Security
Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.
-
Mobilizing Windows Apps
The demand for access to business-critical applications from personal devices has created a huge problem for IT. Especially when extending application access to mobile devices must include provisions for adhering to corporate information security guidelines and ensuring compatibility between legacy and new apps. Read this white paper to learn best...
Provided By Citrix
-
Free Application: Webroot System Analyzer
Fast, accurate diagnosis equals rapid, cost-effective remediation. Webroot System Analyzer looks inside a problem system and gives you a quick assessment plus a detailed report on all aspects of hardware, OS, and installed applications.
- Simply click web link and run application - no install or uninstall required
- Summary Analysis...
Provided By Webroot Software
-
Remote Users Expose Companies to Cybercrime
As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate...
Provided By Webroot Software
-
Software License Audit: Breeze it and Beat it with Dell KACE!
For IT professionals, software license optimization and compliance have been an ongoing dilemma – purchase too many licenses and money is wasted on unused seats or buy too few and risk audits, legal action and fines. Without a comprehensive and straightforward way to track purchased licenses against actual software usage,...
Provided By Dell Kace
-
Sharing the Wealth, and the Burdens, of Threat Intelligence: Why Security Experts Must Unite Against Cyberattacks, and What's Stopping Them From Collaborating More Effectively
As criminals develop more sophisticated attack tactics, the good guys are struggling to keep up due to the lack of organized large-scale automated information sharing. However, the tide is changing. Major players in both the public and private sectors have adjusted their attitudes and are now diligently working to usher...
Provided By Internet Identity
-
A Secure Protocol for Efficient SMS Transmission and Management
Recently, the usage of mobile phones around the world is growing more and more. Short Message Service (SMS) is one of the most important applications due to its easy way to send and receive messages from users to users. There have been many transmission protocols aiming to make sure secure...
Provided By University of Würzburg
-
Design and Implementation of Digital Signatures
Digital Signature schemes are commonly used as primitives in cryptographic protocols that provide other services including entity authentication, authenticated key transport, and authenticated key agreement. A VLSI implementation of the digital signature scheme is proposed in this paper, for efficient usage in any cryptographic protocol. This architecture is based on...
Provided By Institute of Electrical and Electronics Engineers
-
SilentSense: Silent User Identification Via Dynamics of Touch and Movement Behavioral Biometrics
In this paper, the authors present SilentSense, a framework to authenticate users silently and transparently by exploiting dynamics mined from the user touch behavior biometrics and the micro-movement of the device caused by user's screen-touch actions. They build a \"Touch-based biometrics\" model of the owner by extracting some principle features,...
Provided By Tsihai
-
Tactical Flex, Inc. Risk Management Solutions Brief: Network Security Audits and Vulnerability Analyses
Every organization, regardless of specific industry, is facing similar and ever-increasing network and inter-network related security threats. Cyber attacks are making headlines every day and have evolved into frequent and costly incidents with a significant number of businesses becoming victim of at least one data breach in the past year....
Provided By Tactical Electronic Coaching Solutions
-
2013 Gartner Magic Quadrant Report for Sales Force Automation
New Gartner research positions salesforce.com in the Leaders Quadrant for Sales Force Automation. Download the 2013 Gartner Magic Quadrant Report and find out what Gartner analysts have to say about Salesforce.
Provided By Salesforce.com
-
A Survey of XML-based Security Standards for Handling Security Requirements of Grid and Cloud
The purpose of this paper is to present a survey of XML-based security standards that can be used for handling security requirements of distributed computing systems like Grid and Cloud. Distributed systems are expanding and their growth is apparent from the advancements in the field of distributed computing technologies like...
Provided By Panis Angelicus
-
5 Steps to Protect your Business from being a Cybercrime Statistic (Large Infographic)
Did you know that last year as many as 75% of recent data breaches targeted small and medium sized businesses? Small businesses are now big targets for worldwide cybercrime. You need a comprehensive yet easy-to-manage security strategy that can protect your business while you focus on growing it. Download this...
