Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Within the IoT-cloud, security has a very significant role to play. One of the best means to safeguard confidentially, security and privacy of a biometric image is through encryption. However, looking through encrypted data is a difficult process. A number of different techniques for searching encrypted data have been devised, but certain security solutions may not be used for smart devices within...
Internet of Things is a new generation of network service platform that allows everyday objects including small devices in sensor networks to be capable of connecting to the internet. Such an innovative technology can lead to positive changes in human life. An e-health service based on the Internet of Things has great potential. The popularity of intelligent mobile medical devices, wearable bio-medical...
Within the IoT-cloud, security has a very significant role to play. One of the best means by which the security and privacy of an image may be safeguarded confidentially is through encryption. However, this methodological process engenders a disadvantage in that it is difficult to search through encrypted images. A number of different means by which encrypted image can be searched have been devised,...
Domain name system is among the core part of TCP/IP protocol suite and the standard protocol used by the Internet. The domain name system consists of mapped website names with Internet protocol, which facilitates browsing by not requiring users to remember numeric notation addresses. The nature of the system, which involves transferring information in plain text, makes it vulnerable to security attacks...
Cloud computing is a novel paradigm in informationtechnology. This approach involves methods that forwardservices to users on demand via pay-as-you-go. Cloud computingcan reduce computation and communication costs, and thisadvantage has resulted in the influx of cloud computing users. Cloud storage, which allows users to remotely outsource theirdata to the cloud, is considered a major cloud computing...
Networking has become an essential factor in daily life and activities where the major problem in network security is the safety of the transfer information. The infrastructure for the networking is the TCP/IP suite, and the address resolution protocol is the core part of the standard which maps the logical address into a physical address. Address resolution protocol is defined as a stateless protocol...
Power consumption of routing protocols is one of the main issues that wireless sensor networks (WSNs) encounter in their lifetime. Low-Energy Adaptive Clustering Hierarchy (LEACH) clustering protocol was introduced to reduce power consumption. However, in LEACH, power consumption increases massively as the distance between sink node and cluster heads (CHs) increases. This drawback introduces distance...
Recently, security issues are obstructing the development and using of cloud computing services. Authentication plays an important role in the cloud security, and numerous concerns have been raised to prevent an unauthorized users to access the entities' resources (sender and receiver) within thecloud environment. Existing solutions are based on one-time authentication scheme, in which a user's password...
A number of image/message document authentication and integrity schemes have been conducted to recognize any modification in the exchange of documents between two entities (sender and receiver) within a cloud environment. Existing solutions are based on combining key-based hash function with traditional factors (steganography, smart-card, timestamp). However, none of the proposed schemes appear to...
Outsourced data in cloud and computation results are not always trustworthy because data owners lack physical possession and control over the data as a result of virtualization, replication, and migration techniques. Protecting outsourced data from security threats has become a challenging and potentially formidable task in cloud computing; hence, many schemes have focused on ameliorating this problem...
Cloud computing is a promising information technology service that allocates and reallocates resources when a client requires virtual data storage and network facility at any time and place. Cloud computing provides large data storage and management services at the lowest cost. Thus, it is crucial for many organizations and clients who seek such services. Data security and integrity are necessary...
Popular service providers, such as Google and Amazon, have turned their vast resources into a cloud computing model and enforced their businesses to run applications on the servers of such new model. To ensure security and privacy in this environments, customers have to encrypt their data before uploading them into the cloud servers. Unfortunately, modern unbreakable encryption methods are inadequate...
The cloud is an on-demand service provided to users through the Internet. Security has become one of the key problems in the cloud because of the increasing number of users. Many challenges in cloud security need to be resolved. This work focuses on data integrity as one of these security challenges because when users remotely save their data in a cloud, they lose their control on them. Many researchers...
Recently, security issues are obstructing the development and using of cloud computing services. Authentication and integrity play an important role in the cloud security, and numerous concerns have been raised to recognize any tampering with exchanges of the image document between two entities (sender and receiver) within the cloud environment. However, none of the existing solutions reduce the probability...
Cloud computing suffers from a number of problems in terms of security issues. Authentication and integrity play an important role in the security field and numerous concerns have been raised to recognizeor protect any tampering with exchanges of text between two entities (sender and receiver) within the cloud environment. Many schemes in this area can be vulnerable to well known methods of attack...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.