Security
Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.
-
Protect and Perform: Ensuring Online Business in Asia-Pacific
SMEs constitute a major proportion of online business in Asia. Since they typically have weaker Web security controls, SMEs are increasingly being targeted by attackers. This is steadily building awareness among the SME community who are now investing more in strengthening their Web security. Download the white paper to learn...
Provided By Akamai
-
Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis
Leakage-resilient cryptography aims at developing new algorithms for which physical security against side-channel attacks can be formally analyzed. Following the work of Dziembowski and Pietrzak at FOCS 2008, several symmetric cryptographic primitives have been investigated in this setting. Most of them can be instantiated with a block cipher as underlying...
Provided By Technical University of Lodz
-
Secure Biometrics: Concepts, Authentication Architectures & Challenges
Biometrics is an important and widely used class of methods for identity verification and access control. Biometrics is attractive because they are inherent properties of an individual. They need not be remembered like passwords, and are not easily lost or forged like identifying documents. At the same time, biometrics is...
Provided By Cornell University
-
Cryptanalysis of Grigoriev-Shpilrain Physical Asymmetric Scheme with Capacitors
In a paper published few days ago, Grigoriev and Shpilrain propose to build a system for transmission of information without a shared secret, or essentially a sort of public key cryptosystem, based on properties of physical systems. Few days ago Grigoriev and Shpilrain have proposed to build a system for...
Provided By University College Dublin
-
Six keys to effective reputational and IT risk management-2013 IBM Global Reputational Risk and IT Study
IT risks like data breaches and outages pose a serious and long-lasting threat to your corporate reputation. But other risks put you in jeopardy as well. In fact, did you know that your supply chain could be one of your weakest reputational links? That’s one of many facts we uncovered...
Provided By IBM
-
Responding to - and recovering from - sophisticated attacks
We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you...
Provided By IBM
-
EMV Migration for the US Parking Industry
EMV has revolutionized payments and is already in place in many regions across the globe. So far, the US has delayed its adoption of the new standards, which replace magnetic stripe payments with Chip-based transactions. However, this is all about to change. The US payments sector has a migration plan...
Provided By CreditCall
-
Improvement and Efficient Implementation of a Lattice-based Signature Scheme
Lattice-based signature schemes constitute an interesting alternative to RSA and discrete logarithm based systems which may become insecure in the future, for example due to the possibility of quantum attacks. A particularly interesting scheme in this context is the GPV signature scheme [GPV08] combined with the trapdoor construction from Micciancio...
Provided By Technische Universitat Clausthal
-
A Comparison of Statistical Techniques for Detecting Side-Channel Information Leakage in Cryptographic Devices
The evaluation of the resilience of cryptographic devices against side-channel adversaries is an issue of increasing importance. The development of a standardized testing methodology for side-channel resistance of crypto-graphic devices is an issue that has received recent focus from standardization bodies such as NIST. Statistical techniques such as hypothesis and...
Provided By University of Brighton
-
Cryptoviral Extortion: A virus based approach
As the authors know that traditionally, "Cryptography" is used for information processing and communications, it helps people to store information securely and it is used very frequently for private communications. But Cryptovirology is the study of applications of cryptography to build the malicious software (malware). It is an investigation, how...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
A Survey of Various Spectrum Sensing Techniques in Cognitive Radio Networks: Non Cooperative Systems
Cognitive Radio (CR) is a promising technology that can alleviate the spectrum shortage problem by enabling unlicensed users equipped with CRs to coexist with incumbent users in licensed spectrum bands without inducing interference to incumbent communications. Spectrum sensing is one of the essential mechanisms of CRs that has attracted great...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Accountable Key Infrastructure (AKI): A Proposal for a Public-Key Validation Infrastructure
Recent trends in public-key infrastructure research explore the tradeoff between decreased trust in Certificate Authorities (CAs), resilience against attacks, communication overhead (bandwidth and latency) for setting up an SSL/TLS connection, and availability with respect to verifiability of public key information. In this paper, the authors propose AKI as a new...
Provided By Association for Computing Machinery
-
A Leakage Resilient MAC
The authors put forward a Message Authentication Code (MAC) for which they claim a high degree of resilience against a key-recovering attacker expoiting practical side channels. They achieve this by blending the lessons learned from many years of engineering with the scientific approach provided by leakage resilience. This highlights how...