Provided By McAfee
-
McAfee Cloud-Based Security for SMBs
Cybercriminals are targeting growing businesses like yours. They’re zeroing in, believing that your business is an easier target because you can’t afford a sophisticated security framework. However, there’s an answer to this dilemma-- cloud-based solutions that deliver the most effective, up-to-date security that are both scalable and...
Provided By McAfee
-
How to Protect your business from Hackers
Gone are the days when hackers were mostly harmless recreational programmers. The malicious intent of today’s cyber criminals is only exceeded by their zeal to profit from their electronic crimes. In this Solution Brief, McAfee discusses why small and mid-sized businesses are especially vulnerable due to lower security defences and...
Provided By McAfee
-
Verizon Data Breach Investigations Report - 2013
Will your organization, or one you work with, suffer a security breach this year? Nobody’s immune, no target is too small, or too large. The methods used by hackers to gain access to data are numerous, wide-reaching and ever-growing. This isn’t a threat you can afford to ignore. This executive...
Provided By McAfee
-
SMB is the New Cybercrime Target
Did you know that as many as 45% of Australian SMBs experienced a targeted electronic attack in the past 12 months? Small businesses are now big targets for worldwide cybercrime. You need a comprehensive yet easy-to-manage security strategy that can protect your business while you focus on growing it.
Provided By McAfee
-
Modernizing Security for the Small and Mid-Sized Business - Recommendations for 2013
As small and mid-sized businesses (SMBs) take advantage of the compelling benefits of the transformations in their IT computing infrastructure - and struggle at times with the additional complexities that come along with it - they should also re-think how they deal with the corresponding vulnerabilities, threats and risks. Read...
Provided By McAfee
-
Combating Small Business Security Threats: How SMBs Can Fight Cybercrime
When hackers breach the defences of huge organizations like Amazon, Apple, or Citibank, it makes the news. When the same cybercrime exploits hit small and medium businesses (SMBs), it rarely garners a mention, but that that doesn't mean small businesses don't get hacked, or that the impact on SMBs is...
Provided By McAfee
-
A Quantitative Evaluation of Privilege Separation in Web Browser Designs
Privilege separation is a fundamental security concept that has been used in designing many secure systems. A number of recent works propose redesigning web browsers with greater privilege separation for better security. However, privilege-separated designs require a fine balance between security benefits and other competing concerns, such as performance. In...
Provided By National University of Singapore
-
Webinar: Advanced Malware And APT Attacks
Watch this webinar to learn: * What are the traits of Advanced Persistent Threats (APT)? * What are the infection vectors? * What are the advanced techniques? * Who are the threat actors?
Provided By FireEye
-
Webinar: How Client-side Attacks Evade Traditional Security Controls
Hosted by Ben Wilson, Senior Systems Engineer, CISSP, GXPN Bypassing traditional security controls is becoming a commodity. Hear more and watch a demo about how this happens, and what you can do to protect your network.
Provided By FireEye
-
Trust Coercion in the Name of Usable Public Key Infrastructure
The authors are currently witnessing an alarmingly increasing array of attacks on secure infrastructures used for industrial and commercial purposes. The success of these attacks has relied heavily on an innovative stratagem. This stratagem makes use of digital certificates to devise malicious code or servers as trustworthy, ultimately deceiving end...
Provided By University of Thai Chamber of Commerce
-
Tech Brief: SharePoint Social 101: Using and Managing Social in SharePoint 2013
Chris McNulty, Dell CTO and Microsoft SharePoint MVP, explains in this white paper how to answer three basic questions about SharePoint social:
- What does SharePoint social mean in a world where all we know of "social" is Facebook and Twitter?
- How will SharePoint social drive adoption and encourage our...
Provided By Dell Software
-
TECH Brief on Proven Techniques to Speed SharePoint Adoption
IT managers are keenly aware of the investment their organizations have made in SharePoint and the many advantages it offers, including improvements in content collaboration, access to business intelligence, data security, compliance and auditing. But SharePoint adoption is lagging because users simply don’t care about all of these advantages. In...
