The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The growth of both IT technology and the Internet Communication has involved the development of lot of encrypted information. Among others techniques of message hiding, stenography is one them but more suspicious as no one cannot see the secret message. As we always use the MS Office, there are many ways to hide secret messages by using PowerPoint as normal file. In this paper, we propose a new technique...
21st century is often called the Information Century. Information technology is being used in all areas of life from medicine to astronomy. The list of developments and advances happened in those areas thanks to information technology penetration is endless. As the world become digitized more and more and information technology becomes ubiquitous, creating electronic and digital phenomena such as...
Electronics devices are always targeted with different kind of attacks due to their activities related to data processing, data storages and data transactions. In each case, the attacker performs the attacker according to what he needs from the device. In this paper, we present various attacks types on electronics devices in particularly on crypto-module devices where we focus on side channel attacks...
Electronics devices are always targeted with different kind of attacks due to their activities related to data processing, data storages and data transactions. In each case, the attacker performs the attacker according to what he needs from the device. In this paper, we present various attacks types on electronics devices in particularly on crypto-module devices where we focus on side channel attacks...
The growth of both IT technology and the Internet Communication has involved the development of lot of encrypted information. Among others techniques of message hiding, stenography is one them but more suspicious as no one cannot see the secret message. As we always use the MS Office, there are many ways to hide secret messages by using PowerPoint as normal file. In this paper, we propose a new technique...
The usage of smartphone nowadays has been increasingly and most of people in the world use it. Following this development a wide variety of applications for mobile phones have been created. After all, most people use the smartphone to browse social networks, listen to music, play games, make memos upload photos to Instagram, accessing banking services, as well as data sharing through cloud system...
The usage of smartphone nowadays has been increasingly and most of people in the world use it. Following this development a wide variety of applications for mobile phones have been created. After all, most people use the smartphone to browse social networks, listen to music, play games, make memos upload photos to Instagram, accessing banking services, as well as data sharing through cloud system...
21st century is often called the Information Century. Information technology is being used in all areas of life from medicine to astronomy. The list of developments and advances happened in those areas thanks to information technology penetration is endless. As the world become digitized more and more and information technology becomes ubiquitous, creating electronic and digital phenomena such as...
In mobile healthcare system, the medical user's physiological signals are gathered by the body sensor networks and transferred to the mobile devices via Bluetooth, Zigbee and so on. This in turn is transmitted to remote healthcare center via 3G or 4G networks. With this information provided by the medical user, the medical professionals assist them and save users lives. This information are very sensitive...
21st century is often called the Information Century. Information technology is being used in all areas of life from medicine to astronomy. The list of developments and advances happened in those areas thanks to information technology penetration is endless. As the world become digitized more and more and information technology becomes ubiquitous, creating electronic and digital phenomena such as...
The evolution of digital communication era includes both devices and applications running on different platforms. Specifics applications are needed for a safeguard communication ensuring protection and trust services to the users. This paper presents an authentication and session-key establishment protocol that enabling mutual authentication procedure between involved entities in the WSNs. This scheme...
A lot of new features and capabilities emerge in the network because of separation of data plane and control plane in Software Defined Network (SDN) terminology. One of them is the possibility to implement Northbound API to allow third-party application to access resources of the network. However, most of the current implementations of Northbound API do not consider the security aspect. Therefore,...
This paper presents an efficient optimized backlight local dimming method that minimizes power consumption under a given allowable distortion for liquid crystal displays with edge-lit light-emitting diode backlight. To reduce image quality fluctuation, an inequality constraint optimization problem is formulated using a given allowable distortion and the steepest descent method is used to solve the...
Power analysis attack on cryptographic hardware device aims to study the power consumption while performing operations using secrets keys. Power analysis is a form of Side Channel Attack (SCA) which allows an attacker to compute the key encryption from algorithm using Simple Power Analysis (SPA), Differential Power Analysis (DPA) or Correlation Power Analysis (CPA). The theoretical weaknesses in algorithms...
Data exchange over public network requires for the most part an important security mechanism enabling to both sender and receiver the property that they can mutual authenticate using different identification parameters playing the vital role of secret shared key computation. Based on the decisional Diffie-Hellman assumptions, this paper presents a cryptographic calculation of the shared secret key...
In the QR Code authentication technique, smart phone has become a great tool and played an important role in the authentication process. It has been used in various fields over the internet, especially in multi-factor authentication. However, security aspects should be well taken care of. In this paper, the performance comparison between RSA and Elliptic Curve Cryptography-based QR Code Authentication...
Current generation of smart mobile devices can do all the things which were only possible with dedicated hardware. With 3G, 4G network they can even connect to data network anytime, anywhere as needed. However, there are limits to how much network data people are allowed, so most of smart mobile device users tend to connect to Wi-Fi network which doesn't consume their data plan. Although Wi-Fi has...
This paper presents an efficiency and adaptive cryptographic protocol to ensure users' privacy and data integrity in RFID system. Radio Frequency Identification technology offers more intelligent systems and applications, but privacy and security issues have to be addressed before and after its adoption. The design of the proposed model is based on clustering configuration of the involved tags where...
In many countries, the increasing longevity and declining fertility rates have contributed to aging populations and thus increased medical needs. The traditional healthcare methodology is being replaced by smarter healthcare (a.k.a. E-healthcare, u-healthcare, m-healthcare or cloud-healthcare). The cloud computing has gained more and more popularity in recent years. Several cloud based healthcare...
The development of internet and new technology has been growing continuously, smartphone is now a necessary device that has great impact on users in various ways. Internet and smart devices have gained their success in various fields and have provided conveniences to all types of users. The flow of data is seen as a part of the internet and smart devices. Since a large amount of users rely on the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.