The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In traditional online examination environments, physical interaction is often replaced with authentication mechanisms. The absence of face-to-face interaction increases the number of authentication challenges. The authors developed and implemented a Profile Based Authentication Framework (PBAF) with the aim to integrate learning and examination processes for secure online examinations. The PBAF approach...
The aim of this research is to examine whether or not an attacker could guess hand drawn images chosen as graphical password by others, based on knowledge of some cultural information like where they are come from or their religion or even their hopes and aims. Also, the aim was therefore to ascertain at what level the cross-cultural influences might affect our choice and use of drawn images as password...
The forthcoming internet of things—an intelligent collaboration of resource-limited devices such as wireless sensor nodes that are embedded in the daily lives of users—poses new challenges to security and end-user privacy. One of the most challenging problems is the thwarting of replica attacks. Once a sensor node is physically captured, it can be reprogrammed and replicated into a large number of...
Mobile phones are gradually replacing PCs and even laptops. With so many platforms and apps available, consumers are often confused and managing these devices security requires an extra knowledge. This paper presents the findings of a survey into the opinions of users regarding mobile security, their level of awareness towards current threats, and the need for more security. The paper concludes with...
For TCP/IP Agreement has certain security bugs, the hacker catches the opportunity to attack the Network. On the basis of the analysis of the TCP/IP Agreement's vulnerability, the article has further analyzed the vulnerability of the Transport Layer Agreement, and discussed the security and the promotion method of TCP/IP Agreement's transport layer.
This paper aims at studying two main solutions to digital identity management, Cardspace from Microsoft and Liberty from Liberty Alliance Project, and the problem of interoperability between them in a heterogeneous environment. It also proposes some recommendations for implementing the interoperability at some given levels.
In this paper we describe an extension of the Shibboleth (Internet2 federated identity management middleware) model that allows different Service Providers (SP) to manage the shared user profiles. Such profiles may be shared among multiple instances of the same SPs (e.g. multiple digital libraries) or by several different SPs (e.g. a digital library and an educational portal). The XML-encoded profiles...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.