The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Location-based queries have brought challenging privacy issues for mobile users. Having access to data, anytime from anywhere, raises many security concerns. One of these concerns is user's location privacy, where a user must reveal her location to get the desired result. The question is how to benefit from such queries without endangering user's location privacy. This paper presents a new method...
This paper presents an architecture to provide endto- end per-user services with support to client mobility, designed according to the SDN and NFV paradigms. Our service platform dynamically configures and launches service requests when the client connects to the network, which are used by a multidomain orchestration system to arrange the required network configuration and computational resources...
User authentication is a very important securitymechanism for accessing the services while roaming in theglobal mobility networks. However, the authentication schemesdesigned are vulnerable to the attacks, hence new requirementsshould be employed while designing a scheme. In 2014 Gopeand Hwang proposed an efficient mutual authentication andkey agreement scheme, in which they stated that the schemeprovides...
The main objective of the democracy is “vote” by which the people can elect the candidates for forming an efficient government to satisfy their needs and requests such that their standard living can be improved. In developing countries like “INDIA” the election commission follows manual voting mechanism which is done by electronic voting machine. This machine is placed in the poll booth centre and...
Considering the development of mobile payment systems and feasibility and suitability of payment protocols we need to provide security requirements of users as well. In this paper we first introduce LMPP and MPCP protocols and show how these two protocols are unable to satisfy anonymity and unlinkability of merchant to issuer. Then we propose a lightweight mobile payment protocol that is based on...
With the growing popularity of mobile apps, the security issues of mobile apps become critical. Similar to traditional cyber security, mobile security includes authentication, data integrity, and data privacy. Seed-based authentication is a novel approach for mobile systems. The key idea is to extract seeds from files such as images and generate random numbers for authentication. However, in seed-based...
This paper aims at realization of the Automated Teller Machine network all around the globe using IPv6, thereby reducing the complexity and total number of transactions involved in the entire process of cash withdrawal. But the major challenge involved in connecting ATM network to public domain is the security. A Near-Field Communication (NFC) is proposed to be used where in the user, after inserting...
Mobile radio frequency identification (RFID) systems are being employed in many applications such as supply chain management. Since the communications between RFID-reader and server, RFID-tag and RFID-reader are all wireless, security and privacy attracts more attentions, reflected in the research on authentication protocols. But most of the existing authentications only care about the front end (reader...
Kerberos is a distributed authentication protocol which guarantees the mutual authentication between client and server over an insecure network. After the identification, all the subsequent communications are encrypted by session keys to ensure privacy and data integrity. In this paper, we have proposed a biometric authentication protocol based on Kerberos scheme. This protocol is not only resistant...
College associations play an important role in school culture. However, there are several disadvantages of current management of college associations, such as lax, labor-intensive, and time-consuming management. With the population of the mobile Internet, mobile phones become indispensable in daily life. In this paper, we attempt to explore mobile instant messaging to leverage management of college...
The paper presents a software system for newspaper distribution. The system contains a central server, an Android client application and a web application for data administration. Application data (customer database, distributor profiles, distributions, etc.) is managed by the system administrators using the web application. The application also generates statistics and provides opportunity to create...
In this letter, the channel-tap power is utilized as a radio-frequency fingerprint (RF) to completely identify primary user emulation attacks (PUEAs) over multipath Rayleigh fading channels. To accurately know identities of primary users (PUs) and PUEAs, the cross-layer intelligent learning ability of a mobile secondary user (SU) is exploited to establish detection databases by seamlessly combining...
Personal identification and verification are playing more and more important role in the society. Traditional authentication method such as password and smart card, often cannot meet today's security as they can be easily forgotten, lost or stolen. Biometric technology has appeared as a new solution to these problem. Among all the variable biometric technologies, automatic palmprint verification is...
In the Moslem countries Halal food is one of the concerns and consideration before having the food, Halal food is not only food or beverage but more than how to serve and preparation according to the Islamic law. Restaurants or premises to serve the food must follow Halal food regulation and procedure and certified by authority, thus Halal certification at the premises is requirement for the Moslem...
When disasters occurs, cellular network might be down and cannot serve subscribers anymore. On the other hand, many victims trapped in a wreckage might still have access to their mobile phone. An OpenBTS-based cellular network has been long before known as an ideal solution to rapidly deploy emergency GSM cellular network in situation after disaster. We propose to deploy a mobile OpenBTS along with...
Successful out-of-band authentication in popular languages such as PHP has proven to be problematic and in many ways unsafe as dynamically typed languages allow for more than one ways of doing things, and the standards set out are usually not followed. It is true that out-of-band authentication using SMS messaging enhances the security of simple passwords specified by users, however many times the...
Android "Health-DR." is innovative idea for ambulatory appliances. In rapid developing technology, we are providing "Health-DR." application for the insurance agent, dispensary, patients, physician, annals management (security) for annals. So principally, the ample of record are maintain in to the hospitals. The application just needs to be installed in the customer site with IT...
With the trend of mobile enterprise information systems, security has become the primary issue as it relates to business secret, decision, and process control. Hence, we carry out a fully customized framework to emphasize on security from trust authority of the cloud certificate authority server, and to guarantee security with the process of the software developments. The core object model, named...
At present time the unregistered SIM cards (here unregistered means the SIM cards which are registered with false information provided by dealer) are widely used for committing crimes in the perspective of Bangladesh. Due to the complexity of the present SIM card registration process, the subscribers are reluctant to register themselves. In this paper we propose a cloud based system model which demonstrates...
Two-step authentication, which uses SMS or voice calls, is becoming more practical for user authentication or for preventing phishing attack. However, conventional methods have vulnerabilities to man-in-the-middle or social-engineering attack or cellphone theft. As a general problem, it is difficult to prevent a legitimate user's denial. Therefore, we propose a secure user authentication method that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.