The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the easiest and cheapest way of authenticating an end user, password based authentication methods have been consistently chosen by almost every new cloud service. Unfortunately, the explosive growth of cloud services and web applications has made it impossible for users to manage dozens of passwords for accessing different cloud services. The situation is even worse considering the potential application...
Shoulder-surfing, phishing and keylogging are widely used by attackers to obtain users' sensitive credentials. In this paper, we propose a framework to strengthen password authentication using mobile devices and browser extensions. This approach provides a relatively high resilience against shoulder-surfing, phishing and keylogging attacks while requires no change on the server side. A prototype implementation...
Among the existing malicious code detecting methods, the approach that based on code behavior is more practical. In this method, it judges if one code is malicious or not based on behavior the code generated. This way to arbitrate malicious code is more advanced and precise. The malicious code behavior detecting model based on virtualization technology ameliorated the existing technology, it separates...
Disassembly is one of the important processes of complex equipments maintenance. On the basis of analyzing the maintenance characteristic of complexity equipments, a method to generate disassembly sequence is presented. Using the knowledge of graph theory, the method realizes to generate automatically the optimal disassembly sequence through establishing the constraint matrix. And the method is applied...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.