Provided By University of Brighton
-
Security Explorer Trial
Take Security Explorer for a test drive, and see how it can deliver a unified solution for complete access control and security management across your entire Windows network. It’s a powerful, yet intuitive solution that takes the complexity out of security management. Your free trial is a Web-based, self-contained virtual...
Provided By Dell Software
-
STRIDE: Sanctuary Trail - Refuge From Internet DDoS Entrapment
The authors propose STRIDE, a new DDoS-resilient Internet architecture that isolates attack traffic through viable band-width allocation, preventing a botnet from crowding out legitimate flows. This new architecture presents several novel concepts including tree-based bandwidth allocation and long-term static paths with guaranteed bandwidth. In concert, these mechanisms provide domain-based bandwidth...
Provided By Association for Computing Machinery
-
EMA: Closing Critical IT Security Gaps for More Effective Defense
An ENTERPRISE MANAGEMENT ASSOCIATES (EMA) White Paper.
In the last few years, the scale and sophistication of IT security threats have grown at an explosive rate. Organizations have to contend with industrialized attacks, which, in some cases, rival the size and sophistication of the largest legitimate computing efforts. In...Provided By FireEye
-
University Strengthens IT Security Through FISMA Assessment
University of Texas Health Science Center at San Antonio wanted to comply with FISMA as required by new externally-funded research projects, gain better understanding of what FISMA compliance entails and learn best practices for improving research-specific operational security. They chose Cisco to overcome these challenges. Cisco FISMA Risk Assessment Service...
Provided By Cisco
-
Privacy Preserving Recommendation System Based on Groups
Recommendation systems have received considerable attention in the recent decades. Yet with the development of information technology and social media, the risk in revealing private data to service providers has been a growing concern to more and more users. Trade-offs between quality and privacy in recommendation systems naturally arise. In...
Provided By Princeton Software
-
Infrastructure for Detecting Android Malware
Malware for Smartphone have sky-rocketed these last years, particularly for Android platforms. To tackle this threat, services such as Google Bouncer have intended to counter-attack. However, it has been of short duration since the malware have circumvented the service by changing their behaviors. Therefore, the authors propose malware taxonomy, a...
Provided By Hispasec Sistemas
-
User-Based Licensing for Endpoint Protection and BYOD
Can Smarter Licensing Improve Security? IT managers and security professionals don’t spend much time thinking about software licensing. But sometimes a smarter licensing plan can simplify IT administration, reduce costs and improve security. A perfect example is a new model for endpoint and mobile device protection that licenses software by...
Provided By Webroot Software
-
Closing the Circle: How to get manageable endpoint, mobile device and web security together
Endpoint protection has gotten more complicated. Endpoint protection has never been easy, but it once was at least straightforward. Workers had one computer, used the corporate email system and visited only a few websites while at work. Today, endpoint protection is far more difficult. In this white paper we will...
Provided By Webroot Software
-
Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption
The authors consider a class of two-party function evaluation protocols in which the parties are allowed to use ideal functionalities as well as a set of powerful primitives, namely commitments, homomorphic encryption, and certain zero-knowledge proofs. They illustrate that with these it is possible to capture protocols for oblivious transfer,...
Provided By Aarhus University
-
Contextual Adaptation of a Security Framework
This paper presents a conceptual framework which has been adapted to use location based service and Wi-Fi technology. This paper will therefore consider and define the issues with the use of the technologies and models by introducing the context of the conceptual framework in Section 1, the exploratory investigation in...
Provided By Jordan University of Science and Technology
-
Strong Authentication for Web Services Using Smartcards
The popularity of the Internet and the variety of services it provides has been immense. Unfortunately, many of these services require the user to register and subsequently login to the system in order to access them. This has resulted in the user having to remember a multitude of username and...
Provided By University of Pittsburgh Medical Center
-
IP Multimedia Subsystem: Security Evaluation
The IMS (IP Multimedia Subsystem) as network controller includes effective mechanisms for new services, regardless of the access technology. The network regroups all existing access IP-based technologies that unify access and minimize costs of service deployment. However, such architecture poses significant security challenges at network access and services providing. Indeed,...
Provided By JATIT
-
Controlling & Managing Superuser Access
All kinds of IT professionals require access to privileged or shared accounts in order to perform their job. However, IT managers need to strike a balance between providing them the access they need to perform tasks quickly and efficiently against management’s need to ensure that security and compliance objectives are...
