منابع مشابه
SOUL System: secure online USB login system
The SOUL System is a secure online authentication system involving a two-factor authentication scheme that uses a password and an ordinary hardware device as security token. The three main parts of the system include the website, the ordinary hardware device, and a trusted third party. The website must first be integrated with the web API provided and then registered to the trusted third party ...
متن کاملGOOD Publishing System: Generic Online/Offline Delivery
GOOD is a tailor-made, fully integrated publishing system that creates output documents for multiple media types used in both online and offline teaching modes at the University of Southern Queensland. It is used in the Distance and e-Learning Centre of USQ to create course material for thousands of on-campus, online and external students. Among the end products generated from a single XML inpu...
متن کاملSecure Content Delivery Scheme Based on Yaksha System for CCMANETs
Content-Centric Networking (CCN) is a candidate future Internet architecture that gives favorable promises in MANET environment. It is allowed that data of content producer is cached anywhere in Content Centric MANET (CCMANET). This scheme decoupling of data from the source make traditional end-end authentication transmission unavailable in CCMANET. To ensure high availability of the cached dat...
متن کاملDon't Secure Routing Protocols, Secure Data Delivery
Internet routing and forwarding are vulnerable to attacks and misconfigurations that compromise secure communications between end systems. With networks facing external attempts to compromise their routers [3] and insiders able to commandeer infrastructure, subversion of Internet communication is an ever more serious threat. Much prior work has proposed to improve communication security with se...
متن کاملA Secure Submission System for Online Whistleblowing Platforms
Whistleblower laws protect individuals who inform the public or an authority about governmental or corporate misconduct. Despite these laws, whistleblowers frequently risk reprisals and sites such as WikiLeaks emerged to provide a level of anonymity to these individuals. However, as countries increase their level of network surveillance and Internet protocol data retention, the mere act of usin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Review of Computer Engineering Studies
سال: 2020
ISSN: 2369-0755,2369-0763
DOI: 10.18280/rces.070305