The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A persistent, targeted cyber attack is called an advanced persistent threat (APT) attack. The attack is mainly launched to gain sensitive information, take over the system, and for financial gain, which creates nowadays more hurdles and challenges for the organization in preventing, detecting, and recovering from such attacks. Due to the nature of APT attacks, it is difficult to detect them quickly...
The number of on-road vehicles has increased by almost 140% over the past decade, thereby increasing pollution levels, congestion and fuel consumption. To contain such a situation, Vehicular Ad-Hoc Network (VANET) technology is almost on the verge of large scale practical deployment. Hence, the aim is to provide a system to control the above using VANET and to provide an infrastructure to reduce the...
An enhancement of the authentication protocol for Otway-Rees protocol is proposed to improve some drawbacks of original Otway-Rees protocol and Improved Otway-Rees protocol. In context, a problem is in original Otway-Rees protocol suffer from lack of data integrity and data confidentiality invites impersonation attack by modifying message format sequence and adding other messages. The Improved Otway-Rees...
The concern for security increases due to the advances in the falsification technology. Biometrics is the only authentication method which truly identifies an individual when compared to other methods like PINs and passwords. Even though there are numerous biometric approaches, these are not robust. In this paper, we aimed at building a protocol which focuses on Electrocardiogram (ECG) being used...
Security is one of the basic needs of a system. New methods of providing security need to be found. To overcome all the security issues in current protocol, a new protocol is defined. The protocol makes use of visual cryptography technique by which images can be used as password. Here, we use the visual secret sharing scheme to protect the data that cannot afford getting hacked. Authentication is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.