Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The Controller Area Network (CAN) is a broadcast communications network invented by Robert Bosch GmbH in 1986. CAN is the standard communication network found in automobiles, industry equipment, and many space applications. To be used in these environments, CAN is designed for efficiency and reliability, rather than security.
Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wireline networks, the unique characteristics of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent resource constraints, and highly dynamic network...
The peer-to-peer network has been widely used to share large files anonymously. Because of its open nature, nodes can join and leave peer-to-peer networks freely. But there are few limited methods to ensure their trust. Malicious nodes can expose great security threats to peer-to-peer networks such as spreading unauthentic data and viruses. But handling all the malicious nodes in the same way causes...
In the area of formal analyzing of security protocols, more and more attention has been given to analyzing properties of fair exchange protocols such as non-repudiation and fairness. On the basis of analyzing the limitations of existing methods, this paper presents a new method to analyze fairness and non-repudiation, in which PLTL are used to describe non-repudiation and fairness, and the model-check...
Biometrics play an important role in modern access control systems to overcome the problems of forgotten, stolen or easily-guessed passwords. With the recent developments in cryptography, hashing and random number generation, biometrics and cryptography are combined in new generation cryptosystems. In this paper, it is aimed to produce a unique binary biometric identity code (bit string) by using...
Personal area networks (PANs) are gaining popularity. Authenticating the communication parties and securing the transmitted data have been recognized as an important but difficult problem. Since various devices are from different vendors and they may frequently join and leave a network, traditional key provision solutions can not tackle complicated and dynamic cases. In this paper, we proposed an...
The analysis of keystroke dynamics (KD) is a developing biometric technique for user authentication. In computer security, its use is limited to some constraints such as longer typing and practice sessions. In this paper, a practical user authentication system is proposed that combines a conventional login/password method and a said biometric technique. The conventional password authentication method...
Due to the well-developed technology, the radio frequency identification (RFID) is widely used in all areas. For some applications, the RFID system simply worked as a memory card without security mechanism. However, in many applications, the RFID systems need security mechanism for authentication. In scenario such as e-passport, the RFID systems even need mechanism to protect userpsilas privacy. In...
In 2006, Wong et al. proposed a dynamic user authentication scheme for WSNs that allows legitimate users to query and collect sensor readings from sensor nodes of the network. They presented analysis to show that their scheme is secure and efficient. Later, in 2007, Tseng et al. pointed out several weaknesses in Wong et al.??s scheme and proposed an improved scheme to overcome the weaknesses. However,...
Recently, Lee et al. proposed a remote authentication model of information appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network of information appliances to hackers. In this paper, we propose a new secure remote control model for information appliances (SRCMIA) to fix this error. Besides, our model can also achieve both message authentication and one-time secret...
In this paper, we propose a watermarking algorithm for digital image based on DCT and SVD. The algorithm can satisfy the transparence and robustness of the watermarking system very well. The experiment based on this algorithm demonstrates that the watermarking is robust to the common signal processing techniques including JEPG compressing,noise, low pass filter, median filter, contrast enhance.Experimental...
Most common computer authentication method is traditional 'User Name' and 'password'. There are numerous Biometric authentication methods also proposed. In this paper, we propose a novel and new alternative; Figure as a Password. In this scheme users will get complete freedom to select their Passwords. In this paper, we conduct an extensive survey of the existing graphical password schemes and propose...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.