The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Biometrics deals with automated method of identifying a person or verifying the identity of a person based on the physiological or behavioural characteristic, and so is used for authentication in many of the online transactions. The biometric that has been chosen for implementation is fingerprint, since fingerprint biometric is easily available and highly reliable compared to many other biometrics...
From thousands of years back our predecessors have invented several ways of passing information in hidden form with other objects like papyrus scroll, cryptex etc. As decades crossed through earth's vein we are getting matured and invented several steganographic systems for message passing. The availability of internet in every corner of the universe forced the user of steganographic systems to invent...
Security, the most common word uttered by any man, any device, any peripheral since past two centuries. Protection from malicious sources has become a part of the invention or the discovery cycle. Myriad methods of protection are used ranging from a simple authentication password to most cryptography algorithms for protecting the extreme sensitive or confidential data. This paper proposes three indigenous...
Mobile Ad Hoc Network (MANET) is a collection of mobile nodes (hosts) which communicate with each other via wireless links either directly or relying on other nodes as routers. In general, routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. However, due to the open structure and scarcely available battery-based energy, node misbehaviors...
Healthcare is the preservation of mental and physical health by preventing or treating illness through services offered by the health profession. Many methods are available but the growing technology and current trends make them inefficient. In order to make this Healthcare as a pervasive one we introduce an efficient method, Mobile health care system. This Mobile Healthcare is the “Emerging mobile...
Data security in wireless sensor networks include data authenticity, data confidentiality and data availability. Providing desirable data security in wireless sensor networks is a challenging one since wireless sensor networks consists of large number of sensor nodes that are generally placed in hostile or unattended environments which may be exposed to several attacks. Attacks due to node compromise...
The mobile agent has been seen as a promising distributed computing technology. The mobility characteristic of mobile agent makes it to travel often in open network. In this scenario, it is obvious that the mobile agents are vulnerable to various security threats. Protecting free-roaming mobile agents from malicious host and from other mobile agents has drawn much attention in recent years. Most of...
Biometric techniques consists of uniquely identifying a person based on their physical characteristic or behavioral characteristic. It is mainly used for authentication purpose. Iris is one of the most powerful technique among all biometrics because of its uniqueness and stability. For authentication, the feature template in the database and the user template should be the same. Storing the template...
Key Agreement or key exchange algorithm proposed by Diffie-Hellman in 1976 has suffered from man-in-middle attack. In 2002, Zhu et al. proposed a password authenticated key exchange protocol based on RSA. Later, Yeh et al. has shown that Zhu et al.'s protocol suffers from the undetectable password-guessing attacks and also has given solutions for improvement. Recently, Chang and Chang proposed a novel...
The application server handles dynamic and sensitive Web contents that need protection from eavesdropping, tampering, and forgery. Although the Secure Sockets Layer (SSL) is the most popular protocol to provide a secure channel between a client and a cluster-based network server, its high overhead degrades the server performance considerably and, thus, affects the server scalability. Therefore, improving...
Mobile users enjoy seamless roaming over wireless environment. The wireless network is cumbersome and error prone, thus there is a need for a good and strong authentication scheme which should be designed in such a way that it retains the privacy of the user. It should also be capable of providing minimized communication overhead as most of the exchange of messages in wireless network is found to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.