The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Every day, millions of people cross international borders by air or sea. A nation's ability to identify and neutralize threats posed by travelers depends heavily on an accurate and proactive methodology for establishing traveler identity. Lacking both a common reference model and a globally unique identification scheme, the “system” must confront the problem of multiple distinct or imprecise references...
In a society oriented signature scheme, a signature is produced by several co-signers simultaneously in a group. Saeednia proposed an identity-based society oriented signature scheme. However, there are some security weaknesses in the scheme. Zhu and Wang et al. showed two different attacks against the identity-based society oriented signature scheme respectively. In this paper, we proposed an improved...
Metro, as a most effective measure, play an important role to alleviate the traffic pressure, also is one of most important characteristics of the identity of city. According to the research result of European industrial association, from 2005 to 2015, globe metro market value increases 2.7% every year, especially focus on developing countries, facing this complexity, this paper tries through the...
Numerous simultaneous paths open in front of the cybernaut, whose person is reflected in the various windows opened on the screen like many fragments of mirror. Yet, the fragmentarity of the online persona does not necessarily imply a disintegration of the self. This paper conducts a philosophical critique of the conditions under which cyberworlds can constitute a psychosocial moratorium virtually...
In this paper, we propose a taxonomy of privacy-related information-hiding/disclosure properties in terms of the modal logic of knowledge for multi-agent systems. The properties considered here are anonymity, privacy, onymity, and identity. Intuitively, anonymity means the property of hiding who performed a certain specific action, privacy hiding what was performed by a certain specific agent, onymity...
Identifiers are an essential component of online communication. My research focuses on the ways that social, technical and policy factors affect people's behavior with online identifiers. For example, my research demonstrates that people separate both business and professional roles by communicating with separate identifiers. People may have different identifiers for technical reasons, such as difficulties...
Password authentication is one of the simplest and the most convenient authentication mechanisms over insecure networks. One-time password authentication which uses dynamic password helps to enhance the security of password. In this paper, we suggest a new one-time password scheme using the smart card based on the bilinear pairings. By generating temporary identity, our scheme can provide anonymity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.