The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the advancements in electronics and communication, the electronic devices are being interconnected to create a controlled environment. The number of devices that are being connected to the Internet is booming day-by-day. However, the existing protocols are verbose and overburden the embedded devices having constrained resources in terms of memory, computational power, battery etc. As a relief,...
Authentication means to verify the identity. It is the basis for any communication to take place as we do not want to reveal any information which must not be disclosed. In general, authentication requires the presentation of credentials to prove who the user really is. Authentication can be done either by a client, server or a third party. Authentication protocols allows the user to send or receive...
A worm is a standalone program, which is self-replicating malware that distributes itself to other computers and networks. An Internet worm can spread across the network and infect millions of computers in very little time. Damages caused by such attacks are considered very high. Worms affect the network packet and its performance. In this paper, different methods are analyzed to detect Internet worms...
Nowadays, with deployment of Cloud Computing and its facilities, many users are absorbed in it. People are not satisfied with Cloud's Security and they are afraid to migrate to Cloud environment. We propose a new protocol that allows users to share their data securely on an insecure cloud servers. Our new protocol assures users that their data and information will stay secure. We focused on sharing...
Cloud computing is an efficient technology to improve the performance of organizations by providing flexibility in architecture and reduction in costs. Dynamic resource pooling, virtualization, on demand service and high availability are some of the advantages provided by cloud computing. However, open and distributed architecture as well as internet access, have caused cloud environments to be risky...
With the hasty popularity of cloud computing data possessor are stimulated to move their intricate data from local repository to commercially available open cloud. We need to search and retrieve all the files which are semantically linked to the query in addition to the precise identical file in a secured manner. But for protecting sensitive information like military information, personal health documents...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.