Filters








11,638 Hits in 8.4 sec

ENHANCEMENT IN NETWORK SECURITY WITH SECURITY PROTOCOLS

G.Sankareeswari .
2013 International Journal of Research in Engineering and Technology  
The computer network is a collection of network that shares information across wired or wireless technology.  ...  Cryptography, Authentication and access control Mechanisms play a vital role in secure communication over the network.  ...  This is also often performed on attacks against public key encryption; it initiates with a cipher text and find for matching plaintext data.  ... 
doi:10.15623/ijret.2013.0211070 fatcat:pisjti5sczec7ch5ybxerwusw4

Vuvuzela

Jelle van den Hooff, David Lazar, Matei Zaharia, Nickolai Zeldovich
2015 Proceedings of the 25th Symposium on Operating Systems Principles - SOSP '15  
Vuvuzela's key insight is to minimize the number of variables observable by an attacker, and to use differential privacy techniques to add noise to all observable variables in a way that provably hides  ...  Vuvuzela has a linear cost in the number of clients, and experiments show that it can achieve a throughput of 68,000 messages per second for 1 million users with a 37-second end-to-end latency on commodity  ...  (Two users generate their shared secret based on their public keys.)  ... 
doi:10.1145/2815400.2815417 dblp:conf/sosp/HooffLZZ15 fatcat:fvyho37iezaw5pgujjwuk3y5fu

A Review Study on Secure Authentication in Mobile System

Ahitha. H.S, Deepa. A.J
2014 International Journal of Computer Applications Technology and Research  
Security model should adjust with various capability requirements and security requirements of a mobile system This paper provides a survey on security in mobile systems  ...  The key idea in this technique is to provide the security using Encryption Algorithm.  ...  There are about 200 mobile viruses or a malware program that causes problems to the systems based on F-Secure [1] . One of the major issues in mobile system is the low computational power.  ... 
doi:10.7753/ijcatr0310.1008 fatcat:zo2g76qdajfsriqovn2nb6ckly

Private textual network using GSM architecture

Q. Memon
2002 International Multi Topic Conference, 2002. Abstracts. INMIC 2002.  
The second aim of this work is to develop a solution, which can help the clients to reduce their mobile phones bills in addition to providing security on the communicating link.  ...  We explore different Internet access technologies under wireless domain to use for the objective under study and compare them in terms of ease of implementation.  ...  Some new approaches to solve malicious network problem and agent tampering problem are addressed using public key encryption system and steganographic concepts.  ... 
doi:10.1109/inmic.2002.1310194 fatcat:ocsgsl6zyncrrikniogolvb54a

Poster abstract

Joakim Koskela, Juho Heikkilä, Andrei Gurtov
2010 ACM SIGMOBILE Mobile Computing and Communications Review  
Privacy extensions based on public key cryptography and key obfuscation have also been developed which hide the content and publisher of the registration packages.  ...  Strong identities are achieved using public key certification scheme, where identities are tied to keys, certified by a trusted authority.  ... 
doi:10.1145/1710130.1710135 fatcat:tz2wzxwzsbe7hj4pz4rgomlerq

DIAL: A Platform for real-time Laboratory Surveillance

Shamir N. Mukhi, Jennifer May-Hadford, Sabrina Plitt, Jutta K. Preiksaitis, Bonita E. Lee
2010 Online Journal of Public Health Informatics  
The development of DIAL represents a major technical advancement in the public health information management domain, building capacity for laboratory based surveillance.  ...  Laboratory information systems fulfill many of the requirements for individual result management within a public health laboratory.  ...  DIAL is developed as a record based system where a record can be a specimen or a patient depending on the source data.  ... 
doi:10.5210/ojphi.v2i3.3041 pmid:23569594 pmcid:PMC3615771 fatcat:iaedmdovgfbqdf4dou33sibi54

VoiceList

Ruy Cervantes, Nithya Sambasivan
2008 Proceedings of the 10th international conference on Human computer interaction with mobile devices and services - MobileHCI '08  
We present VoiceList, a telephone-based user-generated audio classifieds service.  ...  The aim of the system is to provide an infrastructure for a user-driven community service where there is minimal connectivity to the Internet.  ...  based on a dialogue between the user and the system.  ... 
doi:10.1145/1409240.1409328 dblp:conf/mhci/CervantesS08 fatcat:rmadvtptzjaybjrrux3dalrv2i