Provided By Dell Software
-
Best Practices for Migrating to SharePoint 2013
A SharePoint migration can be a seriously risky task - one that can keep any IT professional up at night. Understanding the best practices for a SharePoint migration will help reduce your stress and ensure success.
In this new white paper, SharePoint experts explore best practices for migrating to SharePoint...Provided By Dell Software
-
WEBCAST: Choosing the Right Tools for SharePoint 2013 Management
Organisations are finding compelling reasons to adopt or upgrade to SharePoint 2013. The platform includes a variety of new and enhanced functionality for end users, but many organisations are still unsure how to manage the new platform. In this webcast, we'll explore several tools that make SharePoint 2013 management easier...
Provided By Dell Software
-
WHITEPAPER: Choosing the Right Tools for SharePoint 2013 Management
This tech brief explores the native options for managing SharePoint 2013 and explains how Dell's SharePoint management solutions overcome the limitations of native tools, with a focus on reporting, security, storage, backup and recovery, and user adoption.
Provided By Dell Software
-
Distinguishing Legitimate and Fake/Crude Antivirus Software
Fake Anti-Virus (AV) software, a kind of malware, pretends to be a legitimate AV product and frightens computer users by showing fake security alerts, as if their computers were infected with malware. In addition, fake AV urges users to purchase a \"Commercial\" version of the fake AV. In this paper,...
Provided By Keio University
-
Robustness of Security-Oriented Binary Codes Under Non-Uniform Distribution of Codewords
Robust and partially robust codes are used in cryptographic devices for detecting active side channel attacks on the hardware. The codes are usually designed for uniformly distributed code-words. In practice, however, there are code-words that are much more likely to appear than others. This paper addresses the question of how...
Provided By IARIA
-
PKI in B2C E-Commerce
General purpose (open) and application-specific (closed) PKIs are two main categories of PKI that support a variety of cryptographic operations for providing secure environment. SSL/TLS and SET are two distinct security protocols utilizing these PKI categories for securing e-commerce transactions. While the former protocol categorized as a general purpose PKI...
Provided By The Society of American Magicians
-
Timing Analysis of SSL/TLS Man in the Middle Attacks
The authors' experiment revealed that SSL MiTM attacks have timing patterns that could be identified by observing victims. More specifically, the attack tools they analyzed shifted most of the delay to the time between when an SSL handshake was started and when the certificate was received. Additionally, most of the...
Provided By Cornell University
-
Managing Threat in a Digital Age.
Recent media attention has highlighted the proliferation of security breaches affecting enterprises across numerous industries. These security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. No longer relegated to the domain of the IT organization, the topic...
Provided By IBM
-
Seven Questions to Ask When Considering an All-in-One Data Protection Solution
Most administrators who consider an all-in-one data protection (DP) solution are looking for the fastest, most cost-effective path to securing enterprise data, as well as the simplest system to manage and support. That’s because piecing together a comprehensive solution from separate components is a complex, laborious process that requires research,...
Provided By EVault
-
Understanding the Benefits of Windows 7 for Creating Efficient IT in Healthcare
Security is more important in the healthcare setting than many other industries. Breaches of patient data can result in HIPAA violations and government investigations. Breaches of system security can cause breakdowns of equipment used to sustain life and patient health. Phishing expeditions can cause thousands or millions of dollars to...
Provided By Dell & Microsoft
-
Freeform Dynamics Report - The End User Security Jigsaw
Organisations of all sizes are trying to understand the security implications of mobile working, device proliferation and BYOD. But with IT vendors offering up a broad range of options, it can be hard to know where to focus your efforts. A global study of 977 IT and business professionals provided...
Provided By McAfee
-
SANS Survey on Mobility/BYOD Security Policies and Practices
In this new survey on BYOD policy and controls, more than 95% of the 650-plus respondents said that policy is a critical protection that needs to be integrated into overall risk management policy. Yet, 38% do not have the policies they feel are necessary.
