The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Authenticating watermarking is nothing but inserting a hidden object in order to detect deceitful alteration by hackers. The object may be in terms of a secret key or password etc. There are quite few numbers of authentication methods are available for videos. Resent developers in digital video and internet technology helps the common user to easily produce illegal copies of videos. In order to solve...
Continuous Authentication by analysing the user's behaviour profile on the computer input devices is challenging due to limited information, variability of data and the sparse nature of the information. As a result, most of the previous research was done as a periodic authentication, where the analysis was made based on a fixed number of actions or fixed time period. Also, the experimental data was...
Online signature recognition is one of the important behavioral biometric trait. This signature has information of x, y, z variations, pressure, azimuth of pen tip, altitude of pen tip. This makes online handwritten signature based biometric system more accurate than the static ones. In this paper new set of features are proposed for online or dynamic signature recognition. Geometric centers, Grid...
Security and privacy are the two major concerns in VANETs. Due to highly dynamic environment in VANETs computation time for authentication is more. At the same time most of the privacy preserving schemes is prone to Sybil attacks. In this paper we propose a lightweight authentication scheme between vehicle to RSU, vehicle to vehicles and to build a secure communication system. In this method we make...
In this paper, we propose a remote password authentication scheme based on 3-D geometry with biometric value of a user. It is simple and practically useful and also a legal user can freely choose and change his password using smart card that contains some information. The security of the system depends on the points on the diagonal of a cuboid in 3D environment. Using biometric value makes the points...
In traditional symmetric authentication schemes for smart card, the smart card sends its card number in plaintext to verify the genuineness of the authentication server (AS), resulting in the leakage of some sensitive information and being attacked. Therefore, in this paper, to prevent the leakage of card number we propose a novel symmetric authentication scheme in which the card number is powered...
Anonymizing network gives anonymous access to its users by hiding their IP address. Tor is such an anonymizing network which channels internet traffic through worldwide network having number of relays to hide user's usage, its location from anyone performing network traffic analysis. But few bad users misuse this anonymity and under the cover of anonymous access, they misbehave to defame well known...
Network providers are the one which allows all type of emails for communication purpose. While transferring the messages some malicious emails are received by the users this causes many problems either at the server side or at the user side. This type of emails may contain unsolicited content, or it could be due to the message being crafted. Persistent threat features, such as threat actor locale...
Message authentication codes (MACs) are classically used for preventing unauthorized and corrupted messages from being forwarded in a network. However, inherent energy limitations of wireless sensor networks (WSNs) make the application of most of the state-of-the art MACs unaffordable due to their large computation overhead. Therefore in this paper, in order to cope with this challenging concern,...
This paper analyses the effectiveness of random passwords used in South Indian languages in terms of their entropy value with an objective of recommending passwords with mandatory minimum length to enhance the security aspects in relation to their predictability.
Modern enterprise computer networks rely on centrally managed authentication schemes that allow users to easily communicate access credentials to many computer systems and applications. The authentication events typically consist of a user connecting to a computer with an authorized credential. These credentials are often cached on the application servers which creates a risk that they may be stolen...
The electrical power grid forms the function foundation of our modern societies, but in the near future our grids will reach a limit due to increased demand and aging infrastructures. As a result nations worldwide have started to convert their power grids into modern, dynamic grids with improved communications and control systems. The Smart Grid will thus be better able to incorporate new forms of...
Bank websites are secure websites considered high risk, so security is a prime concern. Authentication is extremely important because it serves as the entry point for customers to access their personal and sensitive information. To be considered effective and desirable, a banking website should provide its users with secure and usable authentication mechanisms. Otherwise, the authentication process...
Previous studies on keystroke dynamics confirmed that the use of biometric technologies provides a significantly high level of reliability especially in situations where security is paramount. Most of these studies use genetic algorithms and k-nearest neighbor as their model of computation. In this paper, we explore an algorithmic solution based on an alternative model patterned after the process...
Graphical passwords have been proposed as an alternative to textual passwords, due to its complexity that users are having in remembering their password combination. Graphical password was introduced by Blonder in 1996, which was easier to remember because of its graphical content. Therefore usability and memo ability are improved. In this paper, we propose and develop a new graphical password called...
CAPTCHA is an acronym of the Completely Automated Public Turing test to tell Computers and Humans Apart. CAPTCHA is a technique of testing for ensures that only those people just passing the test and not the system computer generated (bots). The development of CAPTCHA system is to providing creative and validation tests can be easily solved by humans and difficult for bots. There are four types of...
File encryption is an effective way for an enterprise to prevent its data from being lost. However, the data may still be deliberately or inadvertently leaked out by the insiders or customers. When the sensitive data are leaked, it often results in huge monetary damages and credit loss. In this paper, we propose a novel group file encryption/decryption method, named the Group File Encryption Method...
As sensor nodes are deployed in hostile or remote environment and unattended by human, they are prone to different kind of attacks. So adaptation of dynamic key is very important for secure key management, for encrypting messages for communication.
With cloud computing and storage services, data is not only stored in the cloud, but routinely shared among a large number of users in a group. In this paper, we propose an oriented group provable data possession in public cloud and shared among a large number. We utilize group key agreement key as the foundation of the homomorphic authenticator, which enable any member of the group can verify data...
In this paper we propose a remote password authentication scheme based on a circle. This scheme is simple and practically feasible in a multi-server environment. In this scheme, we use some simple tangent theorem like secant tangent theorem and a strong one way function to authenticate the user and the server. Furthermore, a legal user can freely choose and change his password using his smart card...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.