The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Kerberos is a widely-adopted network authentication protocol, which provides secure authentication service based on the reliable third-party. By exploiting a shared key, Kerberos ensures the confidentiality and integrity for a session. Kerberos, an authentication protocol based on symmetric cryptography system, has some inherent security flaws, such as undeniability, difficulty in key exchange, inability...
Now-a-days, surveillance cameras have been widely deployed in various security applications. In many surveillance applications, the background changes very slowly and the foreground objects occupy only a relatively small portion of a video frame. In these type of applications, an efficient solution for transmissions over bandwidth-limited networks is to send only the foreground objects for every frame...
As an RFID application, e-ticket system is evolving as a ubiquitous infrastructure, commonly used for access control to some services like entrance to public transportations or some sports or cultural events. It presents lots of advantages, but brings numerous open issues that need to be addressed. Two open issues we mostly care about are security and cost issues. We propose an RFID security protocol...
In a user hierarchy, a user belongs to higher-privileged class will have access right to message owned by user in a lower-privileged class; while the opposite in not allowed. Many schemes based on cryptography have been proposed to solve this problem. However, previous schemes need large values associated with each security class. Considering the solution of dynamic access problem in a hierarchy,...
In the access control of a file system, the Chinese remainder theorem (CRT) is a method used to establish the key-lock-pair mechanism, However, the key computed using CRT takes much more time to add up a new file. In order to improve upon this, we show that the key-lock- pair mechanism based on the division algorithm can be extended very efficiently when a file is added to the file system. Also, it...
Access control is a fundamental concern in any system that manages resource. In particular, the dynamical distributed access control problem is very difficult and does not have easy solutions. In this paper, we provide solutions by limiting the problem's domain and propose a simple, yet efficient dynamic hierarchical access control schemes: a Chinese Remainder Theorem based hierarchical access scheme...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.