The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Academic institutions are among the most targeted information systems in the world. Their highly decentralized infrastructure makes it difficult to ensure reliable security measures across their networks. Moreover, academic institutes have different departments, with diverse users (faculty, staff, students, and researchers), with abundant public and private data residing on servers and end systems...
Recent researches in steganography get used to hire one cover image as a host image. In this paper, a novel method was proposed to use two cover images as host images with one secret (stego) image. The main principle of using two host images is to increase the security in the receiver side when sending each host image alone in different times. The first phase starts with sending the first cover image...
Use of the Internet has become our second nature. With each passing day computers and mobile devices are becoming ubiquitous in our society. In this backdrop the confidentiality of information is now a question of paramount importance. It is understood fact now that merely technical security solutions cannot guarantee security. End users are required to have solid understanding of the security issues...
2013 2nd National Conference on Information Assurance (NCIA) is the second in its series with the pioneer conference NCIA-2010 held in August 2010. The conference aims to serve as a platform for exploring the latest trends, technologies, developments, challenges and industry best practices in the field of information security and information assurance. On this platform, experts and researchers from...
The tremendous growth of information technology has abruptly changed the world into global village. It has caused the distances to shrink and information to flow across the globe as it occurs. At the same time it has also given boost to vulnerabilities, threats, frauds and criminals in the cyberspace. The ease of access, user friendly hacking tools and sophistication in cyber attacks has infringed...
A novel and technical approach for watermarking tables of a numeric dataset is proposed. Watermark insertion and detection is done by K Map Minimizer. The crucial aspect of the proposed technique is the permuted bit pattern generation. The bit pattern is generated by first selecting unique rows and columns and solving the four attributes at the selected position through the K Map Minimizer to constitute...
Since its introduction in 1992, Global System for Mobile Communications (GSM) has evolved to become a worldwide standard in mobile telephony. Security in GSM, albeit being one of the most important issues, has not yet been scrutinized to a level it deserves owing mainly to the expensive hardware requirements and lack of thorough understanding of GSM protocols in general. This scenario is changing...
Network intrusion detection systems are considered as one of the basic entities widely utilized and studied in the field of network security that aim to detect any hostile intrusion within a given network. Among many network intrusion detection systems (NIDS), open source systems have gained substantial preference due to their flexibility, support and cost effectiveness. Snort, an open source system...
Wireless Body Area Network (WBAN) has become imperative due to rapid advancement in medical technology. However, WBAN faces different security issues due to open air communication of information. In this paper, we have proposed a lightweight smart crypto solution using authenticated key exchange coupled with cluster head formation and selection for the security of WBAN. Our proposed solution logically...
In this paper, a modified digital signcryption model has been proposed keeping in view the requirements of firewall signcryption. Based on this model, the security and efficiency of existing signcryption schemes that are presented over the years have been analyzed. The analysis shows that these schemes lack certain security attributes and violate the basic principles of firewall signcryption. Furthermore,...
Today, Cloud Computing is the preferred choice of every IT organization since it provides flexible and pay-per-use based services to its users. However, the security and privacy is a major hurdle in its success because of its open and distributed architecture that is vulnerable to intruders. Intrusion Detection System (IDS) is the most commonly used mechanism to detect attacks on cloud. This paper...
Recent occurrences in the global geopolitical arena shape the ground to the vanguard of swift strategic intelligence gathering through open-source medium, particularly the online social networking media. Various intelligence agencies in the world - are at present - incorporating online social media platforms into function, as a valuable source of information acquisition. However, the integration of...
Twenty first century has seen a new dimension of warfare; the cyber warfare. Developed countries have started exploiting the vulnerabilities of cyberspace to gain supremacy and influence over the rivals and over countries. Projects like PRISM and Boundless Information and malwares like Stuxnet and Disttrack have surprised the world by revealing how the cyberspace is being exploited by developed countries...
In this paper, the problems of robustness and quantity of embedded watermark of digital watermarking linked with independent spatial and frequency domains have been analysed. In attempt to overcome these problems to some extent, we have proposed a technique for watermarking in combined spatial and frequency domains based upon chaotic maps. By applying chaos effectively in secure communication, the...
An encryption scheme, such as counter (CTR) mode encryption, uses a block cipher to achieve the confidentiality of plaintext. Assuming the block cipher to be a pseudorandom function (PRF), CTR mode encryption is provably secure, namely it achieves indistinguishability under chosen plaintext attacks (IND-CPA). The CTR mode, however, is not specifically designed to hide timing patterns present in the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.