The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing is boon in technology field which provide on-demand services in IT enterprises. With storage of data on cloud the challenge of its security and authentication threats occurring. Authentication in cloud computing is a major concerned. The main objective of these technique is to authenticate at client side, server side, or as third party using different method to keep the data in secure...
The objective of this paper is to understand cryptography & security implementation in industries, under network computing environment, it may be a manufacturing, Service, Media, Finance or any other industries to keep their Network computing environment safe & secure so that the relevant information, like finance data, management data Organizational Data, Business data, strategical data can...
A Cellular Automaton is one of the most engrossing fields of studies. At the present digital world where almost every communication is being done via internet, requirement of security and privacy of information is must. For securing big or small data over internet, cryptographic techniques are essential. Usage of cellular automata characteristics in the field of cryptography is still not much explored...
Mobile Computing devices are increasing enormously in all fields of communication, which aims to focus on secure transfer of information. In order to provide authentication, message integrity and secure message transfer, developers need to access the cryptographic packages. The objective of this paper is to analyze and compare various algorithms discussed in Bouncy Castle Toolkit. Analysis was performed...
We present a fully integrated small-size HF-band passive RF identification (RFID) tag chip with authentication and security functions. The design of the RF transceiver and digital control of the tag IC is based on the International Organization for Standardization-14443 type-B protocol. The design of the key analog part of the tag IC is presented, which includes a robust demodulator for 10% amplitude...
This paper presents a FPGA (Field Programmable Gate Array) based secured speech signal communication system. The system consists of compression, encryption and water- marking. Watermark provides authentication and ownership verification. Encryption is used for security of watermark and voice signal. As random numbers are used as a key for the encryption process, the signal is secured for both wired...
The program data is encrypted at the time the data is introduced into the system. Program data stays encrypted until sent to MC to be decoded and display on TV. The encryption keys for the program data are never transferred out side of the data center. Instead, the “seed keys” are sent out. A secret algorithm is used to convert a seed key to a real key for decryption.
We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bit array generating a binary image ciphertext. The output is then `embedded' in a host image to hide the encrypted information. Embedding is undertaken either in the lowest 1-bit layer or multiple 1-bit layers. Decryption is...
It introduced virtual private network (VPN) technology and its classification in network security protection system. The advantages of VPN technology in establishing security protection system were analyzed. Four kinds of key technology of VPN including tunneling, encryption & decryption, key management and authentication were presented. Taking electric power data network and load management system...
The purpose of this article is to discuss an authentication method for peer to peer (P2P)-based streaming media. Methods of encryption of streaming media data and digital signatures were used to improve the safety of the media. The digital certificate publishing service and management services of live streaming media authentication information are expanded in the live stream system based on P2P networks...
Currently, it is noticed that users tend to choose shorter password as their authentication which can be easily attacked. Biometric technologies such as fingerprint scanning, voice authentication, face recognition, signature, hand geometry and iris recognition is now playing an important role especially in application related to security issue. In this work, we present an approach to generate a unique...
This article studies copyright protection system, and generalize system framework, Firstly, it introduces the technological base of digital copyright protection systems, outlined several digital content encrypting algorithms and one-way hash function; Secondly, it introduces system design, security requirements and working principle. Finally, it introduces digital copyright protection system framework,...
Due to rapid advance of the RFID systems, there is sufficient computing power to implement the encryption and decryption required for the authentication during transactions nowadays. In addition, RFID tags have enough capacity to store the corresponding information. Therefore, RFID enabled credit card can be used to improve the potential security issues occurred while using the traditional credit...
As one of the most popular mobile communication technologies, short message service (SMS) is faced with various security threats. Thus, the fields of high confidentiality (e.g., mobile E-commerce) require a higher level of security protection on SMS. Secure communication in incredible mobile network has very important significance. This paper presents a high security framework for SMS. Through authentication,...
Grid computing architecture was defined to be a complete physical layer. Data transfer in network must be in secure. In this study, encryption and decryption algorithms of a site authentication and its message are developed and applied in each grid node to ensure secure transmitted information. If the site information has been built in supervisor node then it can receive data sent from other grid...
Modern wireless communication system based on wireless sensor network is strictly depends on medium access mechanism to improve its performance. CSMA is modifying here in its CSMA/CA format and trying to enhancing its performance same as CSMA/CD has for wired network. The aim of the paper is to inform how optimization of CSMA based sensor network is possible and how we can deploy it for monitoring...
There are many solutions and standards about digital rights management (DRM) now. Almost all the solutions used cryptography and rights processing technologies to protect contents. Only legal users can decrypt and enjoy contents under the control of rights information, illegal users are prohibited. Rights processing technologies include rights expression languages (REL), binary encoding method, virtual...
A trusted platform module (TPM) contains a unique identity and provides a range of security functions. This paper outlines a client-server system utilizing a TPM-enabled computer to hinder forensic examination. The system allows for data confidentiality, plausible deniability, and hiding of traces that incriminating data was present on the client. The server will attest the client before allowing...
In order to improve the data security over network and provide more effective data protection product, this paper introduces a network data protection system based on combined symmetric key. The system takes into account four main aspects in data protection, including identity authentication, encryption transmission, access controls and encryption storage. The solution combines four aspects into a...
The focus of this paper is on access security aspects of 3G-WLAN interworking. Firstly, the authentication entities which do not rely on the concrete heterogeneous network are abstracted by analyzing 3G-WLAN multi-kind heterogeneous network model. And then a common authentication model is established and a novel access authentication and key agreement scheme combined elliptic curve cryptographic techniques...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.