The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Phishing is a social engineering mechanism to steal the user's credentials which are then used for identity theft leading to financial benefit. Currently majority of Phishing attacks are very unsophisticated as they focus on collecting just the credentials and do not try to validate in real time whether the received credentials are correct. It is obvious that next generation Phishing attacks will,...
As a logical extension of today's highly mobile lifestyle comes the need for high-speed wireless broadband network access. This need was quickly recognized and addressed by the research community with the development of several wireless network technologies. Co-existence of such multiple technologies in the market necessitated a signaling scheme for mobile devices to change the point of attachment...
Phishing is an act of identity theft aimed at acquiring sensitive information such as usernames, passwords, credit card detail etc., by masquerading as a trustworthy entity in an electronic communication. Phishers use a number of different social engineering mechanism such as spoofed e-mail to try to trick their victims. Data suggests that some of the phishing attacks have convinced up to 5% of their...
Integrating telecom services to a standard service delivery platform reusing its standard interfaces to communicate with other services makes both deployment and operation cheaper and easier. That makes it necessary to integrate the state of the art technologies like OMA Converged IP Messaging (CPM) with a standard All-IP service delivery platform like IMS. This work focused on the yet to be explored...
This paper proposes a new secure routing protocol, named secure optimal reactive routing protocol (SORRP) for mobile ad-hoc networks. The work is based on ORRP, reported in one of our earlier works. In spite of being a reactive protocol, SORRP does not use flooding and at the same time finds the optimal path in terms of minimal routing distance. The current work improves ORRP in a two-fold approach...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.