Learn why you need to implement stronger...Provided By McAfee
-
McAfee Enterprise Mobility Management Solution Brief
How would it change your approach to mobilizing your workforce if you could manage all your endpoints (mobile smartphones and tablets, traditional laptop PCs/Macs/desktop PCs, company-issued endpoints, and employee-owned mobile devices) from the same unified management infrastructure in a simplified, secure, scalable way?
Provided By McAfee
-
IBM Ready Pack for Cloud: Helping SMBs Manage Growth and Costs
The IBM Ready Pack for Cloud, built on a flexible, reliable foundation of IBM® System x® servers powered by the latest Intel® Xeon® processors, enables small and medium businesses (SMBs) to achieve operational efficiencies and faster time to market. This solution empowers small IT staff to rapidly deliver a virtualization...
Provided By IBM and Intel
-
Secured BGP Routing Protocol For Network Services
Computer network have pervaded each and every day in the people life and also prevent in all aspects. Now everyone knows that network services are provided by service gateways, where it only focused on minimizing the length of the routes have an overall network performance. As more and more people...
Provided By Creative Commons
-
CCA Secure Publicly Verifiable Public Key Encryption Without Pairings Nor Random Oracle and Its Applications
Hosen ciphertext security (CCA security) hosen ciphertext security (CCA security) C is now a widely accepted necessary security notion for public key encryption. CCA secure public verifiable public key encryption has many applications such as threshold public key encryption and proxy re-encryption etc. Furthermore, these years \"Random oracle model\" has...
Provided By Northwestern Polytechnical University
-
An Attendance Monitoring System Using Biometrics Authentication
Biometric technology that involves the identification and verification of individuals by analyzing the human fingerprint characteristics has been widely used in various aspect of life for different purposes, most importantly as regards this study the issue of employee attendance. The main aim of this paper is to develop an accurate,...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Survey on Captcha Systems
CAPTCHA stands for completely automated public Turing test to tell computer and human apart. Due to the enormous growth of Internet, security of web application has become a vital issue and many web applications facing a threat of Internet bot also known as Internet Robot is an automated script which...
Provided By Journal of Global Research in Computer Science (JGRCS)
-
Information Integration for Heterogeneous Data Sources
Information retrieval from heterogeneous information systems is required but challenging at the same as data is stored and represented in different data models in different information systems. Information integrated from heterogeneous data sources into single data source are faced upon by major challenge of information transformation-were in different formats and...
Provided By IOSR Journal of Engineering
-
A Survey on Data Aggregation Techniques for Wireless Sensor Networks
Wireless Sensor Network is an area of growing interest in which recent advancements in the field of sensing, computing and communication attracted various research efforts. Limitations of sensors involve power consumption, computation as well as communication capability. Data aggregation is one practical solution of constraint of power consumption. Various data...
Provided By International Journal of Advanced Research in Computer Engineering & Technology
-
Verilog Implementation of Elliptic Curve Cryptosystem (ECC)
Data Encryption is widely used to ensure security in open networks such as the internet with the fast development of cryptography research and computer technology. The capabilities of cryptosystems such as of RSA & Diffie-Hellman are inadequate due the requirement of large number of bits. The cryptosystem based on Elliptic...
Provided By International forum of researchers Students and Academician
-
Advanced Targeted Attacks: How to Protect Against the Next Generation of Cyber Attacks
Traditional defenses are increasingly becoming policy enforcement points rather than robust defenses against cyber intrusions. To regain the upper hand against next-generation attacks, enterprises must turn to true next-generation protection: signature-less, proactive, and real-time. Through continuous analysis of suspicious code throughout the attack lifecycle and blocking of malware communications across...
Provided By FireEye
-
Security and Privacy of Image by Encryption, Lossy Compression and Iterative Reconstruction
Now-a -days, large files such as digital images, to be easily transmitted over the internet. New problems associated with this are security and privacy of image. Using pseudorandom permutation, image encryption is obtained. Confidentiality and access control is done by encryption. Encrypted image is compressed by using orthogonal transform. Irrelevance...
