The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It was analyzed the most frequent security algorithms used for information security to mitigate the integrity, confidentiality and availability of the information. The objective is to have an approach on security algorithms and define a quantitative algorithm using flowchart techniques for a process of Ecuador civil registry database. The deductive method was used to analyze the information of the...
Attacks on authentication services are major security concerns. Password-based authentication systems can be compromised using known techniques, such as brute force and dictionary-based attacks. Biometric-based authentication systems are becoming the preferred choice to replace password-based authentication systems. Among several variations of biometrics (e.g., face, eye, fingerprint), iris-based...
Biometric authentication systems verify the identity of individuals based on what they are. As they are error prone, they can reject genuine individuals or accept impostors. Researchers of the field quantify the quality of their algorithm by benchmarking it on several databases. However, although the standard evaluation metrics state the performance of their system, they are unable to explain the...
SQL Injection is one of the most critical security vulnerability in web applications. Most web applications use SQL as web applications. SQL injection mainly affects these websites and web applications. An attacker can easily bypass a web applications authentication and authorization and get access to the contents they want by SQL injection. This unauthorised access helps the attacker to retrieve...
This paper presents an innovation in the implementation of RFID in terms of authentication and offline intelligent payment system in public transport, Bus Rapid Transit (BRT), for the academicians. The authentication is conducted using a contactless smart card as an e-ticket as well as an identity card. Contactless smart cards can be obtained through the registration process on the administrator to...
This paper presents an architecture to provide endto- end per-user services with support to client mobility, designed according to the SDN and NFV paradigms. Our service platform dynamically configures and launches service requests when the client connects to the network, which are used by a multidomain orchestration system to arrange the required network configuration and computational resources...
Nowadays, with the increasing use of biometric data, it is expected that systems work robustly and they can give successful results against difficult situations and forgery. In face recognition systems, variables such as direction of light, facial expression and reflection makes identification difficult. With biometric fusion, both safe and high performance results can be achieved. In this work, Eurocom...
Internet is popular for people at all ages. A computer is used to access the Internet but a user needs to authenticate himself to the system in order to gain access. The problem of a typical authentication technique is to memorize a password. Lots of junior high school students in Pakthongchaiprachaniramit School cannot remember their own password and this work is proposed to solve the problem by...
Authentication mechanisms available in existing cloud platforms are inadequate for and poorly-suited to modern cloud-based systems. To support this argument, we describe a variety of authentication mechanisms commonly used in the cloud, and we detail how these mechanisms are actually used in one significant open-source service deployed to a popular cloud platform. We further report on authentication...
B2B (business-to-business) systems often use service-oriented architecture (SOA) with decomposed business services. These services can interact and share data among each other. Service might use a cloud – hosted database, such as a non - relational encrypted key – value store. However, the cloud platform hosting the database can be untrusted. Data owner needs to be sure that each service can access...
A smart wearable electrocardiographic (ECG) processor is presented for secure ECG-based biometric authentication and cardiac monitoring, including arrhythmia and anomaly detection. Data-driven Lasso regression and low-precision techniques are developed to compress the neural networks by 24.4X. The prototype chip fabricated in 65 nm LP CMOS consumes 1.06 μW at 0.55 V for real-time ECG authentication...
Counterfeit integrated circuits (ICs) have posed a major security and safety threat on commercial and mission-critical systems. In this paper, we propose to develop a comprehensive counterfeit ICs detection and prevention strategy, consisting of an innovative multi-functional on-chip sensor and a related post-fabrication authentication methodology. We target at many counterfeit ICs including the recycled/remarked/out-of-spec...
This paper focuses on research device management mechanisms such as routers and switches, based on the NETCONF protocol, considered user authentication mechanisms using RADIUS-server and implementation of these mechanisms in currently being developed Eltex Network OS. Reflected the main features of NETCONF protocol — Network Configuration Protocol, produced theoretical and experimental comparison...
Applications offered as Software-as-a-Service should pursue a multi-tenant architecture in order to be profitable. Multi-tenancy helps to reduce the number of application instances by sharing resources amongst several tenants, thus saving operational costs, particularly in public cloud environments. While research mostly discusses how to design green-field software in a multi-tenant manner, this paper...
This paper analyses problems of database information security. The database described in this paper has critical information about an operating device, as it is a part of the device's lifecycle support system. Provision of information security is based on the current state laws of the Russian Federation. Here the authors provided the models for secure authorization, encryptions of data and a program...
SDN is a new network architecture for control and data forwarding logic separation, able to provide a high degree of openness and programmability, with many advantages not available by traditional networks. But there are still some problems unsolved, for example, it is easy to cause the controller to be attacked due to the lack of verifying the source of the packet, and the limited range of match...
Nowadays, access control to Web pages relay mostly on identification and authentication. After successful authentication, however, subsequent access may not necessarily be performed by the same user. Aimed at separating identity authentication and behavior authentication in open network environments, this paper proposes an access control method based on the analysis of user behavior in Web browsing...
Link State Advertisement (LSA) reflects the current status of all incident links of a router in an Autonomous System (AS). A fake LSA with false link status information will pollute the view of the network topology on routers. In this paper, we present two novel attacks that inject malicious Link State Advertisements (LSAs) to modify the routing tables: adjacency spoofing and single path injection...
Network control systems based on identities allow fine-grained access control for users. They require a network-wide session database containing information about active authenticated and authorized users. We propose an authentication and authorization (AA) module (AAM) as a controller application for software-defined networking to establish a network-wide session database and provide a prototypical...
In this paper, we describe a network defence strategy testbed, which could be utilized for testing the strategy decision logic against simulated attacks or real attackers. The testbed relies on a network of honeypots and the high level of logging and monitoring the honeypots provide. Its main advantage is that only the decision logic implementation is needed in order to test the strategy. The testbed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.