model which demonstrates...
Today Internet is the most widely used medium for accessing the information. On the internet, many websites are available for providing the information and also most of the services are getting Online such banking, insurance, shopping etc. These services providing websites requires the strong authentication. Multiple authentication methods have been developed such smart card based system, one time...
Mobile cloud computing is a new computing technology, which provides on-demand resources. Nowadays, this computing paradigm is becoming one the most interesting technology for IT enterprises. The idea of computing and offloading data in cloud computing is utilized to overcome the inherent challenges in mobile computing. This is carried out by utilizing other resource providers besides the mobile device...
In the cloud computing, user authentication is an important security mechanism because it provides the functions of authentication, authorization, and accounting for cloud servers. However, the previously proposed user authentication schemes have many security and efficiency problems. In addition, these schemes can only work on single server environments. To solve the above problems, we propose a...
To solve the problem that the information of removable storage device can be easily disclosed and not be monitored effectively, a scheme of U disk remote monitoring system in trusted computing environment is proposed, which uses dual authentication technology to ensure that the users and removable storage device double-way reliable, it stores the cipher text of its internal documents to avoid being...
People's increasingly relying on web applications to manage their digital assets makes web authentication a critical security issue. As most websites today still authenticate a user with only username and password, the authentication credentials can be easily compromised in a vulnerable browsing environment without the owner's notice. Considering the browsing in mobile devices is more secure than...
Password authentication over unreliable networks is the most popular method in the Internet and mobile communication environments. Lately, Peyravian and Jeffries proposed the password-based remote user authentication protocol, password change, and session key establishment over insecure networks without requiring and any additional private-key or public-key infrastructure. However, Peyravian-Jeffries's...
As a kind of secure and efficient module, TPM is seldom integrated in the motherboard of PC at present, in the paper a USB flash disk-based model of mobile TPM with mass storage is presented. In this mobile TPM, a 32-bits embedded CPU with RISC is adopted, which is integrated kinds of encryption algorithms. The mutual authentication between mobile TPM and the host is proposed; in the other hand, the...
Vehicular ad hoc networks (VANETs) have many new characteristics unlike traditional network, such as centriclessness, mobility and multi-hop transmission, which invalidate conventional key managements. The fast development and successful application of trusted computing technology provide a potential solution to achieve effective authentication and trust evaluation. According to the VANETs with hierarchy...
Online computerized examination systems is developed using software agent technology. Multi-agent system containing main agent, mobile agent and stationery agent is developed to support the functionality of examination systems in Aglet environment. All these agents in the system communicate with each other to process the operations requested by the user. Authentication of the examinee for valid user...
With the great development of computer network and communication technology, smart cards have been used more and more popular. How to ensure its secure application and protect its sensitive information becomes the most important problem. Based on elliptic curve cryptosystem, we proposed a new authentication protocol that is built upon two channel model, where mobile telephone and authentication server...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.