Provided By Dell Software
-
The Active Directory Management and Security You’ve Always Dreamed Of
The harsh reality about Windows security? Its native security structure has remained essentially unchanged since the release of Windows NT in 1993. Of course, today’s security requirements are drastically different, and businesses and organizations need a lot more from Windows’ security. In this paper, Windows expert Don Jones outlines solutions—role-based...
Provided By Dell Software
-
My Patch Compliance Rates are WHAT
Are you alarmed by patch compliance rates that aren’t anywhere near 100 percent? Do you wonder why it takes so long to apply required patches to all of your systems?
Many organizations struggle to effectively patch all of their systems, especially when they have a mix of Microsoft Windows,...Provided By IBM
-
File Integrity Monitoring - The Last line of Defense in the PCI Data Security Standard
Has there ever been a more confusion-generating initiative than the PCI DSS? Even now, a good seven years on from its initial introduction, a clear and definitive understanding of what the user's organization needs to do may still be a challenge. Tier 1 Payment Card Merchants will now be entering...
Provided By New Net Technologies
-
Centralized and Cooperative Transmission of Secure Multiple Unicasts Using Network Coding
The authors introduce a method for securely delivering a set of messages to a group of clients over a broadcast erasure channel where each client is interested in a distinct message. Each client is able to obtain its own message but not the others'. In the proposed method the messages...
Provided By Australian National University
-
Managing threats in the digital age
The topic of security is now unquestionably a C-suite priority. An enterprise that delegates security matters solely to the CIO is compounding its risk factors. Organizations need to move toward a more systematic and proactive approach to addressing security threats and managing compliance requirements. Download the white paper to learn...
Provided By IBM
-
Security Analysis of Croatia's Receipt Registration and Verification System
In this paper, the authors presented initial analysis of a fiscal system introduced by Republic of Croatia's Tax Administration. It is only a partial analysis, based on publicly available information, which doesn't include testing's on live systems due to being illegal by the new Criminal law in Croatia. Also, they...
Provided By University of York Students' Union
-
Limiting the Neighborhood: De-Small-World Network for Outbreak Prevention
In this paper, the authors study a basic and practically important strategy to help prevent and/or delay an outbreak in the context of network: limiting the contact between individuals. In this paper, they introduce the average neighborhood size as a new measure for the degree of being small-world and utilize...
Provided By Kent State University
-
Mission-Critical Matters
Jonathan Patrizio, HP High Availability and Disaster Recovery Expert, shares how you can utilize Linux ServiceGuard running on Intel® Itanium® processor-powered HP-UX to deliver uncompromising availability and cost savings for your mission-critical workloads.
Sponsored by HP and Intel® Itanium® Processors:
Intel,...Provided By HP and Intel® Itanium® Processors
-
User Authentication and Data Cryptograph System Based on Biometric Key for Wireless Sensor Networks
Wireless Sensor Networks (WSNs) have great prospect for the applications in unattended environments. Security measures should be taken to protect the sensitive data by preventing unauthorized users from accessing the information. However, traditional user authentication and data cryptograph method based on secret keys for WSNs have intrinsic shortcomings. This paper...
Provided By Jilin University
-
Survey on Authentication Password Techniques
Authentication is process of determining whether someone or something is, in fact who or what to be declared. For authentication mostly textual passwords are used. Passwords are the most commonly used method for identifying users in computer and communication systems. Typically, passwords are strings of letters and digits, i.e., they...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Robust Code Based Fault Tolerant Architecture Using OFB Mode for Onboard EO Satellites
The demand to protect the sensitive and valuable data transmitted from satellites to ground has increased and hence the need to use security algorithm on board in Earth Observation satellites also increased. The security algorithms like Advanced Encryption Standard by NIST (National Institute of Standards and Technology), is popular in...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Implementing Security Consideration in Dynamic Source Routing
Security has become one of the major issues for data communication over wired and wireless networks. To enhance the security of data transmission, existing system works on the cryptography based algorithms such as SSL, IPSec. Although IPSec and SSL accounts for great level of security, they introduce overheads. A mass...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
An Adaptive Intrusion Detection Model Based on Machine Learning Techniques
Intrusion detection continues to be an active research field. Even after 20 years of research, the intrusion detection community still faces several difficult problems. Detecting unknown patterns of attack without generating too many false alerts remains an unresolved problem. Although recently, several results have shown that there is a potential...
