Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
With the advantages of vehicle networks, cloud computing, Vehicle Cloud Computing (VCC) has emerged, wins a lot of interests. In this paper, we propose an attack detection scheme in the VCC, that can detect the potential attacks launched by malicious vehicles, while preserving benign vehicles' privacy. First of all, we propose a distributed secret key distribution scheme, where multiple authorities...
Offline password cracking has seen significant advances in recent years. This is mainly due to a dramatic increase in accessible computational speeds and the increased exploitation of GPUs for parallel processing. Cheaper and faster hardware, combined with new techniques, have allowed inexpensive GPUs to crack passwords at rates which only supercomputers could achieve previously. One inexpensive mitigation...
Several techniques have been proposed for information hiding including hiding in slack space, which is the focus of this paper. However, current techniques of hiding in slack space depend on utilizing exiting slack space on the disk, which can be seriously limiting. Also, all techniques proposed thus far for hiding in slack space are impacted by the cluster size on the disk since the maximum slack...
This paper presents a vulnerability on devices running Apple iOS, and can be traced back to iOS 3. First discovered in 2009 on iOS, and again in 2011 on Mac OS X, the vulnerability exists in a feature which seeks to help the device user maintain internet connectivity when attached to open WiFi networks protected by a captive portal. Since many modern applications rely on an internet connection, to...
Effective and efficient sanitization of digital storage media is essential from both an information security as well as a digital forensics standpoint. The method proposed in this paper, ERASE, unlike brute force methods, computes the entropy of each data block in the target area, and if the entropy is within the specified sensitivity range, then that block is wiped with a user specified number of...
Recovering deleted information from a hard disk has been a long standing problem. The computer forensics community has tackled information recovery through the development of file carving techniques. Two issues, however, still present significant challenges to their on-going efforts - 1) Prior knowledge of file types is required for building file carvers including file headers and footers, and 2)...
Wireless sensor networks (WSNs) have critical applications in diverse domains like environmental monitoring and military operations where accurate location of sensors is vital. One common method of location discovery uses a set of specialty nodes known as beacon nodes (BNs) that assist other sensor nodes (SNs) to determine their location. This paper proposes a novel reputation-based scheme called...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.