Showing 1 - 10 of 22
security facilitated by navigation message authentication is given. The analysis takes into consideration the risk of critical …This paper describes a number of techniques for GNSS navigation message authentication. A detailed analysis of the … cryptographic authentication schemes for navigation data authentication. These authentication schemes provide authenticity and …
Persistent link: https://www.econbiz.de/10009438385
websites, to Trojans that monitor a customer’s account log on process that captures authentication details that are later … continue to influence the way society makes payment for goods and services, the requirement for more advanced security … is to present a conceptual model for authentication, data entry and transaction verification. It is suggested that the …
Persistent link: https://www.econbiz.de/10009440800
(Class1). To protect users and organization we are proposing an enhanced RFID mutual authentication scheme. In this protocol … we use authentication based on shared unique parameters as a method to protect privacy. This protocol will be capable of … handling forward and backward security, rouge reader better than existing protocols. In our new scheme we involved RFID reader …
Persistent link: https://www.econbiz.de/10009483920
security. Recently, research proposed that an RFID tag can contain malicious code which might spread viruses, worms and other … ensure the data privacy of a tag. The framework will use a sanitization technique with a mutual authentication in the reader … stop execution of the code in the RFIF system. Here shared unique parameters are used for authentication. It will be …
Persistent link: https://www.econbiz.de/10009483982
studies how the three types of trust - ability, benevolence, and integrity impact on knowledge transfer from the inter … integrity and benevolence varied across organisations suggesting that there can be a possible impact of organisational factors …
Persistent link: https://www.econbiz.de/10009437913
disadvantages such as security, privacy, reliability, physical location of data and the unavailability of service due to crashes or …
Persistent link: https://www.econbiz.de/10009434867
When considering information security and privacy issues most of the attention has previously focused on data … operational and transactional data. Specifically, the security and privacy protection of metadata and metastructure information of … new perspective for information security and privacy. It is termed Meta Privacy and is concerned with the protection and …
Persistent link: https://www.econbiz.de/10009434918
Proxy signature helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original signer (e.g. the president of a company) is not available to sign a specific document. If the original signer can not forge valid proxy signatures through impersonating...
Persistent link: https://www.econbiz.de/10009434970
When considering information security and privacy issues most of the attention has previously focussed on data … operational and transactional data. Specifically, the security and privacy protection of metadata and metastructure information of … new perspective for information security and privacy. It is termed Meta Privacy and is concerned with the protection and …
Persistent link: https://www.econbiz.de/10009434971
incorporation of IT Security measures in each SDLC phase is also discussed. This is due to its direct relevance and correlation with … information system privacy issues. The proposed methodology involves identifying the privacy and security issues in each phase …. From there appropriate privacy protecting and security techniques are applied to address these issues. Special mention is …
Persistent link: https://www.econbiz.de/10009434972