The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Apple claims that iPhone 6, which is equipped with iOS 8.0 and later version, is secure enough to prevent a user's private data from law enforcement or malicious intruders. In pre-iOS 8.0 operating systems, a user's data were only encrypted by hardware-based keys, which can be obtained by Apple. But in iOS 8.0 and later version, the private data on the iPhone are protected by a secret key that is...
Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop efficient and reliable ciphertext search techniques. One challenge is that the relationship between documents will be normally concealed in the process of encryption, which will lead to significant search accuracy performance degradation. Also the volume...
Signcryption is a public key cryptosystem that achieves the functions of digital signature and public key encryption simultaneously. It significantly reduces the cost of traditional signature-then-encryption approach. Although a large body of signcryption schemes have been proposed, few works have been done on attribute-based signcrytion (ABSC) which simultaneously achieves the functionalities of...
Cancelable (revocable) fingerprint templates have been proposed to protect fingerprint data. However, many of them have incurred significant authentication performance degradation. In this paper, we propose a cancelable fingerprint template design mechanism to protect fingerprint data while maintaining a satisfactory authentication performance. The proposed scheme transforms fingerprint minutiae points...
Biometric authentication systems can address the problems of genuine user verification and usability suffered by the conventional cryptosystems based on the password and token. However, as biometrics is not replaceable, its privacy has become a concern. Also, if the same biometrics is used in multiple applications, it will be vulnerable to potential cross-matching attacks. In this paper, a projection...
In this paper, an efficient one-time pad key generation scheme using grid or space scroll chaotic attractors is proposed. This key can be used for low cost protection of large volume digital medical data, e.g. real-time monitoring ECG data. The one-time pad key is generated from grid or space scroll chaotic attractors to ensure its high-level randomness. In addition, each communicating party needs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.