The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Active Network is a new type network architecture which intermediate node could be programmed. However, its architecture feature bring many security problems which embarrassed the development of active network greatly. This context analyze and studies the characteristics of active network communication and the security problems exist in the process. At the same time, we put forward a safe communication...
Grid computing architecture was defined to be a complete physical layer. Data transfer in network must be in secure. In this study, encryption and decryption algorithms of a site authentication and its message are developed and applied in each grid node to ensure secure transmitted information. If the site information has been built in supervisor node then it can receive data sent from other grid...
This paper proposes an efficient, scalable and secure (ESS) data management system on HVEM datagrid to ensure the security for data access as well as to balance the load of data intensive processing using active disks. When authentication and authorization are managed by a storage manager or a server on datagrid, if an attacker succeeds in assaulting the entity, he can access to the data on the disks...
A novel and fast technique for cryptographic applications is designed and developed using the symmetric key algorithm "MAJE4" and the popular asymmetric key algorithm "RSA". The MAJE4 algorithm is used for encryption/decryption of files since it is much faster and occupies less memory than RSA. The RSA algorithm is used to solve the problem of key exchange as well as to accomplish...
Because the standard symmetric cryptographic algorithm DES cannot implement the operations of encryption and decryption for any length over 8 bytes, this paper defines DES-based data cryptographic functions, which can keep the byte length of input and output messages identical. These cryptographic functions have been successfully applied in secure transmission for the APDU of the smart card. An Implementation...
Secure Socket Layer (SSL) is a cryptographic protocol widely used to make a secure connection to a Web server. SSL uses three interdependent cryptographic functions to perform a secure connection. The first function is authentication. It is used to allow the client to identify the server and optionally allow the server to identify the client. The most common cryptographic algorithm used for this function...
We present two "asymmetric" probabilistic key predistribution schemes to cater for mutual authentication and broadcast authentication respectively. The schemes however employ only symmetric cryptographic primitives - the asymmetry is due to the use of different secrets for encryption/authentication and decryption/verification, which are however related through a one-way function. Both schemes...
Once an application steps out of the bounds of a single-computer box, its external communication is immediately exposed to a multitude of outside observers with various intentions, good or bad. In order to protect sensitive data while these are en route, applications invoke different methods. In today's world, most of the means of secure data and code storage and distribution rely on using cryptographic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.