Provided By Universiti Teknikal Malaysia Melaka
-
Hybridization of Symmetric Key Encryption and Visual Cryptography
Visual cryptography technique encipher the visual information in such a way, that decipher can be performed by human visual system without any complex decoding process. As visual cryptography, is a secure tactics for transmitting visual information but, if anyone gets access to all shares, he/she can reveal out the secret...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Introduction to Antispam Practice
According to a research conducted by Microsoft and published by the Radicati Group, the percentage held by spam in the total number of emails sent daily has been constantly growing since 2005. As a result, spam is expected to represent 77% of emails sent worldwide by 2009, amounting to almost...
Provided By GECAD TECHNOLOGIES
-
Introduction to Innovative Mail Filtering With AXIGEN
Email is not what it was supposed to be. Its inventors have not foreseen the dangers associated with this new form of communication. Means of protection were added later on, but do little to protect people's mailboxes. As a result, most of the mail traffic these days is unwanted: spam,...
Provided By GECAD TECHNOLOGIES
-
Identity Confirmation - Challenge / Response Anti-Spam Filtering With a Twist
It is not a matter of novelty to any efficiency-oriented business professional that in nowadays email communication environment, the security issue is not one to ignore. Particularly when talking about the fast-adapting spamming methods which, at the spam-receiving end, can easily be translated as detrimental to the general productivity (therefore...
Provided By GECAD TECHNOLOGIES
-
Protecting Dynamic Datacenters From the Latest Threats
Third Brigade Deep Security is comprehensive server and application protection software that unifies security across virtual, cloud computing and traditional datacenter environments. It helps organizations to prevent data breaches and business disruptions, enable compliance with key regulations and standards including PCI, and support operational cost reductions that are necessary in...
Provided By Third Brigade
-
Protecting Dynamic Data Centers From Latest Threats
Third Brigade Deep Security is comprehensive server and application protection software that unifies security across virtual, cloud computing and traditional datacenter environments. It helps organizations to prevent data breaches and business disruptions, enable compliance with key regulations and standards including PCI, and support operational cost reductions that are necessary in...
Provided By Third Brigade
-
Reducing the Scope of Your PCI Audit: Innovative Network Segmentation Using Host Intrusion Defense
It has been more than three years since the first version of the Payment Card Industry (PCI) Data Security Standard (DSS) was released. Multiple validation deadlines for Level 1 Merchants have passed, but in terms of industry scope, the majority of merchants and card service providers affected by the PCI...
Provided By Third Brigade
-
Third Brigade: A New Approach to Addressing Regulatory Compliance
This paper reviews key information security mandates and the common compliance threads that exist among them. It also explores the benefits of adopting the right technology to help enable security compliance among users, applications, databases, and the network. The information, tables, and appendices provided throughout this paper are intended as...
Provided By Third Brigade
-
P-Lingua: A Programming Language for Membrane Computing
Software development for cellular computing has already been addressed, yielding a first generation of applications. This paper develops a new programming language: P-Lingua. Furthermore, the paper presents a simulator for the class of recognizing P systems with active membranes. The paper illustrates it by giving a solution to the SAT...
Provided By Universidad de Sevilla
-
Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates
Filtering is a very important issue in next generation networks. These networks consist of a relatively high number of resource constrained devices with very special features, such as managing frequent topology changes. At each topology change, the access control policy of all nodes of the network must be automatically modified....
Provided By Universidad de Sevilla
-
10 trends that will transform IT over the next five years
Business analyst Gartner recently released a list of its top 10 IT predictions for the next three to five years. TechRepublic's Jason Hiner examines Gartner's forecast and weighs in with his own analysis.
This download is also available as an entry in our Tech Sanity Check blog.Provided By Jason Hiner
-
Employee Handbook - Policies And Procedures
This handbook was developed to provide you with an information resource for common questions and concerns. If you have questions or concerns about the policies outlined here, you should contact your manager or Human Resources. The policies stated in this handbook are subject to change at any time at the...
Provided By hrVillage.com
-
Employee Internet and Email Abuse - Mapping the Legal Minefield for Employers
Download this whitepaper to understand your legal position on employee misuse of Email, Web and Instant Messaging. Written by noted expert in IT and Internet Law, Dr Brian Bandey and with chapters including Explaining the Law, Harassment and Understanding Employer's Liability, this whitepaper is a complete guide for Employers to...
Provided By Marshal Ltd
-
Beyond URL Filtering: Why a Secure Web Gateway is the answer
"The Internet is a vital part of business life, but one that also exposes employees and employers to significant security threats. Download this whitepaper to learn about various web-based threats, and discover how this secure web gateway solution combines technologies to ensure security and acceptable Internet usage that provides ROI...
