The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper addresses the rapidly increasing issue of sensitive user data theft and the data incongruity due to Web Content Management System (WCMS) structure and very complex WCMS to WCMS conversion procedure. After retaining the full picture of the situation, the paper approaches a solution for securely accessing, modifying and migrating WCMS database(DB) using a precise information hiding and data...
For medical treatments, the integrity of the medical images, the authenticity of corresponding medical records, and the privacy of the patients are crucial requirements for the diagnosis of patient's disease. Therefore, how to retain the validity between images and medical records is an important topic for researches and real applications. In this paper, we apply the concept and implementation in...
A new ID-based (t,n) threshold signcryption scheme is proposed based on identity and discrete logarithm problem in finite field. By using Lagrange Interpolation Formula, the new scheme not only has the function of threshold signature, but also has the function of hiding message and designating verifier. So this scheme has authentication, secrecy, data integrity and privacy of signers, it can be used...
Data fusion or information collection is one of the fundamental functions in the future cyber-physical systems. But, privacy concerns must be addressed and security must be assured in such systems. It is very challenging to achieve the synergy of privacy and integrity, because privacy preserving schemes try to hide or interfere with data, while integrity protection usually needs to enable peer monitoring...
As organizations increase their reliance on, possibly distributed, information systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Though a number of techniques, such as encryption and electronic signatures, are currently available to protect data when transmitted across sites, a truly comprehensive approach for data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.