The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, the implementation of IoT technology development has been growing rapidly. One of IoT applications is smart home system. In this system, in-home hardwares are connected to the internet. Thus, residents can access them using any internet-connected devices, such as mobile phones. Since the main concern of the IoT system is communication, the design of an efficient and secure communication...
as data size is growing up, cloud storage is becoming more familiar to store a significant amount of private information. Government and private organizations require transferring plenty of business files from one end to another. However, we will lose privacy if we exchange information without data encryption and communication mechanism security. To protect data from hacking, we can use Asymmetric...
In current digital world, more victims are affected by cybercrime. Cyber world are wide open and it is very easy to target to access data or financial information from any individual, public and private organizations etc., since, internet and web are open, it is very easy to steal data on the unsecured medium of channel. Therefore, protecting financial data required further layers of security counter...
In recent years, Cloud computing has enjoyed a tremendous rise in popularity. It provides facilities for users to use cloud applications or platform without the need of any software installation and access the data or application from anywhere, with the help of internet. The cloud computing is divided into three fragments: Application, Service and Platform. Each of fragment provides different cloud...
21st century is often called the Information Century. Information technology is being used in all areas of life from medicine to astronomy. The list of developments and advances happened in those areas thanks to information technology penetration is endless. As the world become digitized more and more and information technology becomes ubiquitous, creating electronic and digital phenomena such as...
Cloud computing is getting more popular in the field of computer science because of its reliability in storing and assessing data remotely. In the presence scenario it is very biter to have mobile devices as an interface between user and server, to access and store data for one's need. Mobile technology in cloud computing is helps users to operate on the data for any of the application for their organization...
This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation. Mix-servers involved in a decryption mixnet receive independently and repeatedly encrypted messages as their input, then successively decrypt and shuffle them to generate a new altered output from which finally the messages are regained. Thus mixnets confirm unlinkability...
Cloud computing is an emerging computing model in which resources of the computing communications are provided as services over the Internet. Privacy and security of cloud storage services are very important and become a challenge in cloud computing due to loss of control over data and its dependence on the cloud computing provider. While there is a huge amount of transferring data in cloud system,...
The main principle of e-voting is that it must be as similar to regular voting as possible, compliant with election legislation and principles and be at least as secure as regular voting. Therefore, e-voting must be uniform and secret, only eligible persons could be allowed to use the e-voting system. In this paper, we assume that every voter should be able to cast only one vote corresponding to one...
This paper introduced a practicable method to connect web portal with campus-user information system, via a Web Service-based SSO (Single Sign-on) system, in order to realize the sharing of users' statuses and information. Cookies, after being serialized into binary array and encrypted with RSA, will be transmitted in the Web Service framework. Then this array will be deserialized when Identity Server...
In order to meet the market demands of real-time location information in the mode of LBS, while satisfy the coordinate information encryption requirements of State Bureau of Surveying and Mapping, this paper proposes the random parameters insertion encryption methods of LBS application based on RSA algorithms, and applied in actual operations. Operating results show that, in pure-online mode that...
The paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of...
The design scheme and key technologies of remote tax declaration system (RTDS) is proposed in this paper. Especially, it is presented that how to apply XML to deal with heterogeneous data source, how to make use of the PKI and DES algorithms to improve the efficiency of encryption, and how to solve the concurrency of clients in RTDS by using Java threads. Finally, the experiment results are shown...
System security is a crucial constraint for secure transfer of data. Because of the nature of the SSH protocol, anyone with access to the central server can manipulate files, it is imperative that only authorized users be able to access the central server. Secure transfer has taken steps that will discourage several common attempts to forcefully gain access to the system. These steps include implementing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.