The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In current digital world, more victims are affected by cybercrime. Cyber world are wide open and it is very easy to target to access data or financial information from any individual, public and private organizations etc., since, internet and web are open, it is very easy to steal data on the unsecured medium of channel. Therefore, protecting financial data required further layers of security counter...
Developing technology threaten to the information security and privacy. Today, for data transfer in a private and secure environment, the use of encryption methods or cryptographic systems are inevitable. In this study WHT (Walsh-Hadamard Transform) that is used, one of the transforms that used image processing techniques such as attribute extraction on image files, text analysis, filtering, compression...
With the advancement of wireless communication and popularity of internet, security of transmitted data has become a major area of concern and have attracted many researchers. To prevent unauthorized access, it is important to encrypt 1D either 2D (image) data before transmission over open wireless network. A5/1 ciphering algorithm is one of the highly secure encryption algorithm, widely used in GSM...
In the current technology world, data transmission of various multimedia like sensitive images, video, text is very important and security is major concern in the fields of medical, commercial and military fields. Security is very important, as illegal users may hack the sensitive data. Currently, many techniques are available for secure transmission of data through internet. Some examples of such...
Rapidly acceleration in the technological advances throughout the world leads to enormous increase in encrypted Internet traffic. Tremendous progressions and changes are taking place in months rather than in years. From mobility and video to cloud and network programmability, there is no end of vision. Majority of people still believe that computer securely sends the email to the intended recipient...
Now, security and authenticity of data is a big challenge. To solve this problem, we propose an innovative method to authenticate the digital documents. In this paper, we propose a new method, where the marks obtained by a candidate will also be encoded in QR Code TM in encrypted form, so that if an intruder tries to change the marks in the mark sheet then he can not do that in the QR Code TM, because...
The concept of transition from IPv4/IPv6 network is currently being extensively studied to gain high level compatibility for easy, independent deployment ofIPv6. The transition between IPv4 and IPv6 internet will be a very long process as they are completely incompatible two protocols. IPv6 offers various features including Larger addressing capacity and capabilities, QoS control, encryption and decryption,...
We introduce a non-interactive RSA time-lock puzzle scheme whose level of difficulty can be arbitrarily chosen by artificially enlarging the public exponent. Solving a puzzle for a message m means for Bob to encrypt m with Alice's public puzzle key by repeated modular squaring. The number of squarings to perform determines the puzzle complexity. This puzzle is non-parallelizable. Thus, the solution...
We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bit array generating a binary image ciphertext. The output is then `embedded' in a host image to hide the encrypted information. Embedding is undertaken either in the lowest 1-bit layer or multiple 1-bit layers. Decryption is...
It introduced virtual private network (VPN) technology and its classification in network security protection system. The advantages of VPN technology in establishing security protection system were analyzed. Four kinds of key technology of VPN including tunneling, encryption & decryption, key management and authentication were presented. Taking electric power data network and load management system...
We propose a human modeling framework based on public key infrastructure and illustrate it with the implemented software that can be used as a core part for different real life applications. It is possible to perform their collaborative interactive modifications with concurrent synchronous visualization at each client computer with any required safety level of detail. The platform provides a muscle...
This paper established a new security mechanism for online communications using mobile agents. E-health has been widely used as a communication system and information changes to deliver health services to the users through the Internet. However, the Internet imposes threats that will risk the information in transit. Therefore it is important to ensure that the communication is safe and the userpsilas...
Organizations are beginning to adopt identity-based encryption (IBE), a communications-protection process that promises to make public-key cryptography easier to use. Public-key cryptography uses paired keys for encrypting and decrypting messages, to protect electronic communications over public networks such as the Internet.
On Internet, securing email has always been an important issue. Various standards and products have been created. There are very rare Web services provide the encryption to emails for security purposes. Data compression in email is not broadly introduced, by generating code book like telegraphic code book, text message could compress up to 35% to 45%. By using programming techniques it is very easy...
In this paper a session key based encryption system has been proposed and termed as "Session Key Based Manipulated Iteration Encryption Technique (SKBMIET)". A Key is created from the input. Generating different randomized Matrices forms the Key. The value of the generated is manipulated with the individual ASCII values of the plain text. After completion of this process all the different...
Since data is a vital resource that must be transferred over the Internet, the security issue of this resource must be considered seriously. There are various methods have been proposed by researchers; some of them have been implemented, such as DES and AES. However, those methods have some limitations that allow the plaintext to be unsaved from any threats while it was transferring over the Internet...
This paper describes the implementation of mailer that is used to send the mail in the mailer that has encoded format. By using this encoding method the mail will be send very safe, the hackers can't read the mail. The mailer is used to send the encrypted mail directly to the mail box as it is. It can also send the effective html page, images and textual mails. instead of this, the composer will send...
In this paper, we introduce a secure mobile payment model suitable for macro transactions that compromise cost, simplicity, security, and performance of transaction, with minimum number of cryptography key usages, and less encryption/decryption operations compared to other models. This model can use symmetric and asymmetric cryptography without the need of trusted 3rd parties or even PKI complexity...
Feasibility study on implementing a strong cryptographic function for resource constrained devices such as embedded devices has been carry out over the past. These studies found that it is not efficient to run an extensive security solution to those devices. For that reason, we tense to provide a security offloading approach to minimize the computing resources involved but maximizing the security...
A Diffie-Hellman public-key cryptography based on chaotic attractors of neural networks is described in the paper. There is a one-way function between chaotic attractors and initial states in an overstoraged Hopfield neural network (OHNN). If the synaptic matrix of OHNN is changed, each attractor and its corresponding domain of initial state attraction is changed. Then, we regard the neural synaptic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.