Provided By Marshal Ltd
-
C.R.M. Benefits For Midsize Businesses
Customer relationship management (C.R.M.) applications can deliver significant value to today's midsize businesses. With a C.R.M. system in place, midsize companies can improve employee productivity, shorten sales cycles and increase revenues, minimize sales and support-related expenses, and build stronger and more profitable relationships with customers. There are currently many C.R.M....
Provided By CompareCRM.com
-
Planning Procedures For Building Effective Management Systems: Phase II
Have you ever had the opportunity to watch the construction of a large building? The daily progress from foundation to top floor is truly amazing, you wonder "how does it all happen?" The answer: it takes a lot of planning. The Planning Phase: A complex construction job clearly requires planning...
Provided By CompareCRM.com
-
Superior Reliability and Efficiency From Marshal
St Mark's Church School is an independent, co-educational Christian school catering for students from pre-school to year 8. According to the ICT Manager at St Mark's Church School, the school needed a solution that would effectively block spam and malicious payloads, as well as allow the School to enforce its...
Provided By Marshall
-
An Amalgam Approach Using AES and RC4 Algorithms for Encryption and Decryption
This paper aims at developing a new hybrid cipher by combining the characteristics of two ciphers namely AES(Advanced Encryption Standard) and Rc4(also known as ARC4). The characteristics of both the ciphers are studied and a new cipher combining the characteristics of both the ciphers is generated which is more secure...
Provided By VIT Software, LLC
-
A Defense Mechanism for Credit Card Fraud Detection
Computer security is one of the key areas where lot of research is being done. Many intrusion detection techniques are proposed to ensure the network security, protect network resources and network infrastructures. Intrusion Detection Systems (IDS) attempt to detect attacks by gathering network data and analyze the information from various...
Provided By VIT Software, LLC
-
Kerberos, Cryptography and Biometric based Remote Authentication Protocol
The authors are looking for a very secure method of remote authentication. Biometrics authentication has become popular with the increase in infrastructure facilities and scope of sensor technologies. They are suited due to high security in applications like remote authentication. They are considering a provably secure and blind sort of...
Provided By VIT Software, LLC
-
A Study on Security Threats in Cloud
Cloud computing is now invading almost all IT industry and has become a rich area of research. It enables the users to share the resources which are done through resource virtualization and they have to pay only for what they use. The new paradigm freed the organizations from the burden...
Provided By VIT Software, LLC
-
Securing Internet Protocol (IP) Storage: A Case Study
Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast. Today, there are many potential threats that are targeted at storage networks, including data modification, destruction and theft, DoS attacks, malware, hardware theft and unauthorized access, among others....
Provided By VIT Software, LLC
-
Design of Internal Traffic Checkpoint of Security Checkpoint Model in the Cloud Computing
In this paper, the authors proposed design of internal traffic checkpoint in security checkpoint model for preventing security threats. The architected security checkpoint model is a system that performs firstly check process on all incoming traffic from outside network. And it identifies almost threats and prevents them for protecting a...
Provided By Science and Development Network (SciDev.Net)
-
Security Threats in Cloud Computing Environments
Cloud computing is a model for enabling service user's ubiquitous, convenient and on-demand network access to a shared pool of configurable computing resources. The security for Cloud Computing is emerging area for study and this paper provide security topic in terms of cloud computing based on analysis of Cloud Security...
Provided By Science and Development Network (SciDev.Net)
-
Mahalanobis Distance Map Approach for Anomaly Detection of Web-Based Attacks
Web servers and web-based applications are commonly used as attack targets. The main issues are how to prevent unauthorised access and to protect web servers from the attack. Intrusion Detection Systems (IDSs) are widely used security tools to detect cyber-attacks and malicious activities in computer systems and networks. In this...
Provided By University of Technology
-
Analysis of BGP Security Vulnerabilities
Border Gateway Protocol (BGP) is a dynamic routing protocol in the Internet that allows Autonomous System (AS) to exchange information with other networks. The main goal of BGP is to provide a loop free path to the destination. Security has been a major issue for BGP and due to a...
Provided By University of Technology
-
10 security problems you might not realize you have
It's easy to get distracted by high profile security threats and let the more subtle -- but equally destructive -- risks fall through the cracks.
