The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional authentication methods are vulnerable to different types of attacks. The authentication scheme like password or PIN-based have proven to be vulnerable to different forms of observation attacks such as, video-recording, key-logging or shoulder surfing attacks. In order to reduce these type of attacks, a number of solutions have been proposed. More used proposed system is the cognitive authentication...
Article describes the architecture design of user authentication system. The key features of architecture is resistance to changes in architectural and infrastructural scopes. That allows to control the functionality of the system and gives possibility to change it without special knowledge and the additional costs, to implement better support for devices from different manufactures. In addition,...
The earlier remote password authentication schemes required a service providing server to authenticate a legitimate user for remote login. However, the traditional schemes are not useful in multi-server architecture because of multiple user ids and passwords. In this paper, we present a remote password authentication scheme for multi-server architecture that can be robust and improved network security...
An architecture that differentiates security according to service-specific characteristics avoids an unnecessary drain on IT resources by protecting a variety of cloud computing services at just the right level.
Security plays a large role in e-commerce application system, the physical layer structure, anti-SQL injection, RBAC, password policy are important aspects of E-commerce application system security policy which will be analyzed in this paper.
User authentication procedures are a computer system's first line of defense against malicious attacks that could potentially jeopardize its availability and reliability. Computational complexity considerations may prevent system designers from implementing efficient authentication procedures. This paper presents a robust two level authentication procedure is presented that is highly efficient and...
We propose using Power Line Communication (PLC) as a second channel for data origin authentication, and we present a system architecture and protocol for doing so taking advantage of existing infrastructure for communicating over power lines. Our system connects a user's computer to a secure electric meter in his building via a secure Human Authorization Detector (HAD). The electric meter, which has...
This paper aims at the problem of software's abuse in the computer system, and puts forward the "Software Registration" strategy in the context of enterprise networks and the computer systems within. Based on this strategy we have designed a computing system that is fit for internal use in enterprise networks by taking control of the use of computer software. The paper analyzes the system's...
For the open architecture of application platform and security issue of attacks, a new trusted application platform architecture based on trusted platform module (TPM) is proposed, the new architecture can achieve self-recovery while the trusted bootstarp failed and provide the identity authentication below operation system level. Through integrality measurement of TPM, trusted chain pass, trusted...
During last years, service federation has been a hot topic for researchers all along the world. In that context, single sign on (SSO) access to services has risen as a major concern for this kind of environments and many proposals suited to several scenarios have been stated. We can think of eduroam an eduGAIN as two major examples of this, the former as a federated initiative to provide access to...
During the past few years, automatic computer examination systems have been widely used for computer-based tests. But these systems are based on the traditional question-answer examination style which is limited for the collaborative examination. The collaborative examination needs multiple examinees and can be parallel performed. The collaborative examination also should consider the context of the...
Clustered collaborative architecture brings serious security challenges. One of these collaborative solution is a remote desktop that provides a virtual graphical environment through a network displayed on a thin client. As several thin clients access to the same host, conflicts or non interference problems can raise. Although techniques exist for improving security of a host, few papers present how...
Peer-to-peer (P2P) file sharing networks attract much attention from legal and research communities. The success and popularity of P2P networks provides a new paradigm for sharing and distributing information. However, the widespread illegal distribution of the copyright protected works and anonymous malicious attacks to the network raise serious concerns for the future of P2P applications. Legal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.