The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
File encryption is an effective way for an enterprise to prevent its data from being lost. However, the data may still be deliberately or inadvertently leaked out by the insiders or customers. When the sensitive data are leaked, it often results in huge monetary damages and credit loss. In this paper, we propose a novel group file encryption/decryption method, named the Group File Encryption Method...
As sensor nodes are deployed in hostile or remote environment and unattended by human, they are prone to different kind of attacks. So adaptation of dynamic key is very important for secure key management, for encrypting messages for communication.
With cloud computing and storage services, data is not only stored in the cloud, but routinely shared among a large number of users in a group. In this paper, we propose an oriented group provable data possession in public cloud and shared among a large number. We utilize group key agreement key as the foundation of the homomorphic authenticator, which enable any member of the group can verify data...
In this paper we propose a remote password authentication scheme based on a circle. This scheme is simple and practically feasible in a multi-server environment. In this scheme, we use some simple tangent theorem like secant tangent theorem and a strong one way function to authenticate the user and the server. Furthermore, a legal user can freely choose and change his password using his smart card...
Most of subscribers use personal identification number (PIN) codes which combined with 6–8 numbers to protect their Subscriber Identity Module (SIM) cards from illegal accesses. To enhance security, many previous studies have employed keystroke dynamics to protect the PIN code, and the relative results exhibit that keystroke dynamics can indeed improve the security of a PIN code. However, the traditional...
User constrained devices such as smart cards are commonly used in human-protocol interaction. Modelling these devices as part of human-protocol interaction is still an open problem. Examining the interaction of these devices as part of security ceremonies offers greater insight. This paper highlights two such cases: modelling extra channels between humans and devices in the ceremony, and modelling...
One problem with most currently used transaction authentication methods is that they depend on the customer's computer for integrity of the information flow between customer and bank. This allows man-in-the-middle attacks to be conducted using malware for financial fraud. Some banks are implementing new authentication methods that allow customers to verify transactions received by a bank without depending...
For the past two decades, as the role of computer technology has expanded, computer security (secure processors, information encryption, network protection with biometrics) has also become increasingly important [1–21]. Many computer security schemes have been developed over this time period; however, none of these are foolproof yet. A username and pass-word combination is one of the most popular...
Cloud technologies are increasingly important for IT department for allowing them to concentrate on strategy as opposed to maintaining data centers; the biggest advantages of the cloud is the ability to share computing resources between multiple providers, especially hybrid clouds, in overcoming infrastructure limitations. User identity federation is considered as the second major risk in the cloud,...
In recent times, cyber-attacks and cyber warfare have threatened network infrastructures from across the globe. The world has reacted by increasing security measures through the use of stronger passwords, strict access control lists, and new authentication means; however, while these measures are designed to improve security and Information Assurance (IA), they may create accessibility challenges...
Recently, Cipresso et al proposed a novel method for generating textual passwords. The PsychoPass password can be created, memorized and recalled by thinking of an action sequence instead of a string of characters. Objective: The objective of this paper is to analyze how and when the PsychoPass passwords are resilient to brute force attacks and how they compare to randomly generated ones. Methods:...
Textual passwords were first identified as a weak point in information system's security by Morris and Thompson in 1979. They found that 86% of the passwords were weak: being too short, containing lowercase letters only, digits only or a combination of the two, being easily found in dictionaries. OBJECTIVE: Despite the importance of passwords as the first line of defense in most information systems,...
Recently, removable (external USB) mass storage devices are finding widespread utilization for transferring and backing up data. They even can be used as bootable devices. They have brought us great convenience, yet, simultaneously, they are very vulnerable to the extraction of private and confidential data from computer systems. Some access authentication schemes have been proposed for removable...
Data security has become a major subject in the cloud computing. Data integrity verification allows clients know whether the data storing in the cloud is secure or not. And data recovery also provides a reliable guarantee for the clients. However, the pre-processing for the files such as the works of hash, blocks' signature, and redundancy generation and data recovery causes a great challenge to the...
As the easiest and cheapest way of authenticating an end user, password based authentication methods have been consistently chosen by almost every new cloud service. Unfortunately, the explosive growth of cloud services and web applications has made it impossible for users to manage dozens of passwords for accessing different cloud services. The situation is even worse considering the potential application...
Batch recall is a practically important problem for most industry manufacturers. The batches of products which contain flawed parts need to be recalled by manufacturers in time to prevent further economic and health loss. Accurate batch recall could be a challenging issue as flawed parts may have already been integrated into a large number of products and distributed to customers. The recent development...
The external storage using a universal serial bus (USB) communication become the most popular use for storing digital data. Application such as evidence acquisition in digital forensic area needs external storage devices that are portable, high speed of data transfer, and easy to use for collecting digital data from suspect computers. Apart from these advantages of USB storage devices, they do not...
In current scenario, wired and wireless networks are widely used in educational organizations to meet the various needs of education institutions. New types of security threats and vulnerabilities are increasing day by day, making wired and wireless networks insecure and unreliable. In this case study paper, a survey of different types of security threats and security mechanisms in educational environment...
At present time the unregistered SIM cards (here unregistered means the SIM cards which are registered with false information provided by dealer) are widely used for committing crimes in the perspective of Bangladesh. Due to the complexity of the present SIM card registration process, the subscribers are reluctant to register themselves. In this paper we propose a cloud based system model which demonstrates...
Number of technologies has been developed in wireless communication and there is always a common issue in this field i.e. ‘Security’ due to its open medium of communication. Now, spectrum allocation is becoming major problem in wireless communication due to paucity of available spectrum. Cognitive radio is one of the rapidly increasing technologies in wireless communication. Cognitive radio promises...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.