Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Data generation and its utilization in important decision applications has been growing an extremely fast pace, which has made data a valuable resource that needs to be rigorously protected from attackers. Cloud storage systems claim to offer the promise of secure and elastic data storage services that can adapt to changing storage requirements. Despite diligent efforts being made to protect data,...
Smart card based authentication scheme has been widely utilized for various transaction-oriented services such as electronic currency exchange, social insurance payment and e-commerce payment charge in modern society. How to develop a smart card based authentication scheme to support initiator untraceability and defend against major security threats for a transaction service user has become a crucial...
In recent years, smart card based authentication has been massively adopted in the electronic health care and medical treatment services in which the user and administrator can agree a robust session key based on human-memorable passwords with the hospital server. In this paper, we investigate the robustness of an eHealth care system with smart card based authentication mechanisms. This research is...
In this paper, motion detection with the web cam can determine current conditions around mobile computers, which act accordingly with a variety of response methods. A good balance is achieved between sensitivity of machines and experiences of users. Many practical applications are investigated, and this paper is primarily focused on two main points: user-friendly operations and security. Our system...
Many believe that Cloud will reshape the entire ICT industry as a revolution. In this paper, we aim to pinpoint the challenges and issues of Cloud computing. We first discuss two related computing paradigms - Service-Oriented Computing and Grid computing, and their relationships with Cloud computing. We then identify several challenges from the Cloud computing adoption perspective. Last, we will highlight...
A gateway-oriented password-based authenticated key exchange (GPAKE) scheme allows a client to establish an authenticated session key with a gateway via the help of an authentication server, where the client has pre-shared a password with the server. The desirable security properties of a GPAKE include session key semantic security, key privacy against the server, and password guessing attacks resistance...
Low cost radio frequency identification (RFID) like EPC Gen 2 is one kind of most popular RFIDs in the market. However, as studied by several researchers, Gen 2 is not secure. Therefore, many researchers have devoted to improving the security. However, in addition to the fact the security of these improved schemes are still questionable, these solutions inevitably increase the cost of tags and inevitably...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.