The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Over the past few years, researchers have demonstrated various features of reversible logic design as solution to the problem of power consumption due to the information loss, that will exceed the power consumption of the devices. Besides, the reversible logic combined with novel device paradigm of Quantum dot Cellular Automata (QCA) promises to offer low-power dissipation, high packaging density...
Cloud refers to Internet and cloud computing is the new trend of delivering computing resources via Internet. The Cloud is inflicted by many security concerns among which Distributed Denial of Service (DDoS) has an excessive impact. The DDoS affects the systems by infusing huge amount of traffic. The Cloud provides virtual machine images which run via instances. One such Cloud platform is Eucalyptus,...
Imaging applications require processing, transmission, and storage of enormous digitized data produced from large sets of images. To conserve storage, increase the processing speed and to make their transmission faster on low bandwidth channels, images are compressed prior to their storage, transmission, and processing. Different approaches to compression have been developed to achieve desired degrees...
Registers within a processor, cache within, on, or outside the processor, and virtual memory on the disk drive builds memory hierarchy in modern computer systems. The principle of locality of reference makes this memory hierarchy work efficiently. In recent years, cache organizations and designs have witnessed several advances that have not only improved their performance such as hit rates, speed,...
Multiple e-mail address certificates have been proposed very recently, therefore, neither certification authorities currently issue such a certificate nor does any mail client permit its use for signing or encrypting e-mail messages. Further, no study has been made to evaluate their effectiveness for practical use. This paper studies the usability of multiple e-mail address certificates in secure...
E-mail SPAM is continuously growing threat to its users, E-mail Service Providers (ESPs) and Internet Service Providers (ISPs) as it consumes user's mailboxes, bandwidth, and time by flooding the system with unwanted and unsolicited messages. It can contain unsafe content such as virus programs, phishing frauds, and other malicious code that can be used to hatch varied types of attacks. Several techniques...
It is highly desired to protect online resources from web bots through some form of Human Interaction Proof (HIP) such as CAPTCHA tests. However, there are several challenges associated with designing highly secure and usable CAPTCHA tests. These include challenges to implement, maintain, and upgrade CAPTCHA tests individually for each web application. In addition to these, accessibility to multilingual...
Web and desktop mail applications support multilingual features for composing and viewing e-mail messages in regional languages besides English language, however, they do not support automatic language based message classification. This paper surveys various online language detection and translation services and the use of Microsoft language translation service to classify incoming e-mail messages...
Automatic classification of e-mail messages into folders help recipients to organize messages in their local mail store. Both web and desktop e-mail client applications permit customization to support e-mail classification by defining rules to handle incoming e-mail messages. However, automatic language based folder classification of e-mail messages is neither supported by commercial web mail applications...
Digital signature certificates are digitally signed identity certificates issued by trusted Certification Authorities (CA's) to individuals, devices, applications, or services. E-mail Certificates (EC's) are issued primarily for the purpose of signing and encrypting e-mail messages. E-mail clients use sender's E-mail Certificate (Private Key) for signing and recipient's E-mail Certificate (Public...
Cyberspace is a network of networks connecting billions of users round the globe with the help of networked gadgets that include computers, mobile phones, palmtops, iPods, etc. Internet, though offers great benefit to society, it also presents opportunities for criminals using new and highly sophisticated technology tools. It both poses and suffers from various security challenges as it is used to...
Advances in Web improved quality of learning as it enables dissemination of content and enriches communication of different forms between its users. This paper presents various Web 2.0 tools for e-learning. It demonstrates actual use of some Web 2.0 tools to supplement classroom teaching of engineering students and reports their impact on the overall professional development of students on the basis...
Integration of Web based ICT tools in education aiming to bring quality education to everyone and everywhere is a worldwide phenomenon. Teachers and learners are benefited as these tools increase efficiency and effectiveness of learning, teaching, planning and managing by establishing linkages and collaboration, facilitating experimentation and lifelong learning and providing easy to use management...
Internet has created a virtual world in which most of the activities of real world concerning business are undertaken. The existing laws are meant for real world with political boundaries in which tangible documents are created to facilitate proof in case there is a dispute. The virtual world is borderless and paperless. It has engendered a new generation of legal issues pertaining to different branches...
Spammers and phishers constantly keep on changing spam structure to circumvent anti-spam procedures and target maximum recipients. Of late, it has been observed that spammers spoof date header of their spam e-mails to keep them on top in the recipient’s mailbox with an aim to maximize the chances of immediate attention of recipients. This form of spoofing can cause confusion to recipients, create...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.