The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing being promising and emerging technology for the next generation of IT applications which provides the storage and supports for outsourcing of data without having the native copy of data or files. Cloud computing service providers require a system which can handle a large number of requests at a time and is needed to be highly available. Major issue faces in cloud computing is Security...
An attack which can be performed with a steganographic approach is detecting the presence of information in a file. There are three challenges involved in steganalysis. First, there is no guarantee for the presence of hidden data in a file. Second, there is a possibility for a data encrypted in the file. Third, for efficient transmission of message sender may add a noise in a cover medium. For overcoming...
Smart card is widely accepted device which is used as a second authenticating factor in remote user authentication schemes. Kim-Chung proposed a remote user authentication scheme and they claimed that their scheme resists various security problems which were present in previous schemes such as offline leakage of password, stolen verifier attack, chances of masquerading the entities of the scheme....
Modern cryptography offers three goals of Confidentiality, Integrity and Availability, known as CIA triad. Confidentiality of any message or communication is secrecy of its content. All the modern cryptosystems provide cryptographic secrecy and not perfect secrecy. Two ingredients of perfect secrecy are truly random source and secure communication channel. Both are available in quantum computing paradigm...
Let p be an odd prime number as the characteristic of finite field, this paper introduces a pseudo random binary sequence generated by a primitive polynomial of degree 2 over Fp, trace function, and Legendre symbol. Then, its period and autocorrelation are introduced with a small example.
In secret sharing schemes, there is always a special participant called the dealer who controls the distribution of the secret S. It is so powerful that once the dealer is depraved, the whole system is to be paralyzed. In order to solve this problem, it is necessary to cancel the privilege of the dealer and realize completely fair secret sharing. In this paper, we make use of the excellent additivity...
Benefited from cloud storage services, users can save their cost of buying expensive storage servers. Meanwhile they lost the physical control of their data. So effective methods are needed to verify the correctness of the data stored in cloud servers, which are the research issues the provable data possession (PDP) faces. This paper analyzes the existing PDP algorithms, finds some defects of these...
Encryption has become a critical need for almost every data communication systems. A huge value of sensitive data is transferred daily via different computer networks such as electronic banking, email applications and file exchange. Advanced Encryption Standard (AES) algorithm has become the optimum choice for various security services in numerous applications like Ad hoc networks and wireless sensor...
Due to the rapid growth of computer networks, many network environments have been becoming multi-server based. There has been a number of methods proposed for authentication in multi-server environments. Many of these methods achieve mutual authentication by sending encrypted or hashed secret information across the network which make them vulnerable to various Man-In-The-Middle attacks. This paper...
Multimedia confidential data uses internet communication channel for transmission where it is not very safe to transmit data via internet communication channel. So it is desired to secure the data before transmitting. The image transmission is a also an another way where image is an array, or a matrix, of square pixels (picture elements) arranged in columns and rows Image processing is one of the...
Cryptography is a technique by which the stored and transferred data in a particular form can be comprehended and processed by only those, who it is intended for. In the modern era, cryptography is most often associated with the deception of the plaintext into a cipher text using a process called Encryption then back to the original plaintext using a process called Decryption. Strong cryptography...
As cloud computation becomes mainstream, the need to ensure the privacy of the data entrusted to third parties keeps raising. But the actual computation inside cloud microprocessors remains unencrypted. Thus, the opportunity of leakage is theoretically possible. Therefore, to address the challenge of protecting the computation inside the microprocessor, we introduce novel general purpose architecture...
Nowadays, PC is normally used in companies and information which contains secrets is often managed on PCs. Protection of the information is one of the important things in nowadays society. Virtual machine is one of the solutions of the problem since guest OS can be observed by hypervisor. However, in this case, sending secrets to outside cannot be prevented. Moreover, the observation sometimes decreases...
In many applications, such as e-voting, it is imperative that the privacy reaches a level of unconditional security. In this context, protocols that verify that condition reach maximum interest. Probably, the most interesting of them is Non Interactive Dining cryptographers (NIDC), which relaxes the condition of concurrency online for all participants. NIDC proposes to store the vote on a table of...
Together with the popularity of graph structure in real world data, graph analysis has become an attractive research topic. Triangle counting is one of typical graph mining tasks and plays a significant role in complex network analysis, with a wide range of applications in social network analysis, spam detection, and computer-aided design applications. Given the sensitive nature of graph data, the...
This paper discusses the efficiency of statistical tests for evaluating of pseudorandom number generators. We present the method to reduce a number of false negatives for pseudorandom sequences testing. We discuss this method applicability for specific tests and provide calculations of confidence intervals based on the tests significance. Also we describe the approach based on the calculation of the...
Keylogger is a specific type of spywares, that attempts to steal user information, by keep tracking user keyboard, and log every keystroke in a log file; to be used by a third party. Keylogger is one of the most serious problems which blustering information security in this era. And it still considered an open problem. Most of the keylogger softwares available, intercept the key after it has been...
The paper discusses the efficiency of parallel implementation an algorithm of frequency analysis of textual information. The algorithm is implemented as a multithreaded application. Two approaches for job distribution between threads are compared — the text distribution and alphabet distribution. Experiment results shown that both methods can be used for acceleration of the procedure of text frequency...
Now a day's privacy is the main issue to sending information from one point to another in data transmission. Encryption of data is the most effective way of computer science concerned with developing schemes and formula to achieve data & information security. In its course of action, it allows sequence to be encoded in the form of cipher text where it is extremely difficult to read or recognize...
Bitcoins have opened a new chapter in the arena of electronic financial transactions. Due to their decentralized nature and independence from the need of a third party for authorizing transactions, they are seen as an alternative choice for payments by many firms and financial institutions. But like all other prevalent financial transaction technologies, they are also having their securities issues...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.