CAPTCHuring Automated (Smart)Phone Attacks

Iasonas Polakis, Georgios Kontaxis, Sotiris Ioannidis
2011 2011 Seventh European Conference on Computer Network Defense  
In that light, we conduct an excessive study of Phone CAPTCHA usage for preventing attacks that render telephone devices unusable, and provide information on the design and implementation of our system  ...  We present a variation of an existing attack, that exploits smartphone devices to launch a DoS attack against a telephone device by issuing a large amount of missed calls.  ...  The Phone CAPTCHA test requires the caller to press a sequence of keys based on the instructions presented to him by a recorded message.  ... 
doi:10.1109/ec2nd.2011.19 dblp:conf/ec2nd/PolakisKI11 fatcat:t7p24wzlcng3lnc5vo7z2dx3ry

Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata

David Lazar, Nickolai Zeldovich
2016 USENIX Symposium on Operating Systems Design and Implementation  
friend's public key.  ...  This resolves a significant shortcoming in all prior works on private messaging, which assume an outof-band key distribution mechanism. Alpenhorn's design builds on three ideas.  ...  The caller obtains the recipient's public key using identity-based encryption, which allows the client to obtain a given recipient's public key by simply computing it, without having to query any server  ... 
dblp:conf/osdi/LazarZ16 fatcat:wpqydvukgjc4pe2zlz7fcm3ygu

Page 65 of Library & Information Science Abstracts Vol. , Issue 2 [page]

1994 Library & Information Science Abstracts  
Describes 3 techniques which can assist the job of a searcher attempting to access the Internet with the most basic of dial up terminals and a dial up account: loading a few special programs; customizing  ...  and businesses have begun contracting with commercial vendors and public access organizations to gain access.  ... 

CAPTCHuring Automated (Smart) Phone Attacks

Iasonas Polakis, Georgios Kontaxis, Sotiris Ioannidis
2011 2011 First SysSec Workshop  
In that light, we conduct an excessive study of Phone CAPTCHA usage for preventing attacks that render telephone devices unusable, and provide information on the design and implementation of our system  ...  We present a variation of an existing attack, that exploits smartphone devices to launch a DoS attack against a telephone device by issuing a large amount of missed calls.  ...  The Phone CAPTCHA test requires the caller to press a sequence of keys based on the instructions presented to him by a recorded message.  ... 
doi:10.1109/syssec.2011.21 dblp:conf/dimva/PolakisKI11 fatcat:tymmwxytzvaq7ldn5o3tovzc5m

The Formal Design Model of an Automatic Teller Machine (ATM)

Salem S. M. Khalifa, Kamarudin Saadan
2013 Lecture Notes on Information Theory  
ATM is a real-time system that is very complex in design and application.  ...  This paper presents the formal design, requirement, a distributed approach for the ATM networks, and type of the ATM system.  Index Terms-ATM, real-time systems, formal design models, system behaviour  ...  CONCLUSIONS An automatic teller machine (ATM) is a computerized telecommunications device that provides the customers of a financial institution with access to financial transactions in a public space  ... 
doi:10.12720/lnit.1.1.56-59 fatcat:bepstedd5rcupgl4v5klocdane

An Innovative Kind Of Security Protocol Using Fusion Encryption In Virtual Private Networking

Mohammad Sreedevi
2012 International Journal of Distributed and Parallel systems  
One popular technology to accomplish these goals is a virtual private network. A VPN is a private network that uses a public network usually the Internet to connect remote sites or users together.  ...  It enables us to transmit the data between two computers across a shared or public network in a manner that follows the properties of a private link.  ...  access to the protected resources of the computer.  ... 
doi:10.5121/ijdps.2012.3116 fatcat:76uazoq2yvhsbfcbmsise6i4cu

Computer Security: Planning to Protect Corporate Assets

Melvin Schwartz
1990 Journal of Business Strategy  
This was based on 6,200 computers affected, requiring twelve programmers at each site to spend thirty-six hours—at $22 per hour— checking out every system that might have been infected.  ...  Users who desire computer access through the phone system will call in to such a sys- tem and identify themselves with or without a token.  ... 
doi:10.1108/eb039347 pmid:10103396 fatcat:yyluyrh6o5e3tbs5jk4vepdbw4

Analysis the importance of VPN for Creating a Safe Connection Over the World of Internet

Md. Zihadul Islam, Mohammad Arifin Rahman Khan, Md. Ibrahim Hossain
2021 IJARCCE  
A Virtual Private Network (VPN) is a modern technology for a private network that runs on a public network and is used to transmit encrypted information so that attackers cannot able to usage it.  ...  The administrations of Virtual Private Network are accessible for advanced mobile phones i.e., smartphones, PCs (Personal Computers), laptops etc.  ...  Most of Virtual Private Network authentication is definitely primarily based totally on a public or common key.  ... 
doi:10.17148/ijarcce.2021.101017 fatcat:tp77d3fb4bgq3hnisj2dcmanmq
« Previous Showing results 1 — 15 out of 11,638 results