The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Criminal networks mostly shape themselves in order to maximize their gains but also hide their activities from prosecution. They also need of trust within network members and cliques. They also seek for immunity and protection from breaches and may not trust others, so they shape the network structure to this end. In this paper we presented a resilience measure for criminal networks which is tested...
The DNS security extensions (DNSSEC) is a new feature of DNS that provides an authentication mechanism that is now being deployed worldwide. However, we do not have enough knowledge about the deployment status of DNSSEC in the wild due to the difficulty of identifying DNSSEC validators (caching validating resolvers). In this paper, a simple and robust method is proposed that estimates DNSSEC validators...
In this paper, we proposed robust and operational cyber military strategy for cyberspace superiority in cyber warfare. We considered cyber forces manpower, cyber intelligence capability, and an organization of cyber forces for improving cyber military strategy. In cyber forces power field, we should cultivated personals that can perform network computer operations and hold cyber security technology...
Encryption algorithms could suffer fault injection attacks in order to obtain the secret key. In this paper, a specific protection for any round-based encryption algorithm is presented, analyzed and tested. It is providing a high degree of robustness together with a small penalty in the algorithm throughput when dealing with specific intentional attacks. Experimental results on advanced encryption...
With an increased focus on national security and public safety communications, the US Congress revisited its plan to reclaim television broadcaster frequencies to be reallocated and auctioned by the FCC and it specifically allocated a portion of that spectrum for use by public safety. The FCC was charged with the duty of auctioning this spectrum and licensing it to create a public safety network....
Many governments have delivered their services in ways that meet the desires of the citizens and businesses they serve, enabling them to interact securely in places and at times that are convenient for them. E-government is one of the most important achievements of the Internet. Successfully implementing e-government requires a level of trust on the part of all transaction parties. There are several...
The Fiat-Shamir paradigm for transforming identification schemes into signature schemes has been popular since its introduction because it yields efficient signature schemes, and has been receiving renewed interest of late as the main tool in deriving forward-secure signature schemes. In this paper, minimal (meaning necessary and sufficient) conditions on the identification scheme to ensure security...
Compliance management (CM) is the management process that an organization implements to ensure organizational compliance with relevant requirements and expectations. Compliance auditing (CA) is a child-process of CM where compliance rules and policies are individually checked against the organization to determine the level of compliance achieved by the organization. In this paper, we arrange organizational...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
In recent years, organizations have been shifting focus to their core business competencies, and reducing total cost of ownership (TCO) associated with training and management of their IT infrastructure. In the same motif, organizations are establishing security and survivability frameworks as an integral part of their business strategy so as to provide an acceptable quality-of-service for their clients...
We introduce a general model for physical sources or weak randomness. Loosely speaking, we view physical sources as devices which output strings according to probability distributions in which no single string is too probable. The main question addressed is whether it is possible to extract alrnost unbiased random bits from such "probability bounded" sources. We show that most or the functions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.