The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Each Android app must have an Android manifest file. It is one of the most important configuration files manually written by developers. In addition to various configuration parameters required to run an app, it also contains configuration parameters which are used to implement security, compatibility, and accessibility of an app. Any mistakes in writing the manifest file can cause serious implications...
The proliferation of Internet of Things has propelled the popularization of IEEE 802.15.4 standard. For the secure transmission of confidential data over 802.15.4, multiple encryption-based security techniques have been proposed in the literature. But these techniques do not ensure undetectable communication which is crucial in multiple scenarios like covert military operations. It is not sufficient...
With advent of technology existing electrical grids are changed to smart grids which are effective power management, secure communication, reduced production cost and environment friendly. But, Smart Grid is complex hierarchy architecture. There are various stakeholders included. So, the biggest challenges are authentication and authorization. Secondly how to secure the communication lines from various...
Currently, there is a lack of tools or techniques which can clearly handle the complexity related to inter-component communication while developing Android applications. We propose a conceptual model which represents the inter-component communication at a higher abstraction level. We also propose a technique to derive test case from the model. The model can be useful in handling complexity at various...
In most human surveillance and forensic applications, key requirement is often to achieve highest possible true positive identification accuracy with a judicious compromise in accepting false positive identities. However with such scenario's in mind, there has been lack of any effort to develop adaptive security management for open set biometric recognition and most of the available prior work in...
Securing digital image during transmission is very much important in the current era. For this purpose, cryptographic techniques as well as chaotic maps can be applicable. In this paper, we have given a detailed study of the image encryption using different 2D chaotic maps such as Arnold 2D cat map, Baker map, Henon map, Cross chaos map and 2D logistic map. The security analysis of these techniques...
The concept of cloud computing is based on the time-sharing of costly resources and advantages of the economies of scale. Cloud computing applies conventional supercomputing, or high-performance computing power, to perform computations in consumer-oriented applications. It is a result of exploring ways and means to ensure availability of computing power to users through sharing of resources and algorithms...
There has been significant advancement improvement in the capabilities of biometrics and data protection technologies in last decade. The significant reduction in cost, improvements in speed and accuracy has resulted in increased deployment of such technologies in day-to-day business and public utilities. The increasing use of biometrics and data protection technologies has also raised concern on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.