Provided By International Journal of Computer Applications
-
Economic Denial of Sustainability (EDoS) in Cloud Services Using HTTP and XML Based DDoS Attacks
Cloud Computing, a new wave in the Internet revolution, transforms the kind of services provided over the Internet. The Cloud Services can be viewed from two perspectives, one as Cloud Service Provider and the other as Cloud Service Consumer. Assurance of security in the Cloud Service is a major challenge...
Provided By International Journal of Computer Applications
-
A Novel Approach of Steganography Using Hill Cipher
In the modern technological world, where data or image transfer through the internet has gained utmost importance, security of the data has become a major issue. The authors use cryptography for the security of the above mentioned data. By the help of cryptography, they convert plain text into cipher text,...
Provided By International Journal of Computer Applications
-
Reinventing Anti-virus
This whitepaper describes how new threats have stretched the capabilities of "fat client" security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature...
Provided By Webroot Software
-
Not Just for PCs Anymore: The Rise of Mobile Malware
Mobile malware is not new. Today, however, mobile malware is far more widespread, and far more dangerous—especially since smartphones and tablets are now widely used for critical business tasks. Get a close look at the fast-moving threat of mobile malware: how and why it’s arisen, what forms it takes, where...
Provided By Sophos
-
On Implications Of Micro Price Data For Macro Models
The authors review the recent literature that studies new, detailed micro data on prices. They discuss implications of the new micro data for macro models. They argue that the new micro data are helpful for macro models, but not decisive. There is no simple mapping from the frequency of price...
Provided By European Central Bank
-
Oil Exporters: In Search Of An External Anchor
This paper discusses the choice of an optimal external anchor for oil exporting economies, using optimum currency area criteria and simulations of a simple model of a small open economy pegging to a basket of two currencies. Oil exporting countries in particular those of the Gulf Cooperation Council - satisfy...
Provided By European Central Bank
-
On Policy Interactions Among Nations: When Do Cooperation And Commitment Matter?
This paper offers a framework to study commitment and cooperation issues in games with multiple policymakers. To reconcile some puzzles in the recent literature on the nature of policy interactions among nations, the authors prove that games characterized by different commitment and cooperation schemes can admit the same equilibrium outcome...
Provided By European Central Bank
-
Credit Card Use After The Final Mortgage Payment: Does The Magnitude Of Income Shocks Matter?
The authors test the hypothesis that consumption smoothing occurs after large, but not small, expected future income shocks. Even though this hypothesis has often been discussed, formal evidence in support of it is rare. They use individual level, monthly, bank account data to examine how expected income shocks from final...
Provided By European Central Bank
-
Payment Scale Economies, Competition, And Pricing
Payment scale economies affect banking costs, competition in payment services, and pricing. The author' scale measure relates operating cost to physical measures of European banking "Output", finding large economies. This differs from relating total cost to the value of balance sheet assets (the conventional approach). Interest expenses are excluded since...
Provided By European Central Bank
-
Would The Bundesbank Have Prevented The Great Inflation In The United States?
Policy counterfactuals based on estimated structural VARs routinely suggest that bringing Alan Greenspan back in the 1970s' United States would not have prevented the Great Inflation. The authors show that a standard policy counterfactual suggests that the Bundesbank - which is near-universally credited for sparing West Germany the Great Inflation...
Provided By European Central Bank
-
The Forecasting Power Of Internal Yield Curve Linkages
This paper investigates whether information from foreign yield curves helps forecast domestic yield curves out-of-sample. A nested methodology to forecast yield curves in domestic and international settings is applied on three major countries (the US, Germany and the UK). This novel methodology is based on dynamic factor models, the EM...
