The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this world of e-technology, two users/systems requires to authenticate each other before exchanging the information. For this, there are numerous schemes proposed and analyzed for authentication. Indeed, in 2013, Chang et al.'s proposed an efficient untraceable dynamic identity system based on remote user authentication and claimed that the scheme is secure against various attack. In opposition,...
This paper highlights different security threats and vulnerabilities that is being challenged in smart-grid utilizing Distributed Network Protocol (DNP3) as a real time communication protocol. Experimentally, we will demonstrate two scenarios of attacks, unsolicited message attack and data set injection. The experiments were run on a computer virtual environment and then simulated in DETER testbed...
Public computer lab is very common in college and university. The main cost for maintenance lab is the power cost. In our university, the public computer lab consume more than 40kWh per day. The earlier study found that most cost comes from a major part: Some users don't shut down the computer after their usage. In this study, we use a low-power single-board computer (Raspberry Pi 2) for interactive...
This paper aims at presenting a possible solution for solving problems that may occur during the admission process in higher education system related to the high school diplomas submitted by candidates. Without questioning the good faith of candidates, there are situations that can raise suspicions about the authenticity of the diplomas. In this regard, it would be useful to have a portal through...
This paper studies the current status and advance of study of password cracking. First, we give a classification for password cracking from different dimensions. We studies brute-force cracking, dictionary cracking and rainbow table cracking. We found some new techniques such as brute-force cracking based on probability method, Markov models and data mining. High performance computing in password...
A Cellular Automaton is one of the most engrossing fields of studies. At the present digital world where almost every communication is being done via internet, requirement of security and privacy of information is must. For securing big or small data over internet, cryptographic techniques are essential. Usage of cellular automata characteristics in the field of cryptography is still not much explored...
This paper presents the results of an experimental study on the incorporation of four hap tic features in a hapticenabled authentication procedure, including stiffness, static friction, magnetic, and pop-through. Security authentication systems are important tools for protecting sensitive information and for restricting access to secure locations in society. Despite their crucial roles, these systems...
Security has a significant influence in network management. One of the most common way to secure information in the computer from malicious use is IDS Intrusion detection system(IDS) is most prominent to secure a computer and network against intrusion. IDSs primarily intended to preserve the availability, confidentiality and Integrity(CAI)of network and computer. IDS can be broadly classified in two...
CAPTCHAs, also known as reverse Turing tests are real-time assessments that are commonly used by programs to tell humans and machines apart. This can be achieved by assigning and assessing or evaluating hard AI problems such that these problems could only be solved easily by human but not by machines. A new security approach based on hard AI problems and Captcha technology is known as Captcha as gRaphical...
Text-based password is widely considered as the most ubiquitous authentication scheme in computer systems nowadays. However, text-based password are vulnerable to some attacks such as brute-fore attack and dictionary-based attack. Consequently, a large number of research has focused on enhancing the security strength of text-based password. Persuasive Text Passwords (PTP) is a technique to improve...
After a user logs into web server using a public personal computer or a mobile device such as mobile phone, the leakage of his personal information may occur because he often forgets to log out from web server. To prevent the leakage of the personal information instantaneously, we propose a new login status control method based on the connectivity of web servers and a single mobile application. The...
The online banking environment has grown tremendously over the past several years and will continue to grow as financial institutions continue to strive to allow customers to complete money transfers, pay bills, and access critical information online. During this same time, online banking has been plagued by Internet criminals and fraudsters attempting to steal customer information. Phishing, pharming,...
Along with the advancement in wireless communication and vehicle technology, while traveling, exchange of information, has become the most promising research field. Security is central to every major challenge, the mobility model faces nowadays. Proving the identity of one vehicle driver to another during communication, along with message sharing is the main issue to cope with. The main goal of this...
We present a quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. With coherent states, the mean photon number can be as larger as 10.
The websites of the modern Web integrate content from multiple parties to provide an enriched user experience. The so-called single sign-on forms part of this integration whereby a relying website enables a user to use her credentials on a third-party provider (such as Google or Facebook) to authenticate with itself and, if desired, authorize itself to use her resources on the provider. The user benefits...
There are various issues on current wireless network technology. MITM (Man-In-The-Middle) attack is generally done by spoofing between network access point and clients. MITM attacked is hard to be aware by the client. In this paper, we propose an algorithm, SALT-HASH, to detect MITM attack without necessity of certifications.
CAPTCHA, especially Text-based CAPTCHA, is the most widely used for security over the online environment in the present. That was used for identification automatic program computer and real human users. This technology was introduced by IBM that is a very high-end company in a very high-end country when comparing with countries in this study. This research was performed using a questionnaire to samples...
At CTU FTS we are currently developing BioTest, an authentication system for testing students using state-of-the-art information technology and unambiguous Biometric authentication for each user. We use this system for identification during exams and testing. The BioTest software operates on the basis of a student's face recognition comparing the pattern with data on the student's ID card, while informing...
Biometric-based authentication is a growing trend. While this trend is enabled by the introduction of supporting technology, the use of biometrics introduces new privacy and ethical concerns about the direction of authentication. This paper explores willingness of users to share biometric information and therefore take advantage of these technological advances. Specifically, it examines, by means...
As mobiles become a ubiquitous, they are used more and more for operations that may involve sensitive data or huge amounts of money. The mobile is also increasingly being used as the tool of preference for browsing and using the Internet. Hence, new security measures must be developed to support increased functionality of these devices, to protect users in the case of any mishap. Authentication using...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.