The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Solutions to security problems are proposed to protect the architecture (secure architecture) and to secure data (cryptography). Security is based on five essential principles which are supposed to guarantee the correct execution of both, the program and the communication. These five principles are confidentiality (encryption), integrity, availability, authenticity and nonrepudiations. Embedded systems...
The organizations are shifting from the desktop based solution to Web based platform to solve their business needs. The amass of these different systems poses problems for end-users, who must frequently provide their username/password across different systems, as well as for system administrators, who must manage security and access for those systems. Single sign-on mechanisms have become increasingly...
Mobile WiMAX is a rapidly growing broadband wireless access (BWA) technology that is very applicable for the emerging mobile multimedia applications due to its packet based approach. In order to improve the performance of mobility, the concept of ASN anchored mobility is proposed by WiMAX Forum to keep the routing path prior to the anchor point unchanged during handover. However, the key management...
This paper presents an approach to a user authentication system for web applications using JME enabled cellular phone as an authentication token. Most of the existing web based user authentication systems use user IDs and passwords to authenticate users. However, since its inception, the internet has been the witness to increasing number of attacks resulting sensitive information like user IDs, passwords...
RFID (Radio Frequency Identification) has been used in Supply Chain management but with the advent of Nanotechnology enabled RFID energy consumption is being constantly decreased. The major issues between implementation of such devices are their reliability and security. In this work we have implemented a novel and effective VPP (Virtual Party Protocol) for RFID systems. Use of VPP and insertion of...
The expansion of internet escalated banking to a new level and has raised tremendous opportunities of joint transactions in which multiple banks cooperatively conduct some computation. Such computations use confidential data of the involved banks to compute the result. As the concerned data is private for the owning organization, its security is prime concern. Privacy preservation concern rises as...
Wireless LAN (WLAN), despite its popularity, is subject to various security threats. Encrypting the data being transmitted is one of the approaches to address such risks. However, encryption algorithms are known to be computationally intensive and the relation between the strength of encryption and computational intensity is inversely proportional. In this paper, we discuss the challenges in the implementation...
WiMAX (Worldwide Interoperability for Microwave Access)/ IEEE 802.16 is a very promising 4G technology. WiMAX is now in the testing via implementation stage at various locations like Taiwan, India. The results have been, so far, very promising. With the growing popularity of WiMAX, the security risks have increased many folds. In this paper we will give an overview of the security architecture of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.