Provided By European Central Bank
-
Evaluating DoS Attacks Against SIP-Based VoIP Systems
The multimedia communication is rapidly converging towards Voice over Internet - commonly known as Voice over Internet Protocol (VoIP). Session Initiation Protocol (SIP) is the standard used for session signaling in VoIP. Crafty attackers can launch a number of Denial of Service (DoS) attacks on a SIP based VoIP infrastructure...
Provided By National University of Computer and Emerging Sciences
-
Design of a High Performance Implementation of a Tree-Based Multicast Key Distribution Protocol
The key distribution problem is considered one of the most important issues for providing secure multicast communication. Logical Key Hierarchy (LKH) protocols are considered one of the best solutions proposed for solving the scalability of multicast key distribution protocols. The use of LKH protocols reduces the computation complexity cost from...
Provided By Cairo University
-
Exposure-Based Cash-Flow-At-Risk For Value-Creating Risk Management Under Macroeconomic Uncertainty
A strategically minded CFO will realize that strategic corporate risk management is about finding the right balance between risk prevention and proactive value generation. Efficient risk and performance management requires adequate assessment of risk and risk exposures on the one hand and performance on the other. Properly designed, a risk...
Provided By Research Institute of Industrial Economics
-
Haar Features for FACS AU Recognition
The authors examined the effectiveness of using Haar features and the Adaboost boosting algorithm for FACS Action Unit (AU) recognition. They evaluated both recognition accuracy and processing time of this new approach compared to the state-of-the-art method of classifying Gabor responses with support vector machines. Empirical results on the Cohn-Kanade...
Provided By University of the Western Cape
-
Enhanced Chosen-Ciphertext Security and Applications
The authors introduce and study a new notion of Enhanced Chosen-Ciphertext security (ECCA) for publickey encryption. Loosely speaking, in ECCA, when the decryption oracle returns a plaintext to the adversary, it also provides coins under which the returned plaintext encrypts to the queried ciphertext (when they exist). Their results mainly...
Provided By University of Brighton
-
A Comparison of Statistical Techniques for Detecting Side-Channel Information Leakage in Cryptographic Devices
The evaluation of the resilience of cryptographic devices against side-channel adversaries is an issue of increasing importance. The development of a standardized testing methodology for side-channel resistance of crypto-graphic devices is an issue that has received recent focus from standardization bodies such as NIST. Statistical techniques such as hypothesis and...
Provided By University of Brighton
-
A Leakage Resilient MAC
The authors put forward a Message Authentication Code (MAC) for which they claim a high degree of resilience against a key-recovering attacker expoiting practical side channels. They achieve this by blending the lessons learned from many years of engineering with the scientific approach provided by leakage resilience. This highlights how...
Provided By University of Brighton
-
A Chaotic Block Cipher for Real-Time Multimedia
The widespread usage of Internet is providing additional channels for a pirate to easily and quickly distribute the copyrighted digital content. As a result, the protection of content is now receiving a significant amount of consideration and strong security technology is required to protect user's sensitive digital data. Cryptography is...
Provided By Science Publications
-
Intellectual Property Rights Legislation and Computer Software Piracy in Jordan
This paper presents a serious worldwide problem, namely, computer software piracy and its impact on global economy, in general, and Jordanian economy, in particular. The paper also presents a detailed analysis of the Jordanian IPR legislation and Jordan's commitment to international and bilateral agreements with regards to this issue. Finally,...
Provided By Science Publications
-
The Determinants Of Public Deficit Volatility
This paper empirically analyzes the political, institutional and economic sources of public deficit volatility. Using the system-GMM estimator for linear dynamic panel data models and a sample of 125 countries analyzed from 1980 to 2006, the authors show that higher public deficit volatility is typically associated with higher levels of...
Provided By European Central Bank
-
How Do Croatian Companies Make Corporate Risk Management Decisions: Evidence From The Field
According to the Capital Asset Pricing Model and the Modigliani-Miller theorem, corporate risk management is irrelevant to the value of the firm. However, it is apparent that managers are constantly engaged in hedging activities that are directed at the reduction of corporate risks. As an explanation for this clash between...
