The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of Things (IoT) devices are getting increasingly popular, becoming a core element for the next generations of informational architectures: smart city, smart factory, smart home, smart health-care and many others. IoT systems are mainly comprised of embedded devices with limited computing capabilities while having a cloud component which processes the data and delivers it to the end-users...
In this paper we present an encryption-based obfuscation technique aiming to address a common and current issue that regards software theft intelligence and malicious attacks. Our approach involves executable code encryption and advanced code management that allows us to decrypt and execute only small parts of the program at a time. This will make the process of reverse engineering much harder than...
Today, the cyber-space landscape is filled with vulnerabilities and malicious users that exploit them. Adding to this the technological context, with data flooding from all directions, it is evident that maintaining a good level of security for our systems has become a challenge. The high-dimensional datasets generated by all these diverse technologies needs to be processed efficiently. Inside the...
The model based on cloud computing provides considerable advantages of cost-quality regarding the access to a range of IT services. The cloud providers must ensure solid security guarantees. One of the critical issues is that of privacy and access rights to data migrated and managed by the cloud. In this sense, one solution is based on encrypting data before its upload in cloud. In this paper we propose...
Current user demands from a storage service increase every day in complexity and availability. Together with the expansion of Cloud Computing services we find an important problem existing in nowadays datacenters - the problem of efficient, secure and reliable storage backbone that can serve both virtual infrastructures and users. In this paper we present a different approach in the design of a file...
DHCP is one of the most used network protocols, despite the security issues it has. Our work is motivated by the numerous attacks that can be launched against DHCP and the impact that they can have. Firstly, we formulate the constraints and design principles for a DHCP message authentication module that is flexible and easy to integrate with current DHCP implementations, while providing the necessary...
The possibility of outsourcing computation to the cloud offers businesses and individuals substantial cost-savings, flexibility, and availability of compute resources, but potentially sacrifices privacy. Homomorphic encryption can help address this problem by allowing the user to upload encrypted data to the cloud, on which the cloud can then operate without having the secret key. The cloud can return...
In this paper we give an overview of the DHCP security issues and the related work done to secure the protocol. Then we propose a method based on the use of public key cryptography and digital certificates in order to authenticate the DHCP server and DHCP server responses, and to prevent in this way the rogue DHCP server attacks. We implemented and tested the proposed solution using different key...
IP multicast has proved to be the best approach for large scale multimedia communications enhancing video transmissions for applications like IPTV, video conferencing or other best-effort real-time audio/video applications. IP multicast connectivity, unfortunately, relays on certain network technologies and protocols and is present only in some areas of the Internet, while the majority of hosts lack...
In this paper we introduce a new signature scheme specially designed to address one of the most important problems of mobile communications: possible unauthorized access to private / secret keys stored on mobile terminals. Our solution is based on a relatively new concept called “certificate - based encryption” (CBE). CBE combines the best aspects of identity - based encryption (IBE) with the advantages...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.