The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Caller ID has been used to tell the recipient who is calling before answering the call. In fact, nowadays using just Caller ID is not enough to proof the real caller since there are several ways to manipulate the caller identity. There are number of solutions to proof the caller e.g. using Time base, SMS base, or hardware. Even using DSA and CA, it can lead to data leak or inconsistent verification...
In current digital world, more victims are affected by cybercrime. Cyber world are wide open and it is very easy to target to access data or financial information from any individual, public and private organizations etc., since, internet and web are open, it is very easy to steal data on the unsecured medium of channel. Therefore, protecting financial data required further layers of security counter...
Cloud computing is boon in technology field which provide on-demand services in IT enterprises. With storage of data on cloud the challenge of its security and authentication threats occurring. Authentication in cloud computing is a major concerned. The main objective of these technique is to authenticate at client side, server side, or as third party using different method to keep the data in secure...
Aquaculture farmers and exporters usually face concerns related to data privacy and security of their farm data while using digital apps (Mobile Applications). Existing applications encrypt data by transmitting the keys over the network to achieve data security. However if this key is pilfered, there arises a risk of compromise in data security. To overcome this risk, we have proposed a method to...
The cloud computing offers high scalability, confidentiality and the easy accessibility of the information over the Internet. Though the conventional encryption system provides security, the most concerned issue is the regular side channel attack for capturing ones sensitive and confidential image, audio and video. A malicious Virtual Machine (VM) besides a targeted VM can extract all information...
Cloud computing has evolved to a great extent over the years. The concept of the cloud lies in the efficient storage of data through resource allocation at a very low cost. The building blocks of cloud are distributed virtual servers over different geographical locations. Virtual machines transfer data over the network from one physical server to another, an efficient algorithm or model is required...
As tremendous growth of cloud computing services in real time applications allows end users of cloud to share their data with each other easily. Multi user data sharing should be secure and integrity should be achieved on cloud. To achieve the data security the methods like IBE (Identity Based Encryption), ABE (Attribute Based Encryption) etc. are widely used in cloud computing environment. However,...
Data Outsourcing in cloud computing, require high security measures as the data may be tampered by illegal users or attackers. This may affect the performance of cloud, as an increase in retrieval time of data. While applying the security measures it is required to take under consideration the retrieval time of data. In this paper, both the issues are tried to overcome by scattering the data file...
Attribute-based encryption (ABE) has emerged as a promising solution for access control to diverse set of users in cloud computing systems. Policy can just specify whether (or not) any specific user should be given access to data, but it lacks to provide data owner the privilege to specify (how much) fraction, or (which) specific chunk from that data to be accessed or decrypted. In this paper, we...
The aim of the article is to research the process of information security in transmission between virtual subnets which are realized on data encryption algorithms of EZ-cryptosystem and secret key that protects the information from interception. In fact, the data to be intersegmental transfer coded output from one network, and decoded at the other input network, wherein the data encryption algorithm...
Parallel computing on cloud infrastructure had gained tremendous attention and popularity in recent years. In this paper, we propose a new technique to encrypt an image for secure image transmission and parallel decryption using cloud resources. The encoding of the image is done using the FFT conjugate complex property and private random phase key value shared between sender and receiver. First, using...
We introduce a non-interactive RSA time-lock puzzle scheme whose level of difficulty can be arbitrarily chosen by artificially enlarging the public exponent. Solving a puzzle for a message m means for Bob to encrypt m with Alice's public puzzle key by repeated modular squaring. The number of squarings to perform determines the puzzle complexity. This puzzle is non-parallelizable. Thus, the solution...
The purpose of this article is to discuss an authentication method for peer to peer (P2P)-based streaming media. Methods of encryption of streaming media data and digital signatures were used to improve the safety of the media. The digital certificate publishing service and management services of live streaming media authentication information are expanded in the live stream system based on P2P networks...
The purpose of CEDA (certified electronic document authority) is to guarantee reliability and stability of electronic documents. When using storage and issuance services which are one of core services offered by CEDA, users register their electronic documents and they are issued to a third party later on. In this process, issuance of partial information (part page) instead of the entire registered...
A trusted platform module (TPM) contains a unique identity and provides a range of security functions. This paper outlines a client-server system utilizing a TPM-enabled computer to hinder forensic examination. The system allows for data confidentiality, plausible deniability, and hiding of traces that incriminating data was present on the client. The server will attest the client before allowing...
In order to improve the data security over network and provide more effective data protection product, this paper introduces a network data protection system based on combined symmetric key. The system takes into account four main aspects in data protection, including identity authentication, encryption transmission, access controls and encryption storage. The solution combines four aspects into a...
This paper describes the implementation of mailer that is used to send the mail in the mailer that has encoded format. By using this encoding method the mail will be send very safe, the hackers can't read the mail. The mailer is used to send the encrypted mail directly to the mail box as it is. It can also send the effective html page, images and textual mails. instead of this, the composer will send...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.