The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud Computing is one of the rapidly growing fields in today's scenario. It can be defined as virtual pooled servers that provide application, infrastructure, and platform based application and other facilities. The major aim of this computing technology is that the clients uses only what they need and pay according to their usage. But a large amount of data, of individuals and organizations are...
In current digital world, more victims are affected by cybercrime. Cyber world are wide open and it is very easy to target to access data or financial information from any individual, public and private organizations etc., since, internet and web are open, it is very easy to steal data on the unsecured medium of channel. Therefore, protecting financial data required further layers of security counter...
Nowadays, Cloud computing is a major trend. It is a new data hosting technology that becomes very popular lately thanks to the amortization of costs induced to companies. Since this concept is still in its first stages, new security risks start to appear. This paper will set forth the major security issues in cloud computing and propound a new solution to secure data, storage in the cloud environment.
Recently, Cloud computing is most powerful research area because of its flexibility and cost efficiency. The paper describes different security issues of cloud computing and the possible solution for remediation.
Radio frequency identification (RFID) technology is a non-contact automatic identification technology. The basic principle of RFID is coupled with radio frequency signal and the spatial transmission characteristics. From object recognition to achieve automatic recognition, RFID has the advantages of being effective, diversity, high capacity, low cost, anti-pollution, penetrating and so on. However,...
SIP protocol is an important protocol for IP telephony in recent years. DoS (Denial of Service attack) is a common and difficult-defended attack. For the characteristics of SIP protocol, a variety of DOS-attack manners are introduced in this Paper, then specific prevention mechanisms are given to enhance the security of SIP network.
E-mail isn't just a simple way of delivering information, but is a core tool of task process. A company mainly uses e-mail as a way to internally communicate and to process main tasks of business. Currently, mail capacity being used in a company has been increasing in rate of 40% and 70% of company information is being preserved in e-mail. However, most of the companies manage e-mail by using diverse...
In this paper, we present our reverse engineering results for the Zeus crimeware toolkit which is one of the recent and powerful crimeware tools that emerged in the Internet underground community to control botnets. Zeus has reportedly infected over 3.6 million computers in the United States. Our analysis aims at uncovering the various obfuscation levels and shedding the light on the resulting code...
To achieve security in wireless sensor networks (WSNs), pairwise key establishment between two sensor nodes is important. Public key cryptography based key establishment mechanisms are not suitable for WSN, due to their more energy consumption and complex hardware requirements. On the other hand, a different class of key establishment scheme that stores key or key related information are computationally...
Voice-over-IP (VoIP)-based services are becoming a popular alternative to traditional public switched telephony. The increasing number of users make VoIP also an interesting target for attackers. VoIP phishing and identity theft are gaining relevance. The lack of options for the reliable authentication between communication partners and the possibilities for anonymisation in IP-based telephony will...
As the modern society becomes increasingly dependent on software, how to develop Trustworthy Software(TS) systems is considered a critical issue by academia, government and industry. The domain of our work focused on the reliability research on UNIX system, which is the famous and widely used operation system in the world, and adopts C/S software architecture. However, when the user remote login the...
At present there is no common means for establishing the security performance of wireless local area networks (WLANs) against threats. Furthermore, there has been little investigation into whether security performance is reliant on network topography. Consequently this paper advocates that for a range of WLAN infrastructure topographies (home, enterprise & open-access) there can be significant...
Encryption has been a widely used technology for protecting secure data. However, recent threats show that encrypted data are being hacked and decrypted. A 128-bit encryption can be broken by a few weeks of supercomputing processing. These data are very critical to an organization and could be lethal if accessed by unauthorized group. Here a new transmission model is proposed for securing structured...
The rapid consumer adoption of high-speed Internet connections has lead to the unprecedented interconnection of home networks. Consequently, the number of domestic home automation networks offering Internet connectivity has increased. These home automation networks are increasingly comprised of resource limited wireless sensor networks (WSN). This creates the potential for malicious users from across...
With the popularity of the third-generation and fourth-generation mobile phone services, the security of m-commerce operations already received more attentions. At present, the security mechanism of m-commerce operations rely on the encryption technology of subscriber identity module (SIM) card or the smart card textual password. Despite its security mechanism is stronger than the current Internet,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.