The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Digital Signage Systems using some computer devices are widely used for displaying some dynamic information, unlike wall ads that are unchanged for a certain period. At the replacement time of our university's digital signage system, we need to implement cost effective digital signage system. Therefore, we developed a brand-new style of the digital signage display device using low-cost information...
Reliable federation identity management and efficient user authentication using single-sign-on (SSO) are desirable aspects of InterCloud to achieve inter-operable security objectives. Trust is an important aspect which enhances reliability of federated identity management. Existing service provider-initiated or identity-provider initiated identity sharing models for SSO does not analyse the reliability...
In this paper, we explore the usage of printed tags to authenticate products. Printed tags are a cheap alternative to RFID and other tag based systems and do not require specialized equipment. Due to the simplistic nature of such printed codes, many security issues like tag impersonation, server impersonation, reader impersonation, replay attacks and denial of service present in RFID based solutions...
Supply-chain and inventory management are the main areas in the internet of things (IoT) requiring low cost and secure batch mode privacy and authentication of radio frequency identification (RFID) tags. Some additional security and quality of service requirements are also necessary for a secure RFID based supply chain application. In this paper, our contribution is twofold: first, we propose a new...
The rapid increase of Internet of Things (IoT) devices will have a significant impact on people's daily life, providing a wide range of services, such as smart lights, door locks, and cameras remotely controlled by smartphones. Remote access within the same environment or via the Internet requires effective authentication and authorization mechanisms beyond those provided by static authentication...
The evolution of the Internet of Things (IoT) has brought new security requirements in terms of communication services with respect to data transmitted in mobile networks. Although IoT middleware systems have been used to cope with the most relevant requirements demanded by different IoT applications, security is a special topic that is not mature enough in this kind of technology. E-health is an...
By exchanging the information on the status and the surrounding environment between devices, devices can determine the optimal action. We focus on the construction of a digital signature scheme for local broadcast, which allows the devices with limited resources to securely transmit broadcast messages. A multi-group authentication scheme that enables a node to authenticate its membership in multi...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.