The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper mainly focus on designing and implementing a web security model in order to protect the network from any potential threats and attacks. When the email and information exchange between two parties over insecure channels, a web security model with optimized zero knowledge protocol can be used to identify the authentication between two parties. The proposed security model can achieve the authentication...
In this paper, we present a practical Electrocardiogram-based (ECG) human authentication method which is very suitable for deployment in mobile devices like smart phones. A user only needs 20 seconds to register his ECG template at the first time and about 4 seconds to authenticate afterwards. We firstly extracted heartbeats of every cardiac cycle and then separately corrected PQ segments, QRS segments...
Recommender system is to establish the relationship between the user and the information products, to use the existing selection habits and the similarity of each user's potential interest in the object, and then personalized recommendation. It is one of the effective ways to solve the information overload in the Internet age. But in practical application, because of the large number of products and...
A quantum cryptography security model in mobile cloud computing is proposed in this paper, so as to achieve highly-secure data and privacy cryptography in mobile cloud computing environment. In the model, quantum keys are distributed to users' phones through two phases. Firstly, existing classical optical network has been transformed as quantum distribution network conveniently through multiplexing...
Identity-based signcryption which guarantees the confidentiality and authentication of message is suitable for the key management of Ad Hoc network due to its low computation cost. Aiming at the deficiencies of the existing identity-based signcryption algorithms, this paper proposes an efficient grid-based identity signcryption algorithm which adopts a low overhand, high expandability and high connectivity...
Aiming at the issues of the traditional centralized UDDI model, the distributed UDDI model was proposed. The model adopted the latest version specification of UDDI v3 and the management technology of key space, avoiding uneven service accessing, low processing efficiency and prone to single point of failure. Moreover, service publication and service discovery were elevated, and the good practicability...
In this paper, we propose an Identity-Based encryption (IBE) scheme and corresponding signature scheme with the feature of transmission route assurance. And then, we put forward a reforming method to make them more efficient and lightweight with the end-to-end feature, encouraging a broader range of application in ad-hoc networks. Based on these schemes, we present a new identity-based authentication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.