The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Caller ID has been used to tell the recipient who is calling before answering the call. In fact, nowadays using just Caller ID is not enough to proof the real caller since there are several ways to manipulate the caller identity. There are number of solutions to proof the caller e.g. using Time base, SMS base, or hardware. Even using DSA and CA, it can lead to data leak or inconsistent verification...
Calculation of large numbers is the foundation technique to the procedure of computer encryption and decryption. Unfortunately, the operation capacity of our today's computers cannot satisfy our needs. In another word, computer software today cannot perform the calculation of large number that incorporates hundreds or thousands of digits to accuracy. In particular, division of large numbers is the...
Elliptic Curve Cryptography (ECC) is a kind of cryptography that provides the security information services using shorter keys than other known public-key crypto-algorithms without decreasing the security level. This makes ECC a good choice for implementing security services in constrained devices, like the mobile ones. However, the diversity of ECC implementation parameters recommended by international...
Various security mechanisms are available to validate, authenticate and permit codes, data and scripts for executing in a computing device. Accordingly, different techniques and tools have been developed to preserve integrity and confidentiality at the process, protocol, system and communication levels. For example, Trusted Platform Module, Intel Trusted Execution Technology and Windows Vista Kernel...
This Paper presents a new data encryption conception and algorithm. In this paper, one general data encryption key is used, and one more method encryption key is used too. By two keys method (TKE), the new algorithm obtain many useful properties, it operates quickly and easy perform by hardware, it has high encryption intensity and just like the DES when one bit in the data charged the encryption...
Securing data in communication systems is the most common real-life cryptographic problem. Basic security services require both encryption and authentication. Modern public-key cryptography depends on a handful of algebraic problems, trying to achieve the best possible security while remaining extremely efficient and practical. This paper is concerned with the implementation of public key encryption...
Conventional approach of detecting malwares relies on static scanning of malware signature. However, it may not work on the malwares that use software protection methods such as encryption and packing with run-time decryption and unpacking. We propose a hardware-assisted malware detection system that detects malwares during program run time to complement the conventional approach. It searches for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.