The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
RSA algorithm is used to hide and retrieve the data in an insecure network environment. The advantage of RSA algorithm is to increase security and accessibility. The private keys never required to be transferred or exposed to everybody. In a shared-key cryptographic system, the secret keys must be shared since exactly the same key is used for encryption and decryption. So there may be a chance that...
Cloud computing is a future generation technology for IT enterprise. It has different characteristics like virtualization, multi-user, scalability and many more. It also provides on demand computational infrastructure which has the power to reduce the cost to build the IT based services. It can provide deferent types of service over the internet. One of the important services is provided by the cloud...
The IT world these days is migrating to cloud computing as the matter of fact that cloud providers provide IT resources on demand over the Internet. These resources vary from highly available instances to variety of storage types, all over demand and the pay as you use concept fascinates the enterprises to move to cloud. But as the individuals and enterprises are now inclined towards these services,...
As most of the web applications are associated with database as back end so there are possibilities of SQL injection attacks (SQLIA) on it. Even SQLIA is among top 10 attacks according to Open Web Application Security Project but still approaches are not able to give proper solution to this problem. Number of measures are also discovered to overcome this attack, but which measure is more convenient...
Secure data aggregation in wireless sensor networks has two contrasting objectives, i) Efficiently collecting and aggregating data and ii) Aggregating the data securely. Many schemes do not take into account the possibility of corrupt aggregators and allow the aggregator to decrypt data in hop by hop algorithms. On the other hand using public key cryptography for providing end to end security is not...
Due to their applications in situations such as emergencies, crisis management, military and healthcare, message security is of paramount importance in mobile ad-hoc networks. However, because of the absence of a fixed infrastructure with designated centralized access points, implementation of hard-cryptographic security is a challenging prospect.In this paper, we propose a novel method of message...
Message security is of paramount importance in mobile ad-hoc networks (MANETs) due to several reasons including their applications in situations such as emergencies, crisis management, military and healthcare. However, because of the absence of a fixed infrastructure with a designated centralized access point, implementation of hard-cryptographic security is a challenging prospect. In this paper,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.