Provided By Justin James
-
Demystifying DLP: Solving the Mystery of Data Loss
Companies today are increasingly challenged to protect their sensitive data. Whether they need to protect customer credit card information, patient healthcare records, sensitive intellectual property, non-public financial information or other company data, there are strong drivers for increased vigilance. Additionally, protecting data is becoming more difficult. Innovations in Data Loss...
Provided By Technology Executives Club
-
Authentication's Past, Present and Future
The presenter of this webcast will explore the topic of authentication completely. It will begin with a look at authentication methods of the past in computing. There will be special attention paid to means of authentication still in use, and a discussion of why those methods are still around. Then...
Provided By Technology Executives Club
-
Identity Life Cycle Management: State of the Union
What has been a shift change in both the market and technology in identity management is discussed by the presenter. The attendee will learn what those components are and why they are important in articulating the business value of IAM.
Provided By Technology Executives Club
-
10 ways to recover a corrupted Excel workbook
When an Excel file goes haywire, don't give up hope. Using one of these recovery tricks, you may still be able to salvage the data.
This download is also available as an entry in our 10 Things blog.Provided By Susan Harkins
-
How do I... Avoid e-mail spam using Outlook tools?
As more and more spam finds your Inbox, it's harder to find legitimate mail. Regrettably, at least from the recipients' point of view, it looks like spam is here to stay. You can't keep spammers from sending you e-mail, but you can make sure you don't ever see it. Susan...
Provided By Susan Harkins
-
Office Security Systems Help Protect Your Business
You can't afford to lose your business offices, equipment, and customer data to theft or vandalism, so why risk it? With office security systems, you can get a comprehensive solution that will protect your property 24 x 7 x 365. Many businesses put off purchasing office security systems for a...
Provided By BuyerZone.com
-
Only The Best Alarm Companies Will Do
Protect your property, equipment, and confidential data from theft or vandalism with a monitored alarm system. By working with the best alarm companies, you can get an affordable and dependable solution that's always up and running. Many businesses view alarm systems as a solution to protect against intruders. While that's...
Provided By BuyerZone.com
-
Choosing The Best Security Systems Companies
With identity theft and shrinkage on the rise, it's more important than ever to have quality security alarm systems installed in your business. And it's not just the little guys in the business world - retail leader, Wal-Mart, estimates they'll lose more than $3 billion in 2007 due to theft....
Provided By BuyerZone.com
-
Security Analysis and Improvements of a Password-Based Mutual Authentication Scheme with Session Key Agreement
Password-based authentication schemes have been widely adopted to protect resources from unauthorized access. In 2008, Chang-Lee proposed a friendly password-based mutual authentication scheme to avoid the security weaknesses of Wu-Chieu's scheme. In this paper, the authors demonstrate that Chang-Lee's scheme is vulnerable to user impersonation attack, server masquerading attack, password...
Provided By Science and Development Network (SciDev.Net)
-
Implementation of Network Level Security Process Through Stepping Stones by Watermarking Methodology
Network based attacks have become a serious threat to the critical information infrastructure on which the people depend. Identifying the source of the attackers behind the stepping stone(s), it is necessary to correlate the incoming and outgoing flows or connections of a stepping stone. In this paper, the authors propose...
Provided By Science and Development Network (SciDev.Net)
-
Enhancement in the Protection of Transmitted Data
Nowadays and undoubtedly also in the future, modern communication technologies are marked with a tendency towards constant increase in the speed of data transmission. During such transmissions new problems originate which need to be eliminated. An ever more pressing issue is burst-forming errors caused by increases in the transmission speed....
Provided By Brno University of Technology
-
Collection of Different Face Gestures and Realization of Experiments
This paper deals with the influence of face gesticulation to the face recognition algorithms. The authors have acquired the own database with different gestures and tried to test two face recognition tools for the reliability. They used a tool for change of face gesticulation and his impact to the face...
Provided By Brno University of Technology
-
Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis
Together with the massive expansion of smartphones, tablets, and other smart devices, the authors can notice a growing number of malware threats targeting these platforms. Software security companies are not prepared for such diversity of target platforms and there are only few techniques for platform-independent malware analysis. This is a...
Provided By Brno University of Technology
-
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones
The authors explore the threat of Smartphone malware with access to on-board sensors, which open new avenues for illicit collection of private information. While existing work shows that such "Sensory malware" can convey raw sensor data (e.g., video and audio) to a remote server, these approaches lack stealthiness, incur significant...
Provided By City University of Hong Kong