Provided By University of Zagreb
-
A Review Of The Rationales For Corporate Risk Management: Fashion Or The Need?
This paper presents the extensive literature survey based both on theoretical rationales for hedging as well as the empirical evidence that support the implications of the theory regarding the arguments for the corporate risk management relevance and its influence on the company's value. The survey of literature presented in this...
Provided By University of Zagreb
-
A Hybrid Biometric Cryptosystem for Securing Fingerprint Minutiae Templates
Security concerns regarding the stored biometric data is impeding the widespread public acceptance of biometric technology. Though a number of bio-crypto algorithms have been proposed, they have limited practical applicability due to the trade-off between recognition performance and security of the template. In this paper, the authors improve the recognition...
Provided By Elsevier
-
Elliptic Curve Signcryption With Encrypted Message Authentication and Forward Secrecy
This paper presents a comprehensive signcryption scheme based on elliptic curves. In addition to the message confidentiality, non-repudiation and unforgeability, the proposed scheme achieves forward secrecy and encrypted message authentication needed by firewalls. A judge can resolve disputes by directly verifying the sender's signature on signcrypted messages without help from...
Provided By Alexandria University
-
Biometric Authentication System Using Fingerprints Based on Self-Organizing Map Neural Network Classifier
Biometric recognition refers to the use of distinctive physiological and behavioral characteristics (e.g., fingerprint, face, and signature) for automatically recognizing or authentication of a person. A number of biometric technologies have been developed and several of them are being used in variety of fields. Among all biometric technologies, fingerprint based...
Provided By Alexandria University
-
The 10 Worst Practices for Technical Support and How to Overcome Them
Most support professionals have seen published best practices for technical support. But often, your service quality, productivity and financial performance are governed more by worst practices: self-inflicted wounds caused by short-term thinking. This white paper explores 10 of the "worst practices" that are common to customer support operations, including how...
Provided By NTRglobal
-
Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes
Common occurrence of server overload and the threat of Denial-of-Service (DoS) attacks makes highly desirable to improve the performance and DoS resistance of SSL handshakes. In this paper, the authors tackle these two related problems by proposing reverse SSL, an extension in which the server is relieved from the heavy...
Provided By Middle East Technical University
-
User Awareness Measurement Through Social Engineering
TUBITAK National Research Institute of Electronics and Cryptology (UEKAE) Department of Information Systems Security makes social engineering attacks to Turkish public agencies within the frame of "Information Security Tests". This paper will make an analysis of the social engineering tests that have been carried out in several Turkish public agencies....
Provided By Middle East Technical University
-
Real-Time Web Application Roadblock: Performance Penalty of HTML Sockets
HTML socket streams, such as XHR-polling and HTML5 web-sockets, are being rapidly embraced because they operate over HTTP(S) protocols and ports, allowing them to easily traverse security firewalls and HTTP proxies, unlike raw TCP streams. This paper presents an active measurement study of these protocols and compares their performance to...
Provided By NEC Europe
-
Support for Multiple Federation Technologies in a Single Sign on Architecture
This paper proposes some specific guidelines to support multiple federation technologies in a unified Single Sign On infrastructure. SSO mechanisms are bootstrapped from the network authentication, that is, once a user is associated with a wireless access point or is connected to a wired switch in a remote institution, he...
Provided By University of Murcia
-
Two-Stage Decomposition of SNORT Rules Towards Efficient Hardware Implementation
The performance gap between the execution speed of security software and the amount of data to be processed is ever widening. A common solution is to close the performance gap through hardware implementation of security functions. However, continuously expanding signature databases have become a major impediment to achieving scalable hardware...
Provided By Binghamton University
-
Towards a General Definition of Biometric Systems
A foundation for closing the gap between biometrics in the narrower and the broader perspective is presented trough a conceptualization of biometric systems in both perspectives. A clear distinction between verification, identification and classification systems is made as well as shown that there are additional classes of biometric systems. In...
Provided By University of Zagreb