The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing is an advanced and nascent technology, which permits convenient access to data, software and IT services over the web. It allows users to pay on the basis of use and has the high performance. Virtualization technology segregates the elementary functions of computers from the hardware resources and the physical infrastructure. Virtualization technology considered principal characteristic...
Online healthcare system provides healthcare services remotely to the patient which include telecare medicine system, patient monitoring system, patient healthcare system etc. Authentication schemes plays a significant and crucial role in providing legitimacy of patient and protection to medical resources/services. New trends in cryptography make the online healthcare services feasible solution to...
In the era of technology data security and information sharing is always a hot topic to talk on. There are lot of methods that are being used in security for secret information sharing such as cryptography, steganography, watermarking etc. another technology that is being used by people is QR code based information sharing but this technology is not enough to provide privacy in information sharing...
The access to information globally and by a significant percentage of the world population is an indispensable part of our daily routine. With this global network access comes the increased possibility of malicious attacks and unauthorized access to identity, information, and other resources. In order to curb the latest threats resulted from the internet revolution in the past few years many quick...
Interconnected computer systems and services using networks have improved the dependence on the stored accumulated data. Interconnected systems via network, in turn, could expedite security attacks. Recently, network security and cryptography techniques have evolved, leading to the advancement of biometric-based smart cards technique to implement the security of networks. In this paper, we demonstrated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.