The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With advances in technology sellers offer traditional goods and services on the internet. The payment systems developed for this reason was based on the credit cards or debit cards. Card providers charge sellers some amount based on the transactions. Therefore for some products or services with the low price, the charged amount is very high and not profitable for the sellers. For this reason, new...
Today, user authentication is one of the fundamental procedures to ensure secure communication on online services. Among the authentication methods password -based is popular and widely used. So having a strong password authentication without any vulnerability is essential. In this paper, we propose a password-based remote user authentication with virtual password concept to secure users' passwords...
E-commerce is an outcome of globalization and technology outbreak of 21st century. Increasingly, more products and services are sold over Internet; hence, there is a growing need for a combination of legislation and technical solutions to globally secure customer privacy. Credit card fraud is one of the crimes especially when it is used for Web-based transaction. In this paper, a technical solution...
The Carpet industry is one of the most important sectors of many third word countries such as Iran. The object of this paper is to propose on idea called APF (Authentication Processing Framework) as one of the ways to deter the growing concerns (transponder) which could result in to the violation of information stored in the carpet tag. Tags are embedded on the upper part of carpet products such as...
Today E-tendering is increasingly being adopted through the world. An electronic environment presents obvious opportunities for collusion between principal and certain tenderers, fraud by tenderers and attempt of intruders to illegally access the system. In this paper, security requirements of an e-tendering system are described. Then the existing architecture of popular-tendering system are introduced...
Even though iris-based systems have proven to be very promising in a world where security is crucial, surprisingly enough, this means of authentication has not been given a very warm welcome from the users. In order to appropriately confront this issue, critical success factors of the deployment of networked-based systems for iris authentication - namely technical, human, and implementation aspects,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.