The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since there is significant increase in adoption of cloud computing, securing users emails is also a growing concern. This paper reviews the boundaries, privacy, vulnerabilities, varying legislations of cloud based emails, and how to mitigate such to provide reliable and secure cloud based email services for users and organizations. We propose a new framework to improve security of cloud based email...
Information security is very much essential in information transmission. The requirement of information security is increasing because of wide spread use of distributed systems, network and communication facilities for carrying information between terminal user and computer and between computer and computer. Large number of algorithms for cipher generation and recovering information back from the...
Public Key Infrastructure (PKI) implementations and deployments have been encountering many problems. Most of the information security officers are torn between adhering to the standards or following up a particular mathematical and theoretical model. In this paper we are implementing and deploying PKI at University of Tabuk. In this real world experience we do believe that we can avoid many difficulties,...
We propose a new symmetric block cipher encryption which provides confidentiality to the multimedia while transmitting through the network. The encryption relies on two typical operations, substitution and transposition. A complete binary tree performs substitution and a 2-d array performs non-linear diffusion in the 2 stage of the encryption/decryption process. The first stage spreads out the bits...
Security of databases has become increasingly crucial in all application areas. Database encryption is an important mechanism to secure databases from attacks and unauthorised access. The Transposition-Substitution-Folding-Shifting encryption algorithm (TSFS) is a symmetric database encryption algorithm that uses three keys with an expansion technique to provide high security: it improves the efficiency...
The Internet has evolved to become an essential tool for communication. However, this communication is increasingly involved in strategic issues related to the security of information being exchanged. Transactions made through the network can be intercepted; therefore, it will be necessary to ensure the security of such information. Cryptographic techniques can play a very important role to address...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.